Purpose of the Job: The Compliance Officer will report to the Key Accounts Manager. The primary responsibility of the Compliance Officer is to ensure that Security Personnel are in full compliance with standard Company Policies/Procedures/Regulations/Requirements. Further, to ensure our service deli
Reference: DUR002986-SN-1 Our client, a dealer of automotive parts, seeks a professional Operations Manager to co-ordinate and oversee the operations. You will implement the right processes and practices across the organisation, which includes formulating strategy, improving performance, procuring m
Reference: DUR002986-SN-1 Our client, a dealer of automotive parts, seeks a professional Operations Manager to co-ordinate and oversee the operations. You will implement the right processes and practices across the organisation, which includes formulating strategy, improving performance, procuring m
Description Our client is seeking a Security Director to join their team, based in East London or Johannesburg. Successful candidate will play a critical role in safeguarding the organization, its assets, and personnel. Will be required to lead and manage security operations, policies, and procedure
Description Our client is seeking a Security Director to join their team, based in East London or Johannesburg. Successful candidate will play a critical role in safeguarding the organization, its assets, and personnel. Will be required to lead and manage security operations, policies, and procedure
Information Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known
Information Security Operations (Security, CISSP will be beneficial) Vulnerability Management (use of well-known
ountable to I&O Operations SpecialistSecurity and User Management:
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework and standards of operations, designing, and enforcing policies & procedures to protect the computing infrastructure from all forms of security breaches, as well as the identification of v
Risk Compliance (GRC) Security operations Security posture management Must have experience implementing