well-established company based in Midrand is looking for a Training Coordinator to join their team Minimum Education: but is not limited to the following: Identify training needs within the organisation through consultation and employees. Design, develop, and implement training programs and materials based on identified needs and available resources. Schedule and coordinate training sessions, workshops and seminars. This involves managing logistics. Assess the effectiveness of training programs through feedback surveys, evaluations
the following:
Training Academy Administrator My client in the Medical Legal Administration industry is looking for for a Training Academy Administrator Their services include expert development, attorney and expert forums following skills: Learning and Development - strong training skills Social Media Management will be advantageous extra mile Minimum requirements: Matric (Grade 12) Training/Education exposure preferred More detail on duties: forums, CPD courses, internal trainings and trials Identifying training needs SOP development Team building
well-established company based in Midrand is looking for a Training Coordinator to join their team Minimum Education: but is not limited to the following: Identify training needs within the organisation through consultation and employees. Design, develop, and implement training programs and materials based on identified needs and available resources. Schedule and coordinate training sessions, workshops and seminars. This involves managing logistics. Assess the effectiveness of training programs through feedback surveys, evaluations
Architecture components of workstream B) Cloud Security Posture Management (CSPM) - onboarding, remediation workstream (same resource as A) above C) SbD Cloud Security Assurance Improvements workstream 1 x Resource as A) above D) DevSecOps workstream Container Security workstream 1 x Resource required to support and above E) CSB/CSB workstream related to cloud security controls 1 x Resource required to support and above F) IB (International Business) Big Data Security 1 x Resource required to support and steer Architecture
Cyber Security Solution Architect (Midrand) 2023/12/11 Reference Number LT-201 Description Role Purpose and or diverse security requirements. This includes security adoption plans, security architecture and design, responding to tenders, enabling cyber security resiliency using solutions that consider best situational awareness, learning and evolving. Security Solution Architects further guide architecture architecture discussions and the deployment thereof in security environments. Lastly, they provide hands-on business-oriented
Security Architect Manager Location: Midrand, South Africa About Accenture Accenture is a leading global deliver digital solutions and transformation. Security Architect Are you ready to be part of a transformational a talented Security Architect who will play a crucial role in providing technical security advice and guiding them towards security best practices. Responsibilities Providing security advice, requirements ensuring that security is integrated into the development process from the outset. Performing security-focused
Bachelor's degree in computer science, information security, or a related field (or equivalent experience) Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager information security roles, including network security, system security, or application security. Strong Strong knowledge of security technologies, protocols, tools, risk management principles and methodologies. automation and analysis. Familiarity with cloud security concepts (e.g., AWS, Azure, Google Cloud). Excellent
hire the services of an Independent Contractor Security Network Engineering Lecturer at our Midrand campus qualifications required: Masters Degree in IT (Security and Network Engineering) Experience: Relevant
Reference: JHB002467-TR-1We are recruiting for a IT Security Specialist Consultant. Assist with configuration for proper security reporting in theenvironment.- Review the audit findings report on security and advise potentialsecurity threats.- Identifying possible security threats and determining the best securitymeasures securitymeasures.- Suggesting improvementsto existing security systems.- Assess an organization's IT infrastructure current references for the provision of Information Security services in the last 5 years.- Minimum 3 years