Seeking a suitable Ops Supervisor for m medium-sized freight forwarder.
You will be responsible
responsible for overseeing operations - sea & air imports.
Customer-centric focused and ability
experienced Trackless Supervisor Operations. As a Trackless Supervisor Operations, you will be responsible the efficient and safe operation of trackless equipment in the mining operations. Responsibilities: Supervise Supervise the operation of trackless equipment, ensuring compliance with safety regulations and company maximize equipment reliability. Oversee a team of operators and technicians. Provide technical support and maintenance activities. Requirements: Grade 12 Shift Supervisor Certificate of Competency Blasting Certificate
experienced Trackless Supervisor Operations. As a Trackless Supervisor Operations, you will be responsible the efficient and safe operation of trackless equipment in the mining operations. Responsibilities: Supervise Supervise the operation of trackless equipment, ensuring compliance with safety regulations and company maximize equipment reliability. Oversee a team of operators and technicians. Provide technical support and maintenance activities. Requirements: Grade 12 Shift Supervisor Certificate of Competency Blasting Certificate
DEPARTMENT OF INFORMATION TECHNOLOGY SERVICES TRAINING MANAGER (IT) PEROMNES POST LEVEL 8 The successful responsibilities will include, but are not limited to: Operational training management: Refine and optimise the strategic objectives through IT initiatives and operational activities; People management: Effectively manage the Finance Department; Information security management and governance: Co-operate in compilation, testing testing and execution of the information governance and disaster recovery controls; Document processes, procedures
in the HR solutions field.Â
The Chief Technology Officer (CTO) will provide sound technical leadership vision and leading all aspects of the Group’s technology development. The position will include overseeing overseeing all technical aspects and technological resources of our organisation for the purpose of organisational establishing a technological vision for an organisation and leads the company's technological development stakeholders and customers to ensure our company’s technologies are developed and used appropriately.
NEW EMPLOYMENT AVAILABLE Title: D365 Information Systems Analyst Area: Gauteng Industry: Group IT Department (Negotiable) An opportunity for an experienced D365 INFORMATION SYSTEMS ANALYST (with Microsoft Systems certification) the link between the business and IT, ensuring information systems requirements are delivered upon through supporting information systems. Execute and manage information systems projects Review information systems their technical feasibility. Execute and manage information systems related projects, ensuring each project
mechanisms that protect the company's network and information systems against breaches, viruses, and Antispyware;
resources;
- Develop and implement standardised Information Security processes and procedures;
- Respond
managed and configured properly;
- Ensure Information System compliance and conformance to IT policies
assessments;
- Research, plan, and implement information security technical solutions to meet business
Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy
MINIMUM REQUIREMENTS » National Diploma in Information Technology or relevant equivalent qualification at
protection of data, resources and systems. The Information Security Specialist will be required to execute protection. Developing and executing standardized Information Security processes and procedures. Timely response management. Responsible for guarantee compliance of Information Systems with IT policies and processes. Adhering measures. Researching, planning and executing information security solutions to meet business needs. Proactively governance and security National Diploma in Information Technology or relevant equivalent qualification ITIL
mechanisms that protect the clients's network and information systems against breaches, viruses, and Antispyware; resources; Develop and implement standardised Information Security processes and procedures; Respond to always managed and configured properly; Ensure Information System compliance and conformance to IT policies vulnerability assessments; Research, plan, and implement information security technical solutions to meet business Proactively monitor, investigate, and report on information security incidents, Internet use, and ICT policy