are seeking an experienced, solution driven Food Grade Officer for our Contract Logistics division in JHB(also
We are seeking a Grade
dynamic individual to assume the position as a Mate Grade 3.
Responsible for activities onboard a fishing
Logistics supervisor/ fleet controller/ warehouse supervisor
Previous experience
Systems and Security Analyst
Cape Town | On-site
As our Systems and Security Analyst, you application lifecycle management and ensuring system security, availability, performance, stability, and support analyst Server, Storage, Networking, and Security. You have MCSA or MCSE as well
You must have network security experience, IT security methodology and remediation understanding
Sales Executive Electronic Security Products (POS24019)
R 15 000 to R 22 0000 p>
Requirements:
Internal/Counter Sales Security Technology (POS24104)
Roodepoort (West Rand)
R month plus commission
Electronic Security Company in Roodepoort is looking for an INTERNAL ications & Experience:
/>- Design, install and manage security mechanisms that protect the company's network
Upgrade systems by implementing and maintaining security controls;
- Protect the system by defining
Develop and implement standardised Information Security processes and procedures;
- Respond to internal
to ensure compliance and correction of all IT security issues;
- Conduct IT risk assessments;
- Research, plan, and implement information security technical solutions to meet business requirements
to plan, manage, and administer the CMS network security as well as ensure all network components are managed experience in IT governance and security » Certifications in ITIL foundation, Security, CISM, SCCM and COBIT will Ops Manager); Azure Active Directory;and Cloud Security
efficient Content Management System (CMS) network security infrastructure, ensuring the protection of data data, resources and systems. The Information Security Specialist will be required to execute the following Designing, deploying and maintaining effective security measures to protect against breaches, viruses fortifying systems by implementing and managing security controls. Defining access privileges, control Developing and executing standardized Information Security processes and procedures. Timely response to internal