Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Reference: Pta003178-EP-4 International company. This exciting career opportunity is for a person with skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written
sales and financial/accounting realms using SAP S/4 HANA.
- Profound understanding of process and
using SAP SD, FI, CO, and system knowledge in SAP S/4 HANA.
- Change and project management skills
business processes for invoicing vehicles to BMW Group customers and partners, analyzing and solving process
confirm process and system changes based on SAP S/4 HANA, managing implementation from requirement to
- Ensure compliance, data protection, IT security, and enforce uniform business process requirements
sales and financial/accounting realms using SAP S/4 HANA. - Profound understanding of process and accounting using SAP SD, FI, CO, and system knowledge in SAP S/4 HANA. - Change and project management skills. - Excellent business processes for invoicing vehicles to BMW Group customers and partners, analyzing and solving process confirm process and system changes based on SAP S/4 HANA, managing implementation from requirement to automation. - Ensure compliance, data protection, IT security, and enforce uniform business process requirements
meetings. Coordinate external contractors. Manage security vulnerabilities. Essential skills required: Knowledge BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies certification. Minimum 4 years of IT operations experience including ITIL. Minimum 4 years of storage experience experience. Minimum 4 years of Scrum work experience. Minimum 4 years of VDI and operating systems experience
to candidates from under represented designated groups. No application will be considered after the closing willing to undergo a series of assessments and security clearance process as prescribed by the National strictly to the Protection of Personal Information Act 4 of 2013 (POPIA) in the processing of all information
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior friendly and professional service. To support the Group's vision to be the customer's first choice health
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior friendly and professional service. To support the Group's vision to be the customer's first choice health
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
website performance and load times ● Implementing security measures to protect websites from cyber threats Problem-solving and debugging abilities ● Knowledge of web security best practices ● Excellent communication and teamwork