assistance on the use of software and hardware. Ensure security and privacy of networks and computer systems.
assistance on the use of software and hardware. Ensure security and privacy of networks and computer systems.
approaches to the prevailing processes and practices. Investigates courses of action to identify the most appropriate processes, and relevant regulations. Applies data security of employee files and records and makes optimal
approaches to the prevailing processes and practices. Investigates courses of action to identify the most appropriate processes, and relevant regulations. Applies data security of employee files and records and makes optimal
product satisfies the defined requirements. Investigate, analyse and document reported defects. Validate
product satisfies the defined requirements. Investigate, analyse and document reported defects. Validate
planned and implemented. (Business continuity, cyber security, data governance, infrastructure) Change management:
planned and implemented. (Business continuity, cyber security, data governance, infrastructure) Change management:
lead on building robust business proposals that secure new contracts and long term client relationships;
lead on building robust business proposals that secure new contracts and long term client relationships;