applications/affidavits/ documents for CCMA processes Represent the company at the CCMA/BC - in line, conciliation experience of retail industry Experienced at representing at the CCMA Solid knowledge of disciplinary applications/affidavits/ documents for CCMA processes Represent the company at the CCMA/BC - in line, conciliation experience of retail industry Experienced at representing at the CCMA Solid knowledge of disciplinary
tax related projects. Stakeholder Engagement Represent the Group on industry bodies and forums; Engage tax related projects. Stakeholder Engagement Represent the Group on industry bodies and forums; Engage
tax related projects. Stakeholder Engagement Represent the Group on industry bodies and forums; Engage tax related projects. Stakeholder Engagement Represent the Group on industry bodies and forums; Engage
queries Administration, as and when required Always represent the TFG image and values Qualifications and Experience: queries Administration, as and when required Always represent the TFG image and values Qualifications and Experience:
queries Administration, as and when required Always represent the TFG image and values Qualifications and Experience: queries Administration, as and when required Always represent the TFG image and values Qualifications and Experience:
their goals. Deep understanding of software architecture, design patterns, and best practices, with hands-on their goals. Deep understanding of software architecture, design patterns, and best practices, with hands-on
their goals. Deep understanding of software architecture, design patterns, and best practices, with hands-on their goals. Deep understanding of software architecture, design patterns, and best practices, with hands-on
Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data
security. Design and implement secure network architectures, adhering to principles like the Zero Trust security. Design and implement secure network architectures, adhering to principles like the Zero Trust
Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data