and upgrades (advanced desktop, network, server, security and backup). Infrastructure and standards. Support Implement the policies and procedures regarding security and the use of the computer system and network Knowledge and expertise of networks (LAN, WAN) and security designs. Knowledge in barcode technology / scanning
website performance and load times ● Implementing security measures to protect websites from cyber threats Problem-solving and debugging abilities ● Knowledge of web security best practices ● Excellent communication and teamwork
their dynamic team in the Menlyn Area. Get the security of a permanent hybrid position and work on great collaboratively defined and codified, to banking grade security, maintainability, and defined architecture. The
Integration, performance and load testing and security testing using industry standard tools, fit for REST-Assured, Soap-UI, Postman GitHub Advanced Security, Burp Suite, Contrast Assess, Grafana k6, Karate integration. Test data management. Performance, security and load testing. Evaluate test scenarios Execute
management and knowledge transfer Security Compliance: Enforce security policies and procedures related standards to protect sensitive data and mitigate security risks.
· Test data management. · Manual, Performance, security and load testing. · Any additional responsibilities Identification, Creation & Sanitation of Test Data · Security and Reliability Testing. · Technical Test Case
bonus. • An understanding of modern information security methodologies and standards, especially in a Hybrid
regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
Spring Framework (Spring Boot, MVC, Data/JPA, Security etc.) · AWS stack such as Kinesis, CloudWatch
and passwords, Oversee data backup and system security (e.g., user authorisation, firewalls), Prioritise