provide 2nd and 3rd level support, to reduce costs associated with external service consultants. KEY REQUIREMENTS
security
successful Network Recruitment IT Rendani Ndou Researcher
determine the possible effect on the current- and associated systems Conduct a feasibility study to determine reference purposes Provide information, Conduct research to develop a solution, develop a solution and
stakeholders
development of operational implementation plans and associated service delivery processes, methods and techniques
development of operational implementation plans and associated service delivery processes, methods and techniques
Deliver work to agreed quality and standards Do research, planning & estimation on tasks The post Mid-Level
particular business rules and key technical decisions. Research and make suggestions on how to improve our existing to upgrade interfaces and improve performance. Research, analyse and evaluate requirements for software
particular business rules and key technical decisions. Research and make suggestions on how to improve our existing to upgrade interfaces and improve performance. Research, analyse and evaluate requirements for software