qualification Microsoft or AWS CompTIA A, N and S (security) Coding / Programming experience e.g., Java, Linux Networking Experience & knowledge with cyber security Knowledge of OT-based network protocols Valid
with the principles and practices of Information Security Management. It is incumbent on all employees to understand the policies of the company in ensuring the security of all information within the business. Supporting supporting tools to comply with and manage information security risks; ROLE REQUIREMENTS (KEY PERFORMANCE AREAS):
with the principles and practices of Information Security Management. It is incumbent on all employees to understand the policies of the company in ensuring the security of all information within the business. Supporting supporting tools to comply with and manage information security risks; ROLE REQUIREMENTS (KEY PERFORMANCE AREAS):
business development activities to identify and secure new clients and job orders. • Source and screen
business development activities to identify and secure new clients and job orders. • Source and screen
procedures. • Negotiating on behalf of the business to secure optimal value. • Negotiating with third parties
procedures. • Negotiating on behalf of the business to secure optimal value. • Negotiating with third parties
accuracy and manage stock movements · Monitor security in the warehouse and eliminate stock theft · Interpret
accuracy and manage stock movements · Monitor security in the warehouse and eliminate stock theft · Interpret
industries ((Nuclear, Steel, Energy, Health, Education, Security, Mining, Medical, Food, Transport.) Good understanding