Search Results: 10 vacancies
...inclusion in the corporate / department risk register.
Take part in major IT initiatives, transformation projects review of cyber-security systems and internal controls pertaining to Information system under development.
Plan, coordinate and manage each IT individual...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Laboratory...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Construction...
...Understanding project specifications and developing time schedules and budgets that meet them.
Negotiating with vendors and contractors to secure the best prices.
Observing existing processes, analyzing staff performance, and addressing deficiencies accordingly....
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Construction...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Procurement...
...requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***
People Looking for Project...
...Serverless : Leverage serverless technologies like Lambda and Step Functions to build event-driven, cost-efficient applications.
Security : Implement robust security measures like IAM roles, VPC security groups, and encryption at rest and in transit. Configure...
...engineering and scientific personnel.
24. Obtain and evaluate information on factors such as reporting formats required costs and security needs to determine hardware configuration.
25. Determine system performance standards.
26. Train users to use new or modified...
...systems and infrastructure, managing a team of IT professionals, developing and implementing IT policies and procedures, ensuring the security and integrity of university network and data, and providing technical support to faculty, staff, and students.
The IT Director...