to determine favourable rates and best time to lodge applications. Requirements: 3 – 4 year Accounting
to determine favourable rates and best time to lodge applications. Requirements: 3 – 4 year Accounting
Ensure all relevant applications for permits are lodge timeously and successfully with the necessary regulatory
Ensure all relevant applications for permits are lodge timeously and successfully with the necessary regulatory
tool
responsible for keeping our company's and clients' IT secure and compliant by ensuring the reliability and efficiency enabling code to be validated for quality and security and deployed continuously. Responsibilities: Develop Implement and manage security testing tools and processes, including static application security testing (SAST) (SAST), dynamic application security testing (DAST), and container security scanning. Provide guidance and software delivery while maintaining code quality and security. Build automated deployments through the use of
shared services, ensure Cyber and Information Security resilience, and act as technology governance and tool
report directly to the OCIO Manager and Risk, Security and Compliance Manager. Based in Cape Town. Requirements: Certification in risk, information systems and/or security desired Skills and exposure to tools such as Outlook current IT security processes and procedures, motivate for process improvements and lead small security initiatives Implementation, support and maintenance of IT security compliancy and monitoring technologies and drive Review IT security standards and policies on effectiveness. Building awareness of security controls,
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging