monitoring and resolution of IT Service Management (ITSM) VIP and end-user support requests. Be responsible for Analyse and resolve problem tickets. Experience with VIP and End-user support. Experience with technical documentation
Johannesburg is recruiting for a Regional Specialist Protection Services - for a contract position (Contract the work and overall performance of regional protection services technology systems for all operations physical, and IM service specialists concerning protection services Infrastructure linking to CCTV/ alarm relating to the protection services environment. Manage costs associated with the protection services transparently monthly, global service delivery review with the protection services vendors, with input from the regions
Solutions' external client is looking for a Specialist Protection Services for one of their clients based in Johannesburg requirements. The Specialist Protection Services must have experience in protection services Infrastructure the work and overall performance of regional protection services technology systems for all mining operations physical, and IM service specialists concerning protection services Infrastructure linking to CCTV/ alarm relating to the protection services environment. - Manage costs associated with the protection services transparently
requirements. The Specialist Protection Services must have experience in protection services Infrastructure the work and overall performance of regional protection services technology systems for all mining operations physical, and IM service specialists concerning protection services Infrastructure linking to CCTV/ alarm relating to the protection services environment. - Manage costs associated with the protection services transparently monthly, global service delivery review with the protection services vendors, with input from the regions
network security infrastructure, ensuring the protection of data, resources and systems. The Information and maintaining effective security measures to protect against breaches, viruses, and spyware. Upgrading control structures, and resources to ensure system protection. Developing and executing standardized Information across the organization. Overseeing endpoint protection systems, including Antivirus Software, ensuring 27000-27004, to uphold system security and data protection. Coordinating with all departments and IT users
Design, install and manage security mechanisms that protect the network and information systems against breaches implementing and maintaining security controls; Protect the system by defining access privileges, control timeously; Group policy management; Ensure Endpoint protection (Antivirus Software) is always managed and configured
Design, install and manage security mechanisms that protect the clients's network and information systems against implementing and maintaining security controls; Protect the system by defining access privileges, control timeously; Group policy management; Ensure Endpoint protection (Antivirus Software) is always managed and configured
and upgrade software Create security and data protection settings Build features and applications with
Security: Implement robust security measures to protect sensitive data, including access controls, encryption auditing mechanisms, ensuring compliance with data protection regulations. 4. Best Practices Implementation:
best practices and hardening as it relates to protecting enterprise environments from the latest threat