Computer Science, Information Technology, Cyber security or related field
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
commission statements Must have recent references Highly negotiable salary Commission Pension 50% medical
sales cycle environment for a company selling Security Equipment (Cameras and Alarms) You must be comfortable
and control identification, classification, and risk assessment)
d) Perform compliance audits
f) Create and provide relevant training
2. Secure knowledge
a) Keep abreast of all developments all stakeholders
e) Manage the process of securing and implementing training material
f) Monitor specifically
a) Draft and implement the firms RMCP, Risk Assessments and processes.
b) Manage all
and control identification, classification, and risk assessment) Privacy and data protection (POPIA and regulatory obligations and update the compliance risk management plans d) Perform compliance audits e) firm f) Create and provide relevant training 2. Secure knowledge a) Keep abreast of all developments in changes to all stakeholders e) Manage the process of securing and implementing training material f) Monitor specifically a) Draft and implement the firm's RMCP, Risk Assessments and processes. b) Manage all AML monitoring
and control identification, classification, and risk assessment) Privacy and data protection (POPIA and regulatory obligations and update the compliance risk management plans d) Perform compliance audits e) firm f) Create and provide relevant training 2. Secure knowledge a) Keep abreast of all developments in changes to all stakeholders e) Manage the process of securing and implementing training material f) Monitor specifically a) Draft and implement the firm's RMCP, Risk Assessments and processes. b) Manage all AML monitoring
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
stock and cash, minimising shrinkage and ensuring a high standard of general housekeeping and administration targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior promotions principles Knowledge of stock, cost, risk and compliance management procedures Knowledge of
stock and cash, minimising shrinkage and ensuring a high standard of general housekeeping and administration targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior promotions principles Knowledge of stock, cost, risk and compliance management procedures Knowledge of