equivalent
Company requires a SAP Security Specialist to be responsible for providing security support within the SAP and allocate SAP Security JIRA requests. Handle incident management and resolve security issues per SOP's solutions for complex SAP Security issues via SAP OSS. Assist with security requirements during SAP system projects within SAP Security. Serve as the SAP Security SME for the end-to-end security lifecycle. Matric complex security issues in S4 HANA, Fiori, Business Objects, and Solution Manager ChaRM. S/4H security/authorisations
Datacentrix Cape Town is looking for a Network Security Engineer Requirements: Matric or Grade 12 Essential equivalent FortiGate NSE4 or equivalent Cyber Security Certification Awareness to strict IT Policies
efficiently Handling technical escalations: serve as a key point of contact for high-level technical escalations speed, and overall service quality Compliance and security: ensure compliance with industry standards and and maintain high standards of network security to protect company data and privacy What you'll need Minimum Uptime Kuma or Wireshark Security practices: knowledge of network security protocols and devices, including comfortable working both in the field and in the office, willing to step out of traditional roles to meet
Additionally, they will manage the network to ensure security, performance, and availability, collaborating Manage the organization's network, including its security, performance, and availability. Monitor and troubleshoot tasks and priorities. A strong understanding of IT security principles and best practices. A commitment to
upgrade software products Perform related ad hoc tasks Key Requirements: Computer literate with strong technical packages Symbol scanner experience Proficiency in MS Office Accounting knowledge Finance and logistics experience
accept it, will involve:
Crafting secure and scalable applications that can withstand the
platforms such as Azure and AWS an advantage. Security: Understanding of surfaces of attack, how to minimize vulnerabilities and in general maintaining high standards of security to protect systems from cyber attacks Required
equivalent. Additional certifications in network security or cloud technologies. 1-3 years of professional
you choose to accept it, will involve: Crafting secure and scalable applications that can withstand the