environments - Legacy Environments - Security • Excellent time management, communications, decision-making
Kubernetes architecture, Networking, Security, Deployment, and Management 3 years Infrastructure as code (IaC)
considering security, operational, and business requirements. Implement Vulnerability management framework considering security, operational, and business requirements. Conduct regular patch management and vulnerability
considering security, operational, and business requirements.
Implement Vulnerability management framework
considering security, operational, and business requirements.
standards of integrity, security, and customer satisfaction. This will include managing audit findings, fraud
My client in the government sector is looking for Document Management (Open Text) x2
Location: Onsite, Pretoria
Contract Duration: 3 year project
Start: TBC
Requirements
SAP certified with a minimum
governance strategy for sound security governance across the entity Actively managing risks on the Cyber Risk
migrations. Strong background in SAP security and compliance management. Demonstrated expertise in performance
Kubernetes architecture, Networking, Security, Deployment, and Management.
quality, data lineage, data security, data privacy, data lifecycle management, data issue remediation and