Manager
- CCNP (Networking or Security) and CISSP a must.
- Cloud Security and Network an advantage.
- Endpoint Security an advantage (Panda, Mcafee, Symantec etc.)
Experience
SECURITY SOFTWARE DEVELOPER
Pretoria East
Minimum Req
communications security and cryptography.
Should you not receive a response within 14 days, please consider your application as unsuccessful.
channels for investigation and resolution. Identify risk areas relative to the performance of the unit against potential areas of compliance vulnerability and risk and develop corrective action plans for resolution and competitive strategies Identify and implements risk management processes, registers, etc Act as an independent Bachelor's degree law, or related fields Certified Risk Management Professional (CRMP) or Certified Regulatory Regulatory Compliance Manager (CRCM) Governance, Risk, and Compliance Professional (GRCP) Ability to analyze
Reference: Pta002867-EP-8 Security Software Developer with an Electronic Engineering or Computer Engineering challenging career prospects. Cutting-edge technology SECURITY SOFTWARE DEVELOPER Pretoria East Minimum Requirements: communications security and cryptography. Developing software in conformance with relevant security standards communications security (COMSEC) solutions conformant to FIPS standards. Develop transmission security (TRANSEC) solutions. Develop link security (LINKSEC) algorithms and cypher streams. Perform security requirements analysis
Cryptography and Network Security software development engineer
We are seeking a highly skilled and experienced Application Security Manager to lead our efforts in ensuring ensuring the security of our software applications. The Application Security Manager will be responsible implementing, and maintaining a comprehensive application security program that safeguards our applications from background in application security, risk management, and a deep understanding of secure software development Science, Information Security 5 years experience in a similar application security role 5 years of development
through implementation and maintenance of a secured and high-availability solution. Optimise resource use inefficiencies (including governance and the management of risks and audit findings) in the work of the division
meet the business requirements while ensuring the security, compliance, and availability of data to the FIC's optimisation of database performance and maintain high level of availability ensuring the systems are accessible requirements. • Database security - define and implement security controls and security policies and procedures regulations (e.g. POPIA) in order to minimise downtime and risk of data losses. Define and implement standard operating processes and policies to ensure data integrity and security. • Service provider management - manage relationship
time, within scope, and budget, while maintaining high standards of quality and compliance.
Key
latest PCI standards.