Conducts all Casino table games according to established guidelines and procedures
- Accurately maintains the handling of cards, chips, money and other gaming equipment at an appropriate rate to maintain the proper pace of the game. Informs players of the rules and
regulations as the game
managing security risks. 5-7 years of experience in information security management. Experience with risk
managing security risks. 5-7 years of experience in information security management. Experience with risk
managing security risks; · 5-7 years experience in information security management; · Experience with
managing security risks; · 5-7 years experience in information security management; · Experience with
My client is recruiting for a passionate and positive Admin Controller to join their store in Vryburg, North West. The successful candidate will be responsible for various tasks around store operations and must have the authority to take charge when the Store Manager is not available.
Cand
Our Client a Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite Fulltime) on a contract basis. They offer stability, growth, attractive rates and a great working environment.
Key Roles and Responsibilities:
Our Client a Global Tech firm is seeking a Virtual Chief Information Officer to join their team in Germiston (Onsite Fulltime) on a contract basis. They offer stability, growth, attractive rates and a great working environment. Key Roles and Responsibilities: Contributes towards the development and
My client is recruiting for an experienced Store Manager in Vryburg. The responsible person will be managing the store through execution of marketing and operational plans. Who will co-ordinate marketing, administration, logistics, HR, sales and operations etc..
Candidates who meet the b
We are seeking a proficient and experienced Cyber Security Manager to shape, design and manage the implementation of the Group's cyber security strategy, plans, governance framework, policies, principles, standards and protocols to enable the organization to respond to evolving cybersecurity threats