industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and
financial services industry is looking for a SAP Security Specialist to join their dynamic company. As a permissions) and ECC HR Security Specialist, you will be responsible for providing security support within the action to reduce risk on the systems. Provide SAP Security support skills to business end users and team of remediation. Manage projects within the SAP Security area. Be responsible for coordination and managing Systems or related would be beneficial. SAP System Security and Authorizations or SuccessFactors certification
Xcede Senior Software Developer The Software Development Team delivers solutions on a global basis. They They provide reliable, stable, scalable, robust, secure and continually evolving high-volume transaction High Usability Factor; is Reliable; has Effective Security and is Maintainable. Testing, verification and
Xcede We have a current opportunity for a Senior Data Analyst on a permanent basis. The position will will need to go to the office every now and then for meetings, etc.) This Senior Data Analyst position
industry is looking for a Cyber Security Specialist. The role of the Cyber Security Consultant: Operations will form part of the team which focusses on Cyber Security Operations services to businesses on the Shared the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting required to report on the status of the cyber security control environments on a weekly, monthly and
efficiency during peak periods of usage; consider security at its highest level (third-party attacks; data