strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed ground up by a talented group of engineers and computer scientists. With a diverse development team, our own Unique specially designed operating systems. Computer Engineer Centurion Our Client requires an applicant
Networks, Support Services, Network Management, Computer Systems etc). This program does not a WIL/In-Service training/Industrial Exposure internship programme
relevant to support (e.g. Communications Networks, Computer Systems Engineering etc). This program does not must not be participating on another learnership or internship program;
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs.
& Plan, coordinate, and implement information security programs. Help protect against Web threats that Understanding of AWS security. Excellent IT skills, including knowledge of computer networks, operating systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls knowledge of information security management and policies Sound understanding of security operational processes
and access revocations. Implement and maintain security roles/profiles and entitlements throughout the Develop and update access control lists Process security authorization requests in accordance with operating reporting of security solutions on endpoints. Assist with updating software with the latest security patches patches and ensuring that proper security controls are present on endpoint resources. Provision and maintain maintain access to securable network resources (e.g. share folders, network drives, Internet access). Document
Our Client a Global Tech firm is seeking a Cyber security Specialist to join their team in Germiston (Onsite & Plan, coordinate, and implement information security programs. Help protect against Web threats that Understanding of AWS security. Excellent IT skills, including knowledge of computer networks, operating systems, software, hardware, and security An understanding of the cyber security risks associated with various manage them Good working knowledge of various security technologies such as network and application firewalls
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Tier 2 Security Analyst - Western Cape A company providing secure cloud transformation by combining Microsoft technology with cyber security, and managed services is looking for a T2 Security Analyst in Cape Town Town to assist the SecOps Tech Lead and Head of Security Operations in enhancing the SOC & SOAR operations operations within the company. The Security Analyst will collaborate closely with other teams to build services services and solutions that align with security best practices and client assurance requirements. This
Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering or Computer Science challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: (Electronic Engineering) or BEng/BSc (Computer Engineering) or Computer Science. 2-7 years of working experience communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC)