Search Results: 106 vacancies
We are searching for a talented Social Media Manager to represent our company by building a social media presence for our brands.
Responsibilities:
~ The social media manager will be required to run advertising campaigns and drive engagement by creating high-quality...
...Understanding of systems and technologies: The applicant must have strong knowledge of information management systems and office software used in the company.
Communication Skills: Ability to communicate effectively with team members and management to ensure smooth...
...Education and training:
Hold a bachelor's degree in computer science, information technology, or a related field.
It is preferable to have additional certifications such as CISSP, CISM, CompTIA Security+, or others.
Experience:
Previous work experience in IT, and...
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...
...University degree in business administration, information technology, project management, or any related field.
Deep knowledge of project management concepts and tools, such as PMI (Project Management Institute) or Prince2 standards.
Experience using project management...
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
...University degree in a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity methods and best practices in the field of security.
A comprehensive understanding of networking systems and...
University degree in geography, surveying, data science, or related field.
Deep knowledge of GIS technologies and software tools used such as ArcGIS, QGIS, etc.
The ability to analyze geographic data, analyze satellite images, and apply spatial analysis.
Excellent...
...deal with emergency situations and take necessary actions quickly and effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in the field of security, especially in security coordination, preferably prior experience in areas such as design and implementation...
...University degree in a related field such as cybersecurity, risk management, engineering, or any related discipline.
Deep knowledge of security incident and event management methods and related regulatory frameworks, such as NIST, ISO 27001, or other standards.
Ability...
...Technical knowledge: Good understanding of information technologies and systems used in information management and databases.
Communication Skills: Ability to communicate effectively with team members and colleagues to exchange information and direct them properly....
...We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at ****@*****.***...
...University degree in computer science, information technology, business administration or related field.
Extensive knowledge of information... ...of network operating systems, databases, information security, web applications, and other core technologies.
Ability to...
...City departments, divisions, sections and outside agencies
Secure appropriate grants for agencies
Perform duties related to NPDES... ..., sex, sexual orientation, gender identity, or national origin.
Please contact Laura Harrison for further information!...
...University degree in computer science, information technology, or related field.
A deep understanding of the basics of software development... ...up deployment environments and test changes effectively and securely.
Strong analytical skills to monitor application...
...Executive Duties and Responsibilities
Identifying, qualifying, and securing business opportunities; coordinating business generation... ...to client requests for proposals (RFPs)
Creating informative presentations; presenting and delivering information to potential...
...Description:
As a senior IT security officer, you will be performing network and system security analysis, monitoring and incident... ...Security, Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) events. Managing IDS, IPS, and...
...Optimization: Optimizing the performance and scalability of our web applications to ensure fast load times and high availability.
Security Enhancement: Implementing robust security measures to protect user data and prevent unauthorized access.
Requirements:...
...our company. They will contribute to the shaping of our company.
~ About company : registered company inTanzania dealing with Security Systems, Electrical fences for plantations/farms and more
General requirements:
Bachelor degree
Job location:...