Our Client a Global Tech firm is seeking an ACR Solution Architect to join their team in Durban on a Contract basis. They offer stability, growth and a great working environment. The primary responsibility of the Solutions Architect is to consult with the client and work with internal teams to creat
Our Client a Global Tech firm is seeking an ACR Solution Architect to join their team in Durban on a Contract basis. They offer stability, growth and a great working environment.
The primary responsibility of the Solutions Architect is to consult with the client and work with internal teams
/> Academic Qualifications and Certifications:
Our Client a Global tech firm is seeking a SAP EWM Consultant to join their team in Johannesburg on a contract basis. They offer stability, growth, attractive rates and a great working environment. Note this is an onsite based position with travel requirements nationally as and when required.
results Academic Qualifications and Certifications: Degree in Technology and/or Business Management Relevant
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite Fulltime) on a contract basis. They offer stability, growth, attractive rates and a great working environment.
Key Roles and Responsibilities:
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite Fulltime) on a contract basis. They offer stability, growth, attractive rates and a great working environment. Key Roles and Responsibilities: Determine who requires access to which informati
Reference: PE010794-Podu-1 Cyber Security Specialist Key Roles and Responsibilities: Determine who requires access to which information & Plan, coordinate, and implement information security programs. Help protect against Web threats that facilitate cyber-crime like malware, phishing, viruses, d
Reference: PE010796-Tabz-1 Our client is looking for a Cyber Security Specialist for a 12 month contract based in the East Rand. The incumbment will determine who requires access to which information & Plan, coordinate, and implement information security programs. Determine who requires access t