Online platform for targeted staff recruitment

July 2018 Editor's Choice, News & Events, Training & Education

Given South Africa’s scarcity of skilled personnel within the technical, engineering and security sector, Hi-Tech Security Solutions has launched TechJobs Network, an online platform that makes it easier for companies looking to recruit new talent, while at the same time providing a convenient and free way for job seekers to browse through available opportunities.

Hi-Tech Security Solutions’ comprehensive circulation of readers includes engineers, system integrators, installers, IT personnel, security service providers, security, risk and operational managers and more. By facilitating access to Hi-Tech Security Solutions’ readers, TechJobs Network guarantees recruiters maximum exposure to potential candidates while minimising the unsuitable or irrelevant job applications that inevitably result from a more ‘scatter-gun’ approach.

Companies and recruitment agencies are able to submit details of an advertised position via an easy-to-complete webform at www.techjobsnetwork.co.za. Upon payment of a nominal monthly fee, it will appear on TechJobs Network within 48 hours, and can be renewed on a monthly basis until the position is filled. The service is free to job seekers, giving them a convenient way to view advertised positions that meet their criteria, and provide their contact details to the recruiting party.

In line with the urgency inherent to many job vacancies, positions advertised on TechJobs Network will also appear in the print, online and digital issues of Hi-Tech Security Solutions, and will be updated frequently.

For more information contact Tracy Wolter, Technews Publishing, +27 11 543 5800, tracy@technews.co.za, www.techjobsnetwork.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.