Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
sales cycle environment for a company selling Security Equipment (Cameras and Alarms) You must be comfortable
skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written part of a development team to develop network security software. Apply via www.edrecruiters.co.za or
website performance and load times ● Implementing security measures to protect websites from cyber threats Problem-solving and debugging abilities ● Knowledge of web security best practices ● Excellent communication and teamwork
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior
targets. To effectively manage stock by enforcing security measures, cash controls, returns policies and related to minimising stock losses and maximising security procedures at the point of sale. To deliver superior
sales cycle environment for a company selling Security Equipment (Cameras and Alarms) You must be comfortable
regulatory requirements, including data protection and security standards. Collaborate with other executives to that there is a clear assessment of Information Security and Information Technology risks and that appropriate Systems Auditor (CISA) and or Certified Information Security Manager (CISM) certification will serve as an
communication and feedback to potential clients. Secure reliable business insights relevant to new business process is effective. Quality Management and Data Security 5% Maintain absolute customer confidentiality
communication and feedback to potential clients. Secure reliable business insights relevant to new business process is effective. Quality Management and Data Security 5% Maintain absolute customer confidentiality