supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
Online, and Teams. Solid understanding of cloud security principles and best practices. Excellent troubleshooting including virtual networks, VMs, storage, and security features. Configure and manage Azure Active Directory device management (MDM) and endpoint management and security. Administer Microsoft 365 applications and services and optimize cloud infrastructure performance, security, and cost efficiency. Troubleshoot and resolve
a critical role in ensuring the stability and security of our network infrastructure. Your expertise Implement solutions to improve system performance and security. Manage the configuration and administration of applications, ensuring that they are updated and secure. Collaborate closely with other Team members, to Directory, PowerShell Scripting, , MS 365, and Network Security. Excellent problem-solving abilities and attention
tests, integration tests and system integration security tests. Go-live preparation and post go-live support support. Incident Management prompt resolution of security and authorization related issues. Applications role creations etc. Implement and adhere to SAP security requirements and guidelines within the framework Working Model (AWM) Charter. Authorisations and Security. ALE, ARFC, IDocs. Preparation of testing documents
speed, and overall service quality Compliance and security: ensure compliance with industry standards and and maintain high standards of network security to protect company data and privacy What you'll need Minimum Uptime Kuma or Wireshark Security practices: knowledge of network security protocols and devices, including comfortable working both in the field and in the office, willing to step out of traditional roles to meet
new fields, entities, workflows, or adjusting security settings.
ensuring system scalability, interoperability, and security. The IT Architect provides strategic direction hardware, software, networks, data management, and security components. Evaluate and recommend emerging technologies with security teams to ensure that architectural designs and implementations adhere to security best
Engineer (Advanced) - Midrand/Menlyn/Rosslyn/Home Office rotation. Amazing brand with cutting-edge technology Systems local and remote administration and Microsoft Office applications. Strong problem-solving skills with adherence. Ensuring that applications are compliant, secure, and operational, using tools such as CMDB, Active adherence. Ensuring that applications are compliant, secure, and operational, using tools such as CMDB, Active Systems local and remote administration and Microsoft Office applications. Strong problem-solving skills with
in designing, developing, and managing scalable, secure, and robust cloud infrastructure that supports >
in designing, developing, and managing scalable, secure, and robust cloud infrastructure that supports Responsibilities: Design, develop, and manage scalable, secure, and robust cloud infrastructure on AWS. Implement Terraform, CloudFormation, or similar. Ensure security best practices are implemented and maintained