This role is ideal for those who are passionate about technology, have a strong drive to succeed, and are eager to make a significant impact on our company's growth. Job Description: Your primary responsibility will be to identify and acquire new clients for our digital platform business. You will b
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
passionate about security technology, customer satisfaction, and enhancing retail security, we are looking manage inventory, and enhance overall retail security. Your main responsibility will be to promote and clients, emphasizing their benefits in terms of security, inventory management, and customer experience experience in sales, preferably within the retail or security industry. Familiarity with EAS technology (RF
families/Companies/Assets are financially sound and secure amidst unexpected events in an ever changing world ADVISOR DO? Creates and protects the financial security and wealth of others, assists clients to acheive
infrastructure asset management company, we support municipal clients to optimise their asset portfolio and
projections to ensure profitability of the store. Securities available for the franchise for stock purchases
schedules, rosters, and other databases. Ensure the security of the premises: They keep track of all visitors while on the premises, ensuring all necessary security protocols are followed. Perform administrative
optimisation based on data analysis. Data Governance and Security: - Ensure compliance with data governance policies policies, data protection regulations, and security protocols. - Adhere to data privacy and confidentiality
schedules, rosters, and other databases. Ensure the security of the premises: They keep track of all visitors while on the premises, ensuring all necessary security protocols are followed. Perform administrative
optimisation based on data analysis. Data Governance and Security: - Ensure compliance with data governance policies policies, data protection regulations, and security protocols. - Adhere to data privacy and confidentiality