Keytek, a Security hardware wholesaler based in Brooklyn, Cape Town is looking to employ a full time
Keytek, a Security hardware wholesaler based in Brooklyn, Cape Town is looking to employ a full time
policies and procedures. Implementing and overseeing security operations. Ensuring effective and safe use of operations and contents by establishing and monitoring security procedures and protocols. Controls inventory levels employees adhere to the companys health, safety, and security policies and procedures. The job requires supervision
policies and procedures. Implementing and overseeing security operations. Ensuring effective and safe use of operations and contents by establishing and monitoring security procedures and protocols. Controls inventory levels employees adhere to the companys health, safety, and security policies and procedures. The job requires supervision
evolving through excellence that drives quality, and securing wealth by connecting people with life solutions solutions for financial freedom. We want to secure the future dreams, aspirations and career plans you have assisting them to structure their wealth and ensure a secure financial future for them and their families. Maintain
evolving through excellence that drives quality, and securing wealth by connecting people with life solutions solutions for financial freedom. We want to secure the future dreams, aspirations and career plans you have assisting them to structure their wealth and ensure a secure financial future for them and their families. Maintain
availability. Security: Implement best practices for infrastructure and application security, including Chef. Solid understanding of networking concepts, security principles, and best practices for cloud environments
business goals to ensure that solutions are scalable, secure, and compliant with industry standards. Additionally Strong understanding of network architecture and security protocols Experience in cloud computing environments make use of such data for the specific purpose of securing you either permanent or temporary employment.
business goals to ensure that solutions are scalable, secure, and compliant with industry standards. Additionally Strong understanding of network architecture and security protocols Experience in cloud computing environments make use of such data for the specific purpose of securing you either permanent or temporary employment.
Responsibilities include architecture design, system testing, security management, and second-line support. Requirements Professional or similar) Qualifications Advantageous: Security Certification Microsoft SQL Certification Experience ESXi Disaster Recovery/Risk Management Firewall / Security Experience Knowledge of Contact Centre Technologies