and Azure DevOps will drive our success. Key Responsibilities: Java Excellence: Leverage Java 8 and above continuous integration. Security Savvy: Implement SSL encryption and other web service security measures. Back-End expertise. Knowledge of SSL encryption and web service security. Exposure to enterprise-wide service integration
IT PO and Team regarding Operational topics Responsible for the needs-based operating process within applications over the entire life cycle in responsibility Ensures the implementation of all tasks and management of the applications in the area of responsibility Controls the implementation of technical lifecycle management measures as well as the identified Security measures for the assigned applications Controls for scalable, distributed systems Security of AWS services, securing design of VPC architectures RESTful
authorisations is essential Any additional responsibilities assigned in the Agile Working Model (AWM) Charter ADVANTAGEOUS SKILLS Authorisations and Security ALE, ARFC, IDocs Preparation of testing documents tests, Integration tests and System Integration Security tests Golive preparation and post Golive support support Incident Management prompt resolution of security and authorization related issues Applications Operations role creations etc. Implement and adhere to SAP security requirements and guidelines within the Framework
report directly to the OCIO Manager and Risk, Security and Compliance Manager. Based in Cape Town. Requirements: Certification in risk, information systems and/or security desired Skills and exposure to tools such as Outlook current IT security processes and procedures, motivate for process improvements and lead small security initiatives Implementation, support and maintenance of IT security compliancy and monitoring technologies and drive Review IT security standards and policies on effectiveness. Building awareness of security controls,
continuous value.
Key Roles and Responsibilities:
a critical role in ensuring the stability and security of our network infrastructure. Your expertise reliability of our IT infrastructure. Key Responsibilities: Oversee and maintain server and network systems Implement solutions to improve system performance and security. Manage the configuration and administration of applications, ensuring that they are updated and secure. Collaborate closely with other Team members, to Directory, PowerShell Scripting, , MS 365, and Network Security. Excellent problem-solving abilities and attention
Knowledge /Qualifications High knowledge in AWS – security groups, permissions, VPC, roles, services. Experience understanding of best practices regarding system security measures Advanced education and application of in team building and project organization. Responsibilities Coordinate/Prioritize the work that the Developers sound security and governance. Coordinate with the cloud COE team for any AWS account level security and Resolve any security findings on your responsible AWS accounts given by group security. Manage the CI/CD
(VDI) Developer, you'll be part of a global team responsible for creating and maintaining virtual desktops workspaces and ensuring top-notch security and performance. Key Responsibilities: - Develop and maintain virtual with international teams to improve stability and security. Skills Required: - Proficiency in Windows Client
General Role Description The IT Architect is responsible for designing, developing, and maintaining the ensuring system scalability, interoperability, and security. The IT Architect provides strategic direction systems and applications. Essential Duties and Responsibilities: Develop and maintain the organization's enterprise hardware, software, networks, data management, and security components. Evaluate and recommend emerging technologies with security teams to ensure that architectural designs and implementations adhere to security best
IT PO and Team regarding Operational topics Responsible for the needs-based operating process within applications over the entire life cycle in responsibility. Ensures the implementation of all tasks and management of the applications within the area of responsibility. Controls the implementation of technical lifecycle management measures as well as the identified security measures for the assigned applications. Controls unsubscribe. Also note, that if you have not received a response from us within 2 weeks, your application was unsuccessful