Client is looking for a Young Afrikaans speaking Security Engineer. This will be a 3-6 month contract. Will Will be involved with: Firewalls Networks Cloud security. Must have: Matric BCom Informatics Degree or experience working with Firewalls, Networks and Cloud Security.
Role Overview:
The Learning Designer Consultant will work closely with our product and programmes
are seeking a highly skilled Learning Designer Consultant to join our team on a freelance basis. This role student base. Role Overview: The Learning Designer Consultant will work closely with our product and programmes
qualification. 8 to 10 years' experience as functional consultant in SAP Logistics Modules ESSENTIAL SKILLS At Logistics processes and set up as a functional IT consultant (process design, customizing and specifications
Our client requires the services of a Software Engineer (Expert) – Midrand/Menlyn/Rosslyn/Home Office Rotation Amazing brand with cutting-edge technology Excellent teams in Global team collaboration High work-life balance with Flexible hours Agile working environment POSITION: Contract until D
functional IT EWM functional consultant. 10 years' experience as functional consultant in SAP Logistics Modules years' experience in SAP EWM as a functional IT consultant (process design, customizing and specifications
Our client requires the services of a Software Engineer (Expert) – Midrand/Menlyn/Rosslyn/Home Office Rotation Amazing brand with cutting-edge technology Excellent teams in Global team collaboration High work-life balance with Flexible hours Agile working environment POSITION: Contract until D
Teamwork and communication skills Knowledge in IT security Knowledge in ITIL processes Any additional responsibilities
in Pretoria is recruiting for SAP BW / SAP SAC Consultant (Advanced) to join their team You will be responsible
Support Consultant, where innovation meets impact At the forefront of global strategy, our Consulting company Requirements 5 years experience as a Support Consultant Experience in Remedy Administration and Remedy complex user requests (e.g. low-code configuration) Security patching, vulnerability remediation Log and Implement