Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Reference: CPT005197-GP-1 Cybersecurity Engineer Secure your future with this giant in the aerospace and IT/Computing (or demonstrated equivalent work experience) Security Higher certifications in the flowing key vendors…
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
financial services industry is looking for a SAP Security Specialist to join their dynamic company. As a permissions) and ECC HR Security Specialist, you will be responsible for providing security support within the action to reduce risk on the systems. Provide SAP Security support skills to business end users and team of remediation. Manage projects within the SAP Security area. Be responsible for coordination and managing Systems or related would be beneficial. SAP System Security and Authorizations or SuccessFactors certification
issues, as well as ensuring system uptime and availability. The ideal candidate will have experience in system-related issues and ensuring system security and availability. You will need Certifications such as design, implementation, and maintenance; system security concepts and protocols and cloud computing. DUTIES: issues, as well as ensuring system uptime and availability. Design, configure and maintain the organization's customers. Maintain system security by monitoring system activity, implementing security policies and procedures
management, Infrastructure management data analysis, security or product development OR equivalent experience Infrastructure Management, stakeholder engagement, security, and analytics or similar Passion for building infrastructure to ensure performance, reliability, and security. Oversee the design, implementation, and maintenance storage, and telecommunications systems. Ensure the security, reliability, and scalability of IT infrastructure and projects to team members based on skills, availability, and project requirements. Conduct regular performance
for ensuring the optimal performance, availability and security of the network infrastructure. The role Responsibilities: Monitor network performance, availability and security using network monitoring tools Respond disruptions Monitor and analyse network traffic for security threats and vulnerabilities, and take proactive
for ensuring the optimal performance, availability and security of the network infrastructure. The role Responsibilities: Monitor network performance, availability and security using network monitoring tools Respond disruptions Monitor and analyse network traffic for security threats and vulnerabilities, and take proactive