...tests / performance testing by developing and executing, tests, automation scripts and procedures, handle load and scale:
• Ensure securely robust solutions (security context).
• Manage all cross-cutting non-functional architectural concerns for applications.
•...
...JOB TITLE:
Platform Support Engineer- Cloud Security and Optimization
LOCATION:
Stellenbosch
ABOUT CYBERLOGIC:
Cyberlogic is a trusted Managed Solutions Provider focusing on optimising cloud infrastructure and cyber security. Our just cause is to enable...
...and Processes:
Enhance and automate financial systems.
Implement internal controls and risk management strategies.
Oversee SAP year-end closing and continuous process improvements.
Personnel Management:
Lead and develop the accounting team.
Provide training...
...South Africa.
Responsible for leveraging negotiation skills to secure beneficial terms, employing data analytics for strategic... ...and oilseed environment will be an advantage.
~ Experience in SAP/ERP Procurement solutions (S/4HANA MM, Ariba…) will be beneficial...
...enhancements and automation.
Desirable skills:
Completed SAFEX examination: Agri Market Dealers.
Exposure to the grains industry.
SAP experience.
Experience using an ERP system.
Join their team and be part of a company that values excellence in execution and...
..., working within the parameters and guidelines related to profitability and rates.
Coordinate pricing and equipment capacity to secure equipment options and power.
Ensure the system contains complete and accurate details of the order.
Notify the customer of any...
...Manager to their Stellenbosch based team.
Three plus years experience in overseeing the maintenance function in a similar environment secures.
A wonderful career opportunity awaits you.
POSITION INFO:
Requirements:
~3 plus years' experience in overseeing the...
...SUMMARY:
-
POSITION INFO:
We are looking for a competent Security Supervisor to undertake the surveillance of our premises and protection of our staff and visitors. You will be responsible for detecting any suspicious behavior and preventing vandalism, thefts...
...documents.
Engage with board members, residents, and other stakeholders to maintain positive relationships.
Oversee maintenance, security, and infrastructure management.
Review and manage vendor contracts and service providers.
Implement risk management...
...opportunities for process improvement, operational efficiencies, and revenue
optimization based on data analysis.
Data Governance and Security:
Ensure compliance with data governance policies, data protection regulations, and security
Adhere to data privacy and...
...integrity, monitor performance, and evaluate complex information from various sources. Develop processes for optimizing database security, manage database access, troubleshoot errors, and recommend emerging database technologies.
Custom Data Models : Develop custom...
...Database Design and Administration:
Design, implement, and maintain databases to support the organization's data needs.
Ensure the security, availability, and reliability of databases through monitoring, backup, and recovery procedures.
Tune database performance to...
...technologies:
Workflow engine: Activiti
Micro service (REST): Micronaut, JAX-RS
Cloud Cross platform framework: Electron
Security framework: Apache Shiro
Queue processing: Apache ActiveMQ Artemis
Document store: MongoDB
Reporting server: Jasper...
...Services Invites You to Explore Possibilities. We are seeking a dynamic and results-driven Account Manager with expertise in Cyber Security to join our team. The successful candidate will play a pivotal role in managing client relationships, driving sales, an......
...Networking and cabling - ensure consistent high standards throughout the group
â Connectivity. Data, voice, telephony
â Desktop security (including antivirus, patch management)
â User security awareness and training
â Desktop support services
â...
...SUMMARY:
-
POSITION INFO:
SAP BI Developer
R750k plus Bonus
Cape Town
Excellent career opportunity with global... ...and industry practices for data quality, integrity, accuracy, and security.
Key Performance Areas
Work in collaboration with cross-functional...
...data requirements necessary to support business requirements or integrated application and subject areas.
Identify and define the security requirements necessary to protect the data items.
Identify and define the business rules associated with the data; these should...
...This company is a leader in its industry, showing its great skill by creating top-notch solutions for different fields like defense, security, and mining, both in our country and around the world. They're really dedicated to pushing technology and innovation to new limits...
...insights into business operations. Implementation of our platform within a client's organization is swift and effortless. Fully managed, secure, scalable, and globally accessible, this system is adaptable across industries and systems, supported by comprehensive API...
...SUMMARY:
-
POSITION INFO:
We are currently seeking a skilled SAP ABAP programmer to join our client in Riyadh, Saudi Arabia. As... ...consent to make use of such data for the specific purpose of securing you either permanent or temporary employment. Our business makes...
...SUMMARY:
Our client based in Cape Town are currently seeking the skills of a SAP Lead
POSITION INFO:
Main job function
As a part of Global IT team, reporting to CIO , the person will be responsible for Supporting ERP (SAP) globally, on Sales and Distribution...
...SUMMARY:
-
POSITION INFO:
Our client in the BPO call centre SAP Authorization Consultant position 4 years experience in Authorizations/GRC
The desired candidate should understand the following concepts:
# Business process understanding
# IT service operations...
...SUMMARY:
Gijima Staffing Solutions on behalf of our client is recruiting for a Cyber Security and Identify and Access Management Consultant. Contract role until December 2025 based in Cape Town.
POSITION INFO:
Professional Qualification and Certifications:...
...SUMMARY:
-
POSITION INFO:
SECURITY ENGINEER
The Security Engineer oversees the response to information system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches...
...AdministrationREQUIRED EDUCATION
Essential: Senior Certificate with Accounting as subject
Desired: Financial diplomaREQUIRED EXPERIENCE
Desired:
SAP system experience
3-5 years’ experience in a financial environment
Essential:
Senior Certificate with Accounting as subjectREQUIRED...
...-
POSITION INFO:
Requirements
A minimum of 5 years of experience in a similar role, with a proven track record in cloud security
In-depth knowledge of AWS and Google Cloud services, including Identity and Access Management (IAM), VPC, security groups, and...
...of office tasks.Attention to detail and interpretation of data.Competent in the use of the MS Office package.Competence in the use of SAP and LIMS will be advantageous.Ability to work under pressure and prioritize.Sound problem-solving abilities.Proven verbal and written...
...Corporate Credit Cards
Employee claims
All payroll journals and reporting
Treasury: daily and monthly cash and debt reporting
SAP Year end closing
Systems: Responsible for continuous enhancement and process improvement
Other daily and monthly tasks:...
...Financial environment
DESIRED EXPERIENCE: 3-5 years experience in a Financial environment; Relevant Fixed Asset accounting experience ;SAP System experienceREQUIRED JOB SKILLS AND KNOWLEDGE
* SARS legislation
* Finance/accounting terminology
* Reconciliation skills
*...
...drafting
Due diligence
Franchise agreements
Explorations agreements
International agreements
Lease agreements
Securities
Service level agreements,
Shareholder agreements
Competition Law
Capital Markets
Corporate Law
Banking & Finance...