external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders qualification. 5 years Experience in programming languages C#. Experience with windows desktops and server support as a C# Developer. Solid experience with developing rest APIs using C# and .Net. Deploying secure Azure
Location: Pretoria Rosslyn / Menlyn / Midrand and home office on a rotational basis. Contract up to end of December teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
possible. At least 2 years' worth of experience using C# or similar MS technologies. Experience with Container
Technologies Large-scale high-performance databases Security Patterns AWS Certifications: AWS Certified: Developer SysOps AWS Certified DevOps Pro AWS Certified Security Speciality Essential Skills Requirements: Infrastructure Kafka StepFunctions Snowflake High Performance DB Security Advantageous Skills Requirements: Experience with
Location: Midrand / Menlyn / Pretoria Rosslyn and home office on a rotational basis. Ability to understand complex meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies
solutions, the solution architects as well as the IT security environment. Dev/Ops-Engineer Platform IDPs (m/f/x) relevant documentation in the Product Depot (e.g. security documentation, functional documentation, operations of working Troubleshooting and maintenance IT Security System Monitoring Incident and Request Management
Confluence, Trello) Operations Management IT security best practices and risks Salary Market Related
regular requirement Must be able to work office hours in the office or from home as required Perform additional
external providers, vendors and end-users. Treat security as a first-class citizen. Work closely with stakeholders