output requirements from an operational perspective
· Ensure Risk is managed and Grievance procedures
Desirable:
Our client in Pretoria is recruiting for Full Stack Developer (Expert) to join their team Development and maintenance on platform/application Review and present proposed system solution to IT Project Manager / Leader and User Management or System owner Develop systems solutions in line with quality
Reference: JHB000547-KM-1 Our client in the telecommunication sector is looking for a professional Principal Specialist: Cyber Security contract role for 12 months. Desirable: An industry certification e.g. ISO 27001 Lead practitioner, DEVSECOPS, CCSP CGEIT, CRISC, CISA, CISM and CISSP is strongly p
development and operations workflows, fostering a culture of innovation and efficacy. Risk Management Assess potential
development and operations workflows, fostering a culture of innovation and efficacy. Risk Management: Assess
Job Purpose: Lead the Security Engineer team and direct the Information security Engineering designs, implementations, monitor & evaluate all technical delivery from the team, strengthen and advises customers and the Engineering team on the security systems' maturity and resilience posture for p
Our Client in the Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 months. This role will allow you to gain experience in working with one of the largest telecommunications companies in South Africa.
The ideal candidate to come from o
Our Client in the Telecommunications industry is hiring for a Cyber Security Specialist as an Independent Contractor for 12 months. This role will allow you to gain experience in working with one of the largest telecommunications companies in South Africa. The ideal candidate to come from or worked
Our client is seeking an experienced and highly skilled Cyber Security Principal Lead/Specialist to oversee their cyber security strategies and initiatives within the financial services, insurance, and lending sector. The ideal candidate should have a deep understanding of cyber security practices a