operations. The CIO will oversee the use of Information technology (IT) in our company. You will be the advantage. Analyse the costs, value and risks of information technology to advise management and suggest actions
Reference: ITE006087-DEP-1 Are you a Sage X3 expert looking for a new challenge? A well established wealth management company is looking for an ERP consultant to manage and implement their Sage X3 and Sage 300 platform. They will be responsible for the project management, implementation and configur
advantage Analyse the costs, value, and risks of information technology Matric BSc Degree: Computer Science
in the FinTech space is looking for a Chief Information Officer (CIO) to join their ever growing, fast any other suitable roles / position For more information contact: Mel Nandalall Senior IT Recruitment
Description Division: Sales and Marketing Position Overview: We are seeking a self-driven and motivated individual to join our Sales and Marketing Division. The successful candidate will play a pivotal role in increasing market share for our ID products, including Commercial TVs, Monitors, Signage,
Reference: ITE006140-DEP-1 Are you an Information Security Officer looking for your next new challenge well known automotive company is looking for an Information Security Officer (ISO) to join their team. The all-encompassing security program to protect information assets and technologies. As the main advisor strategies and resource allocation, ensuring proper information security governance, and crafting policies to Develop, implement, and maintain comprehensive information security policies, procedures, and standards
Division: Sales and Marketing
Position Overview: We are seeking a self-driven and motivated individual to join our Sales and Marketing Division. The successful candidate will play a pivotal role in increasing market share for our ID products, including Comm
By submitting any Personal Information to MPRTC in any form you acknowledge that such
such Personal Information by MPRTC and/or MPRTCs clients and/or verification information suppliers. You
right to request us to delete your personal information by contacting us.
maintaining the confidentiality of sensitive information while working with a variety of technologies various methods attackers could use to exploit information security vulnerabilities. Complete threat assessment security. A formal qualification in information technology/computer information systems or related would be ideal
advantageous