Reference: NWA003523-NBh-2 Just as a vault protects a bank's treasures, the IT Security Administrator knack for thwarting digital bandits and keeping our assets secure. Key Responsibilities: Develop, implement such as firewalls, VPNs, IDS/IPS, and endpoint protection. Experience with security information and event
by understanding and effectively using standard office equipment and standard software packages, while providing technical guidance as needed. Advanced MS Office Skills., Different database environments e.g. DB2 technical guidance when required to acquire, organise, protect and process data to fulfill business objectives
in person and remotely), as well as managing IT assets and software licenses. Key Responsibilities: Hardware: training as required. Manage and update the IT asset register. Software: Install and manage relevant
transactions with vehicle override card usage. Review asset capacity exceptions and reconcile discrepancies the OptiMIM Database. Run reports to identify new assets and reconcile data with onsite information; address
missing transactions, and system alarms. Conduct asset capacity checks and reconciliation tasks. Maintain database by removing inactive vehicles and updating asset lists. Generate and distribute various operational
ITE006037-SAN-1 Our client, the world's largest cash and asset conversion service provider with multiple locations in sprint planning sessions at the company head office when required. Writing clean, efficient, and accurate
BIT002978-Muld-1 IT Technician needed in KZN, in-office. Own reliable transport is a must. Growth opportunities Support Customer Infrastructure MS Server Support Office 365 Support Desktop Support Qualifications & & Remote Desktop Virtualisation Technology Office 365 Product Set Own reliable transport is a non-negotiable
Develop tactical plans for optimizing resources and assets managed within the department. Manage and report
standards. Maintain adherence to data privacy and protection guidelines. Create and update technical documentation
regulations and standards. Uphold data privacy and protection guidelines at all times. Develop and update comprehensive