Position: Information Security Manager Hire Resolves client is seeking a highly skilled and experienced experienced Information Security Manager to join their team in Centurion, Gauteng. The ideal candidate will be be responsible for ensuring the security of the organisation's information, data, and systems, and will role in developing and implementing comprehensive security measures to protect against cyber threats and Responsibilities: Develop and implement information security policies and procedures to safeguard company data
water retaining structures, sewer and water pump stations B-Tech in Structural Engineering or higher Ideally
water retaining structures, sewer and water pump stations B-Tech in Structural Engineering or higher Ideally
ideal candidate will have a strong background in power plant operations and maintenance, with a focus on operations and maintenance of BOP systems in the power plantDevelop and implement maintenance strategies related field Minimum of 5 years of experience in power plant operations and maintenance, with a focus on safety and environmental regulations related to power plant operations If you meet the above requirements
ideal candidate will have a strong background in power plant operations and maintenance, with a focus on operations and maintenance of BOP systems in the power plantDevelop and implement maintenance strategies related field Minimum of 5 years of experience in power plant operations and maintenance, with a focus on safety and environmental regulations related to power plant operations If you meet the above requirements
12 month consultancy basis Good understanding of Power Purchase Agreements If you meet the above requirements
12 month consultancy basis Good understanding of Power Purchase Agreements If you meet the above requirements
infrastructure, including servers, storage, networking, and security systems Monitor and maintain the organisation's infrastructure to ensure optimal performance and security Troubleshoot and resolve technical issues related knowledge of networking technologies, protocols, and security best practices Experience with virtualisation
applications meet performance, availability, and security requirements Support and maintain existing RFID Queue (MQ) systems (MQTT). Understanding of IT security: authentication and authorization (JWT), encryption hardware/software vulnerabilities, and network security. Understanding of DevOps processes. Proficient
their team. The client provides advanced and highly secure identification solutions and would like a professional and software functionality, as well as network security. Exceptional communication and interpersonal skills