effectively communicate, both orally and in written form. · Integrity, independence, and solid judgment. · Proficiency in accounting software, preferably SAP. · Strong understanding of accounting principles
effectively communicate, both orally and in written form. · Integrity, independence, and solid judgment. · Proficiency in accounting software, preferably SAP. · Strong understanding of accounting principles
customer/account documentation for example: credit applications/customer forms etc. Quotations Keep track of stock availability enquiries Completing supplier information/vender applications Qualifications A Bachelor's Degree in Business
customer/account documentation for example: credit applications/customer forms etc. Quotations Keep track of stock availability enquiries Completing supplier information/vender applications Qualifications A Bachelor's Degree in Business
other developers in the design and planning of application code to meet the business users' requirements and experience using IBM Rational IDE. Fully free-form RPG using embedded SQL. Proficient in SQL400 and
other developers in the design and planning of application code to meet the business users' requirements and experience using IBM Rational IDE. Fully free-form RPG using embedded SQL. Proficient in SQL400 and
precision metal workers who craft tools and metal forms for stamping and forging operations. Analyse design machines, tool & cutter grinders to cut, shape or form tools or parts Knowledge and understand 2D and 3D
precision metal workers who craft tools and metal forms for stamping and forging operations. Analyse design machines, tool & cutter grinders to cut, shape or form tools or parts Knowledge and understand 2D and 3D
organization's employer brand Identify risks and form contingency plans as soon as possible Keep up with Cyber Security best practices Ensure that all application development initiatives are well managed and
organization's employer brand Identify risks and form contingency plans as soon as possible Keep up with Cyber Security best practices Ensure that all application development initiatives are well managed and