Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to Network experience (TCP/IP, Firewalls, IPS, NAC) Operating System management and Hardening (Windows, Linux Access Management (AD, PAM) Information Security Operations (Security, CISSP will be beneficial) Vulnerability
significant impact in the dynamic world of mining operations? Look no further We're seeking a talented individual architectural integrity and efficiency. Verify operational technologies, systems, and necessary infrastructure Information Systems, Engineering, or a related field. Certification in Project Management: PMI-PM, Agile experience in mining operations, understanding the unique challenges and intricacies of the field. At least 5 Must be fluent in French and English (Congolese national) If you're passionate about leveraging data to
will ensure the smooth functioning of technical operations - someone who will be responsible for helping in Computer Science, Engineering, or a related field. 8-10 years of experience in a senior technical Incorporate new abilities into the day-to-day operational activities to improve the performance of products
reporting, and analytics for our financial services operations. Your expertise in SAP Business Objects, coupled Computer Science, Information Technology, or a related field. If you're a proactive and innovative SAP Business
Requirements: Degree in Information Systems or related field TOGAF certification is beneficial At least 3-5 years'
Degree in Computer Science, Engineering, or related field Software development skills experience (Java preferred)
Computer Science, Information Technology, or related field 3-4 years' experience in managing MS SQL Server
Computer Science, Software Engineering, or similar field. Minimum of 5 years' experience within a development
Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to Network experience (TCP/IP, Firewalls, IPS, NAC) Operating System management and Hardening (Windows, Linux Access Management (AD, PAM) Information Security Operations (Security, CISSP will be beneficial) Vulnerability
Designer A diploma or equivalent in the design field A portfolio of work done to date If you would like