Reference: Pta002867-EP-7 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
skills in Cryptography and computer & network security. We require a Software Engineer with 2 years working network security product development for cloud-based applications and general Networking security Cryptography Cryptography and Network Security software development engineer Pretoria Minimum requirements: BEng or Masters Experience in cryptography, computer and network security. Scripting languages ( Strong oral and written part of a development team to develop network security software. Apply via www.edrecruiters.co.za or
platforms (e.g., AWS, Azure).
Excellent working knowledge of computer systems, security, network and systems administration, databases platforms (e.g., AWS, Azure). Familiarity with security concepts and best practices, including firewalls Administrator (MCSA), or Certified Information Systems Security Professional (CISSP) are a plus. Duties will include and improve scalability. Security Implementation: Implement and maintain security measures to protect the unauthorized access, viruses, and other security threats. Conduct regular security audits and apply patches and
independently with RFQ processes from end to end.
as code using Terraform. Implement and manage security controls for our cloud infrastructure. Monitor infrastructure up to date and secure, performing updates and security patches. (i.e. Kubernetes, ingress developed, tested, and deployed for customer functions securely, quickly, and scalable. You will evaluate different Terraform for infrastructure as code Experience with security best practices for cloud infrastructure. Experience
teams in order to find the best balance between security, operation stability and compliance for the onboarding BeyondTrust, or Thycotic). Ability to assess security risks and recommend appropriate mitigation strategies Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or vendor-specific (advantageous). Minimum of 3 - 5 years of experience in IT security, system administration, or related fields. Demonstrated
independently with RFQ processes from end to end. Securing venues and scheduling site inspection and briefing briefing meetings and recording minutes thereof. Securing venues and scheduling meetings for the Bid Specification collecting tenders at closing date and storing them securely Receiving e-mails from dedicated SCM mailbox.
independently with RFQ processes from end to end. Securing venues and scheduling site inspection and briefing briefing meetings and recording minutes thereof. Securing venues and scheduling meetings for the Bid Specification collecting tenders at closing date and storing them securely Receiving e-mails from dedicated SCM mailbox.
records • Managing strict bio security protocols • Conducting audits – (Bio security, galaxy and hygiene) prepare