optimal database parameters and establish data security rules. They will design the database, including management, and administering user access and security. Oversee version migrations, program updates, acceptance testing, while adhering to group norms, security, and licensing policies. Oversee IT infrastructure
setup, deployment, management parameters, and data security rules. They will also design the Citrix infrastructure functionalities; administer user access and data security; handle version migrations, updates, and bug fixes; projects, ensure compliance with company norms, security, and licensing policies, manage contracts and
with engineering regulations, EHS standards, site security, and 5S housekeeping. You will lead continuous
with engineering regulations, EHS standards, site security, and 5S housekeeping. You will lead continuous
resources through effective capacity planning. Manage security vulnerabilities, backup, disaster recovery strategies
Certifications in cybersecurity (e.g., CompTIA Security) If you possess the skills and experience required
applications and Networking Knowledge of basic security practices Documentation, Backup and recovery skills
with precision, ensuring compliance is our forte. Secure letters of good standing from SARS, affirming our
and records, ensuring data confidentiality and security, handle incoming and outgoing communications,
and records, ensuring data confidentiality and security, handle incoming and outgoing communications,