Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Reference: CPT005197-GP-1 Cybersecurity Engineer Secure your future with this giant in the aerospace and IT/Computing (or demonstrated equivalent work experience) Security Higher certifications in the flowing key vendors…
POS24156 Sales Executive Electronic Security Products (POS24156)
R 16 000 to external, preference will be given to electronic security industry experience CCTV, Access Control, Intercoms Can technically grasp Security Surveillance Equipment and other electronic security products.
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance standards, safeguarding cloud operations. Conduct security assessments, including vulnerability testing and to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment
Reference: JHB011778-LJ-1 The Information Security Specialist will be responsible for developing a framework the computing infrastructure from all forms of security breaches, as well as the identification of vulnerabilities and data remain secure. B Degree non negotiable Certified Information Systems Security Professional (CISSP) (CISSP) CISM – Certified Information Security Manager. CISA – Certified Information Systems Auditor - preferable. CompTIA Security - preferable Certified Ethical Hacker (CEH) - preferable GIAC Security Essentials
standards of information security. We are seeking a dedicated Information Security Officer to join the Infrastructure drive the security vision and strategy forward. Role Overview: As the Information Security Officer, you for information security efforts, responsible for developing and executing our security strategy, governance aimed at enhancing the security posture. Key Responsibilities: Oversee the security of information systems overall security stance. Evaluate, report on, and propose strategies for mitigating security threats
Description Cyber Security Specialist required on a Fixed Term Contract in Midrand to oversee and manage lending sector. A Deep understanding of cyber security practices and trends as well as leadership skills maintaining an effective and comprehensive cyber security program. Requirements: DegreeRelevant tertiary and Minimum of 8 years of experience in Cyber Security role where you meet business deliverables. 5 years' approach to ongoing evaluation of cyber security policies to ensure security policy adherence related to VFS
Datacentrix Cape Town is looking for a Network Security Engineer Purpose of Role : Focuses on the maintenance maintenance, monitoring and management of network security infrastructure and capability (hardware and software support of the Service Delivery Manager and Network Security Operations Manager. Liaises with 3rd party vendors At least 3 years' experience delivering Network Security Services in a customer environment. Excellent
NUMBER: P003180 POSITION: SENIOR MANAGER - CYBER SECURITY PEROMNES GRADE: P6 EMPLOYMENT TYPE: 3 YEAR FIXED-TERM YOUR APPLICATION PURPOSE OF THE POSITION: Cyber Security Specialists play a critical role in protecting assets and ensuring the resilience of its cyber security defences. They provide leadership, strategic direction integrates, and is accountable for the Cyber Security program's overall success, ensuring alignment documentation and successful completion of complex Cyber Security projects. Portfolio Management (POMG) 5: Ensures
Internal/Counter Sales Security Technology (POS24074)
Boksburg
R 15 000 candidates from the electronic or fire protection or security technology or ICT industry.