services and solutions to their clients, helping to secure and enhance their IT reputations. The successful the Training Manager. Interns form part of a 12-month internship programme where they are trained up to Admin, member of the Drawing Team, part of the Centre of Excellence or a Solutions Specialist. We are
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints policies, and procedures. Create user guides and training materials to educate end-users on Intune functionality
shared services, ensure Cyber and Information Security resilience, and act as technology governance and background in end user endpoint management, end-point security, and a thorough understanding of Microsoft Intune 2. Endpoint Management: Implement and enforce security policies and compliance standards on managed endpoints and seamless deployment. 4. Security and Compliance: Implement security best practices to protect endpoints policies, and procedures. Create user guides and training materials to educate end-users on Intune functionality
Comprehensive Training : Dive deep into every facet of IT with our structured training programs designed systems and technologies. Support IT Security: Assist in IT security measures, including monitoring, compliance
services and solutions to their clients, helping to secure and enhance their IT reputations. The successful technical material • Collaborate with Development, Training and Solution teams • Proficient in English verbal
services and solutions to their clients, helping to secure and enhance their IT reputations. The successful investigations based on customer requirements • Technical training and support of customers on management systems Database of monitored objects maintained • Technical training and support of customers on management systems report • Monthly network health report for the data centre • Daily change meeting (8AM) – updates on sites
tool users Build strong relationships with Cyber security teams Assist with enforcing risk-related policy presentation Technical experience in the information security domain would be beneficial. Qualifications 3yr either Risk or Security or related IT field (min NQF 7) Accredited Certification in Risk/Security beneficial
business user needs. Perform database transaction and security audits. Establish appropriate end-user database issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot
and use proper rules to ensure it is a clean and secure implementation. The following would assist a successful and software Financial advice and support System security Advanced analytics to address business requirements
business user needs. Perform database transaction and security audits. Establish appropriate end-user database issues, log shipping issues, connectivity issues, security issues etc. Ability to detect and troubleshoot