Computer Science, Information Technology, Cyber security or related field
br />
SECURITY SOFTWARE DEVELOPER
Pretoria East
Minimum Req
communications security and cryptography.
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
as a vault protects a bank's treasures, the IT Security Administrator is our fortress against cyber threats guardian of our digital wealth, implementing robust security measures, monitoring systems for breaches, and keeping our assets secure. Key Responsibilities: Develop, implement, and maintain security policies, protocols traffic for unusual activity and security breaches. Investigate security breaches and other cybersecurity Perform regular security assessments and vulnerability testing. Manage and configure security tools, including
Information Systems Security Professional (CISSP)
CISM Certified Information Security Manager.
CISA
/>CompTIA Security+ - preferable
Certified Ethical Hacker (CEH) - preferable
GIAC Security Essentials
Certification (GSEC) - preferable
Systems Security Certified Practitioner (SSCP) - preferable MINIMUM
in:
Implementation and managing information security solutions in the following environments:
MS
/>Oracle Fusion Cloud
Developing information security policies and procedures.
Cybersecurity event
Good understanding of networking and network security is a must; knowledge of cryptographic principles
/>- Good understanding of networking and network security
- Systematic and analytical approach to problem
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Cryptography and Network Security software development engineer
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials