The following NEW positions exist in Pretoria . To provide support to the Sales Team with the provision of technical support to customers for the AOS products within the given territory. Develop profitable and sustainable relationships with clients and adhering to all legal, regulatory and complianc
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework negotiable Certified Information Systems Security Professional (CISSP) CISM – Certified Information Security Manager Manager. CISA – Certified Information Systems Auditor - preferable. CDPSE – Certified Data Privacy Solutions years Experience in: Implementation and managing information security solutions in the following environments: ) Oracle EBS Oracle Fusion Cloud Developing information security policies and procedures. Cybersecurity
Minimum requirements for the role:
problem-solving skills. Attention to detail. Internship, Development, Graduate, SDLC
designs for building specifications and new technology implementations. Includes applicable factory
both the Chief Operating Officer, the Chief Information Officer (CIO) is a member of the UJ Executive leadership to advance and elevate the work of the Information and Communications Systems (ICS) division. The The CIO manages and oversees the information technology (IT) strategy, policies, and operations within or she plays a critical role in ensuring that technology supports the academic and administrative functions operational, and administrative oversight of the Information and Communication Systems (ICS) Division. The
managing client inquiries, providing product information, and delivering exceptional customer service
The following NEW positions exist in Pretoria . To provide support to the Sales Team with the provision of technical support to customers for the AOS products within the given territory. Develop profitable and sustainable relationships with clients and adhering to all legal, regulatory and complianc
Junior Cybersecurity Co-ordinator with prior internship experience in the field. This is an excellent implementation of security measures to protect information systems and networks. - Conduct vulnerability prepare technical reports for management. - Prior internship experience in cybersecurity is required. - Currently recently completed a degree in Cybersecurity, Information Technology, Computer Science, or a related field. Familiarity with various security tools and technologies (e.g., firewalls, intrusion detection systems
advantage:
MS Server 2016 / 2019 / 2022
SQL 2014/2017/2019
MS IIS 8, 8.5, 10
Routing Apps & Remote Desktop)
Virtualisation Technology
Office 365 product set
CORE