Where
Where

Risk and compliance data analyst temporary jobs in Johannesburg (7 jobs)

Company
Period
Schedule
Source
Sort by:
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago
  • Praesignis
  • Johannesburg
... EKS (Kubernetes) , and Docker . Security & Compliance Implement AWS Identity & Access Management ... least-privilege access controls. Manage data encryption, key management (KMS ... configurations. Conduct security assessments, risk analysis, and remediation of ...
2 days ago