Duration: 3 year project Start: TBC Microsoft Certified Power BI specialist, with a minimum of 3 years relevant
strong> TBC
Microsoft Certified Power BI specialist, with a minimum of 3 years relevant
practices. We are currently seeking a seasoned Senior Power Apps Developer to spearhead our data visualization have the opportunity to leverage your expertise in Power Apps to unlock actionable insights from complex decision-making and operational excellence. As a Senior Power App Developer, you will play a pivotal role in transforming a PowerApps developer. Strong understanding of Power Platform and its components. Proficiency in Microsoft Skills: 8 Years PowerApps Certifications in Microsoft Power Platform. Experience with custom connectors and
Our client seeks a System Security Engineer for a 6-month contract based in Johannesburg. Assist users and systems with all security-related tasks. Maintenance of information security systems, anti-virus clients both external and internal risks. Investigate security breaches and take steps to mitigate additional services. Enforce security policies and standards. Log file analysis for security and auditing purposes solutions and security tools to boost performance and security while increasing security availability
Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to company Cyber Security Strategy across the company entity. Achieve and maintain and target Cyber Security Maturity cyber programmes Design, Develop and Implement a Security Programme for company No or per target Internal findings related to company for Cyber Security Ensure a Cyber Security Incident Response Practice is in place
for a professional Principal Specialist: Cyber Security contract role for 12 months. Desirable: An industry and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. At Protection and Payment Card Industry (PCI)/Data Security Standard. High level understanding and Knowledge operating multiple security programs, projects, and initiatives and related security tooling An ability understanding of Tech Security risks and mitigating solutions A diverse security background with knowledge
3-to-5-year cyber security strategy across the company Achieve and maintain and target cyber security maturity programmers. Support the design, develop and implement a security programmer for the company No or per target Internal findings related to the company for cyber security Ensure a cyber security incident response practice is in place place across the company Promote awareness of security policies, training, and the governance strategy amongst all levels of the company to ensure sound security governance is reflected across the entity Actively
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal
plan, manage, and administer the company network security. Ensure all network components are managed in experience in IT governance and security. Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Directory. Knowledge of Cloud Security. Design, install and manage security mechanisms that protect the Upgrade systems by implementing and maintaining security controls. Protect the system by defining access Develop and implement standardised Information Security processes and procedures. Respond to internal