We are looking for a Security Engineer for a company based in Cape Town. This is a remote role. Your guaranteeing that their platforms maintain robust security measures while upholding their scalability and Develop and maintain security features (pentests, firewalls, authentication) Conduct security reviews of software Automate security anomaly detection and alerting Investigate security incidents and innovate security solutions solutions Strong understanding of security risks and mitigations Proficiency in backend development, IP
Description Information Security Services Development of Information Security Services capability and and to communicate feedback to enable associated security risk management. Perform Vulnerability testing compliance to security policies and standards. Develop and/or align information security policies to identify that proper IT security and information management measures are in place. Perform security audits and clean-ups policies and procedures. Document the information security principles and guidelines for application software
Information Security Officer , Manager and / or Consultant . Security CEH Experience in Cyber Security Architecture PAM. Technical security design and integration. Comprehensive background of cloud security architecture understanding of IT Infrastructure Good understanding of Security (FW, IPS, EPS) Good understanding of Microsoft Infrastructure Security – Firewalls, IPS, Endpoint Security, email, and application security. Qualifications: Qualifications: 5 years' relevant Information Security experience, at a technical level. Relevant Qualification
strongly on providing hardware and software-based security solutions in the ICT industry, is searching for Products include secure networking encryptors (layer 2/3 of the OSI model), secure mobile communications various cryptographic modules aimed at various security-focused applications. All products are developed A good understanding of networking and network security is a must; knowledge of cryptographic principles team responsible for the trusted operating system, secure network encryptors (layer 2/3), and Public Key
delivering cutting-edge hardware and software-based security solutions in the ICT industry, is looking for They pride themselves on developing secure networking encryptors, secure mobile communications, and cryptographic Develop and maintain software applications for secure networking encryptors, mobile communications, and trusted operating system, ensuring its integrity and security. Collaborate with a diverse team to design custom Strong understanding of networking and network security. Systematic and analytical approach to problem-solving
(CompTIA A, etc.) Excellent knowledge of internet security and data privacy principles Proven experience installations and ensure systems are up-to-date and secure Provide technical support to users and train non-technical successfully backed up to appropriate media. Ensure security through access controls, backups, and firewalls
installations and ensure systems are up-to-date and secure Provide technical support to users and train non-technical successfully backed up to appropriate media Ensure security through access controls, backups, and firewalls hardware/software, networks Excellent knowledge of internet security and data privacy principles
devices, such as switches and firewalls, to maintain secure and efficient connectivity. Monitor our WAN links performance. Implement and manage information security measures, including antivirus software and endpoint management. Thorough knowledge of information security practices, including endpoint protection and intrusion
networks, etc. Excellent knowledge of internet security and data privacy principles. Degree in Computer installations and ensure systems are up-to-date and secure. Provide technical support to users and train non-technical successfully backed up to appropriate media. Ensure security through access controls, backups, and firewalls
the highest standard whilst ensuring the code is secure and adhere to PCI compliance requirements. The and applications. Working knowledge of Web site security measures, such as firewalls and message encryption; such as reporting formats required, costs, or security needs to determine hardware configuration; Understand inquiries; and Monitor security system performance logs to identify problems and notify security specialists if