Cloud Security Engineer to join their dynamic team. Purpose Statement To provide cloud security expertise bank in the world. Key Performance Areas Cloud Security Focus Design and build Infrastructure Solutions Maintain infrastructure 1. Cloud Security Focus Apply cloud security know how to assist in constructing innovation by remaining current with cloud and cloud security technologies to enhance products & services best practices and architectures, focusing on security. 2. Design and build Infrastructure solutions
Datacentrix Cape Town is looking for a Network Security Engineer Purpose of Role : Focuses on the maintenance maintenance, monitoring and management of network security infrastructure and capability (hardware and software support of the Service Delivery Manager and Network Security Operations Manager. Liaises with 3rd party vendors At least 3 years' experience delivering Network Security Services in a customer environment. Excellent
financial services industry is looking for a SAP Security Specialist to join their dynamic company. As a permissions) and ECC HR Security Specialist, you will be responsible for providing security support within the action to reduce risk on the systems. Provide SAP Security support skills to business end users and team of remediation. Manage projects within the SAP Security area. Be responsible for coordination and managing Systems or related would be beneficial. SAP System Security and Authorizations or SuccessFactors certification
Cloud Security Engineer to join their dynamic team. Purpose Statement To provide cloud security expertise bank in the world. Key Performance Areas Cloud Security Focus Design and build Infrastructure Solutions Maintain infrastructure 1. Cloud Security Focus Apply cloud security know how to assist in constructing innovation by remaining current with cloud and cloud security technologies to enhance products & services best practices and architectures, focusing on security. 2. Design and build Infrastructure solutions
years of experience in a similar role. Command your ship with expert knowledge of data analysis and visualization reports on key performance indicators, guiding our ship to success under the watchful eye of senior management to make our data analysis ship sail faster and further. Captain your ship through stormy predictive model future trends and outcomes with precision. Steer our ship toward the shores of profitability growth, using trends into actionable recommendations, guiding our ship to victory. Keep your spyglass trained on the horizon
Location : Kenilworth, Cape Town Work model: In office Salary : Negotiable based on experience Benefits SSDT Have experience defining database server security, user creation, roles and permissions. This role
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints and features. Strong understanding of endpoint security and compliance. Experience of application packaging
across trading offices, including requirement gathering, documentation, and user security configuration Power BI, and SQL. Enforce Change Management and Security protocols, ensuring compliance with Sarbanes-Oxley
business goals to ensure that solutions are scalable, secure, and compliant with industry standards. Additionally ong understanding of network architecture and security protocols