constantly scanning, watching… You must be in Cyber Security. Our client, a major player in the renewable energy generation capacity, is looking for a Senior Cyber Security Engineer to join their team. Crucial to accepting firewalls Forigate Juniper Aruba Microsoft Azure security M365 Defender Sentinel SIEM Intune This role is is akin to working for a national security team. We are looking for the best of the best to safeguard Design, manage, configure, and maintain security for Azure Security and M365 Follow change control processes
Certified Network Professional (CCNP) Security Engineer looking for an exciting opportunity motivated individual to join our team. As a CCNP Security Engineer, you'll play a crucial role in designing designing, implementing, and managing secure network infrastructures for our clients.
What
Network Security.
bays/signage issues) Responsible for monitoring security and cleaning staff at your assigned buildings complaints. Completing signage forms and following up Security site visits (when complaints get to much) Dealing contractor/Lessee. Prepare Rent rolls for Bank/Agents Logging Eskom/City of Cape Town issue tickets – for the buildings
and stock reconciliations including proper investigation of all outstanding issues to ensure a timely
pricing sources for corporate actions to ensure securities are updated and valued correctly on the accounting
timely delivery of the NAVs
Proactively investigate queries with dealers; brokers; custodians; auditors
environments.
Participate in continual investigation into best practices, methodologies and tooling
relevant disciplines. Documentation of the investigation is compulsory.
Work with Linux advance
and use proper rules to ensure it is a clean and secure implementation.
What will make
integrations.
shared services, ensure Cyber and Information Security resilience, and act as technology governance and Kubernetes environments. Participate in continual investigation into best practices, methodologies and tooling relevant disciplines. Documentation of the investigation is compulsory. Work with Linux advance implementations and use proper rules to ensure it is a clean and secure implementation. What will make you successful in manage cluster integrations support applications security - cluster & applications Qualification and
shared services, ensure Cyber and Information Security resilience, and act as technology governance and environments.
What will make
integrations
application monitoring. Assisting in the constant investigation and configuration of the monitoring solution to obtain best value for Business. Continual investigation into best practices, methodologies and tooling disciplines. Documentation of the aforementioned investigation is compulsory. Assist Change, Incident, Project manage cluster integrations support applications security - cluster & applications Qualifications Grade
and stock reconciliations including proper investigation of all outstanding issues to ensure a timely pricing sources for corporate actions to ensure securities are updated and valued correctly on the accounting the Net Asset value calculation Proactively investigate queries with dealers; brokers; custodians; auditors
and stock reconciliations including proper investigation of all outstanding issues to ensure a timely pricing sources for corporate actions to ensure securities are updated and valued correctly on the accounting the timely delivery of the NAVs Proactively investigate queries with dealers; brokers; custodians; auditors