Computer Science, Information Technology, Cyber security or related field
BENG/B-Tech ELECTRICAL CONSULTING Engineer
*MUST reside in TSHWANE(PRETORIA)
*
SECURITY SOFTWARE DEVELOPER
Pretoria East
Minimum Req
Requirements:
looking for an IT Security Administrator.
The IT Security Administrator assist the the CSM to monitor identify and prevent cyber security threat to the client and plays a vital role in company’s proprietary and sensitive information secure.
Qualif ons:
are seeking a Security Analyst to join our team. As a Security Analyst, you'll be consoles
Representative within the Security industry.
Sales Representative to join our firearms and security wholesaler team based in Pretoria. This role involves relationships, promoting our range of firearms and security products, and driving sales growth within the should have a passion for firearms and any related security products, strong interpersonal skills, and a proven Representative within the Security industry. Strong passion for firearms and all security-related products and exceeding sales targets. Familiarity with the local security company market and industry trends. Familiarity
Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: B. Eng. (Electronic communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
sales cycle environment for a company selling Security Equipment (Cameras and Alarms) You must be comfortable multi-task, prioritize, and manage time effectively Grade 12 or Equivalent Relevant Tertiary Education is
protection (POPIA and GDPR).
b) Implement and update the relevant compliance policies f) Create and provide relevant training
2. Secure knowledge
a) Keep abreast of all developments (applicable laws, regulatory requirements, etc)
b) Attend relevant courses.
c) Interrogate client enabling logical identification and access.
b) Transfer knowledge to internal committees