Similar jobs you might be interested in:
Operations Manager
Location: Midrand
Salary:
Our client in the telecommunications sector is looking for an Operations Manager on a contract role for 6 months. Overview: As an Operations Manager for the Super App, you will be responsible for overseeing a wide range of crucial operational functions. You will play a pivotal role in ensuring the smooth functioning of our platform while maintaining the highest standards of integrity, securit...
3 days ago
Risk Administrtor - 6 Month Contract
Location: Johannesburg
Salary:
17 days ago
Fraud / AML Admin - 6-month contract - Banking
Location: Johannesburg
Salary:
18 days ago
Fraud Administrator (6-MONTH)
Location: Johannesburg
Salary:
19 days ago
Cyber Security Specialist - Networks
Location: Midrand
Salary:
Interfaces across multiple channels throughout the enterprise seeking business, technical and infrastructure issues and identifying potential areas of risk. Analysing network logs for suspicious activity. Configuring firewalls and intrusion detection systems. Conducting Penetration Testing (i.e., simulating attacks to identify vulnerabilities) and collaborating with colleagues on incident response...
Today
Location: Midrand
Salary:
Our client in the telecommunications sector is looking for an Operations Manager on a contract role for 6 months. Overview: As an Operations Manager for the Super App, you will be responsible for overseeing a wide range of crucial operational functions. You will play a pivotal role in ensuring the smooth functioning of our platform while maintaining the highest standards of integrity, securit...
3 days ago
Risk Administrtor - 6 Month Contract
Location: Johannesburg
Salary:
17 days ago
Fraud / AML Admin - 6-month contract - Banking
Location: Johannesburg
Salary:
18 days ago
Fraud Administrator (6-MONTH)
Location: Johannesburg
Salary:
19 days ago
Cyber Security Specialist - Networks
Location: Midrand
Salary:
Interfaces across multiple channels throughout the enterprise seeking business, technical and infrastructure issues and identifying potential areas of risk. Analysing network logs for suspicious activity. Configuring firewalls and intrusion detection systems. Conducting Penetration Testing (i.e., simulating attacks to identify vulnerabilities) and collaborating with colleagues on incident response...
Today