We are looking for Security Officers. Responsibilities – Adhering to principles & values. – Applying Qualifications and Experience – Grade 11 – Security Couse will be advantage. – Prisa Grade A certificate (internal computer skills( Ms office &SACO) The post Security Officers appeared first on freerecruit.co.za
Sales experience in a channel environment selling security, storage or networking software
o Strong
requirements; developing software systems. Matric / Grade 12 Tertiary Qualification - relevant IT Diploma concepts. Troubleshooting Skills ( Network and Security ) Technical experience: BizTalk 2013, 2016 SQL Branching Strategy GIT and TFVS IBM MQ BizTalk Security Best Practices C# ( BizTalk Custom Behavior Extensions
all safety, health, environmental, quality and security requirements of the Dockyard. • Maintain a neat equipment are secured at the end of each shift. QUALIFICATIONS: • Grade 9 (Internal), Grade 12 (External) lagging experience will be an added advantage JOB GRADE: B5
required stability Ensure that the platform is secure to prevent unauthorised access and enable adherence delivery teams for demos and releases Matric / Grade 12 Bachelor's degree in Engineering, Computer Science
business goals to ensure that solutions are scalable, secure, and compliant with industry standards. Additionally ong understanding of network architecture and security protocols
processes and support mechanisms for API Consumers Security management Identify and implement cost-saving development teams to adopt standards during delivery. Grade 12 (Matric) IT-related tertiary qualification 3-4
tasks and meet deadlines.
experience as a DevSecOps Engineer or in the Cyber Security sector
Like Optimus Prime working in harmony
processes, constructing a powerful and resilient security infrastructure
As a member of the Autobot
role in defining, implementing, and maintaining security strategies, always staying one step ahead of emerging
you embody a profound understanding of Microsoft Security features, enabling you to identify vulnerabilities
payments, procurement, service management, data security related processes and IT support services. 1. includes user account management, access control, and security configuration. 3. Network Operations: Managing optimization, and security compliance. 4. Security Operations: Implementing and maintaining security measures intrusion detection systems, and conducting regular security audits and assessments. 5. Incident Response: