(Computers, hardware, software (Operating system, Office, apps, etc) ISP Manage with 3rd party providers development (HTML, CSS, ect.) Antivirus & Security. Commensurate with experience. Benefits Provided
growing team. Please note: this is a shift based in-office role. As a Web Developer, you are here to take data moves smoothly and company website remains secure and trusted by users Troubleshooting issues as
upgrades, perform regular backups, and ensure data security. A confident individual with excellent IT Acumen Knowledge of network protocols, TCP/IP, and network security Proficiency in operating systems such as Windows
for outsource partners. Offices centrally located in Briardene – secure office environment and parking operating across the country serviced from Head Office in KZN. The majority of the IT needs, complexity
professionals to ensure the efficient operation, security, and optimization of end-user computing systems standards, security policies, and budgetary constraints. •Implement and enforce security measures to
ensure data quality, reliability, accessibility, security and governance Design, develop, and maintain end-to-end frameworks Optimize data performance, scalability, and security. Provide technical guidance and support to data
Personal Information for the purposes of potentially securing employment. As an applicant you agree to make information required for the purpose of potentially securing employment and you understand and agree that should
dissemination of information. Ensure that the security of the information systems is paramount in the lifecycle in adherence to all corporate cyber security standards Lead and manage the application development
dissemination of information. Ensure that the security of the information systems is paramount in the lifecycle in adherence to all corporate cyber security standards. EDUCATION, EXPERIENCE & TRAINING:
ideal candidate must be willing to travel to the office daily. Responsibilities: Data Analysis and Modelling: regulations and best practices Develop and enforce data security protocols Requirements: Degree in Computer Science