Control Room Operator - Out of South Africa Purpose: Monitor, operate and control the metallurgical processes recovery of diamonds. Functions: Monitor, operate and control the metallurgical processes on plant on Scada system throughput and utilisationComply with safety, health, security and environmental standardsAccurate filing of
Control Room Operator - Out of South Africa Purpose: Monitor, operate and control the metallurgical processes recovery of diamonds. Functions: Monitor, operate and control the metallurgical processes on plant on Scada system throughput and utilisationComply with safety, health, security and environmental standardsAccurate filing of
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
mail/deliveries Maintain office security by following safety procedures and controlling access via the reception entry tasks Schedule meetings and book conference rooms Order lunch and serve refreshments where required
mail/deliveries Maintain office security by following safety procedures and controlling access via the reception entry tasks Schedule meetings and book conference rooms Order lunch and serve refreshments where required
the adequacy and effectiveness of the internal control environment, in mitigating current and evolving of business wide (universe) inherent risk and control risk assessments Planning of internal audit assignments Walkthroughs⯠Key risk identification Key control identification Key control adequacy assessments Definition of and sample selections Conducting fieldwork and control effectiveness testing⯠Consolidation of findings Knowledge of Application Control Review, General Control and Information Security testing is required Knowledge
the adequacy and effectiveness of the internal control environment, in mitigating current and evolving of business wide (universe) inherent risk and control risk assessments Planning of internal audit assignments Walkthroughs⯠Key risk identification Key control identification Key control adequacy assessments Definition of and sample selections Conducting fieldwork and control effectiveness testing⯠Consolidation of findings Knowledge of Application Control Review, General Control and Information Security testing is required Knowledge
responsible for overseeing the maintenance and security of company's data centre and server environments and resolve technical issues. Implementation of security configurations & patching in line with organisational organisational requirements. Ensure security through access controls, backups, and firewalls. Upgrade systems background Linux installation, configuration, security and troubleshooting. Experience with databases services such as DNS, TLS/SSL, HTTP Knowledge of security best practises and data backup/recovery The ability
responsible for overseeing the maintenance and security of company's data centre and server environments and resolve technical issues. Implementation of security configurations & patching in line with organisational organisational requirements. Ensure security through access controls, backups, and firewalls. Upgrade systems background Linux installation, configuration, security and troubleshooting. Experience with databases services such as DNS, TLS/SSL, HTTP Knowledge of security best practises and data backup/recovery The ability