Computer Science, Information Technology, Cyber security or related field
br />
Systems and Security Analyst
Cape Town | On-site
As our Systems and Security Analyst, you application lifecycle management and ensuring system security, availability, performance, stability, and support analyst Server, Storage, Networking, and Security. You have MCSA or MCSE as well
You must have network security experience, IT security methodology and remediation understanding
SECURITY SOFTWARE DEVELOPER
Pretoria East
Minimum Req
communications security and cryptography.
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Cryptography and Network Security software development engineer
/>
Role • The primary role of the Data Protection Officer is to ensure that all data subjects (data from bonus. • An understanding of modern information security methodologies and standards, especially in a Hybrid