continuous integration. Security Savvy: Implement SSL encryption and other web service security measures. Back-End expertise. Knowledge of SSL encryption and web service security. Exposure to enterprise-wide service integration
and risk impact.
solutions which would be reliable, scalable and secure with the help of our highly experienced team of strong understanding of inter technologies and security principles a deep understanding of software development
diligence• Manage own development to enhance own competencies• Participate in knowledge sharing in the team mentoring of team membersTECHNICAL/FUNCTIONAL COMPETENCIES: • Financial acumen• Risk identification and organising• Report writing skills BEHAVIOURAL COMPETENCIES: • Presentation and communication skills• Negotiation timely conclusion of legal agreements).• Declared competent in three due diligence disciplines (Marketing; review models of proposed financial structures• Competent in coaching and mentoring of team members
with them all. Security Savvy: OAuth, SAML, LDAP - you know your way around security protocols. Server
solutions which would be reliable, scalable and secure with the help of our highly experienced team of and authorization mechanisms. Understanding of security protocols like OAuth, SAML, and LDAP. Knowledge
conclusion of legal agreements).
• Declared competent in three due diligence disciplines (Marketing;
models of proposed financial structures
• Competent in coaching and mentoring of team members.
MAIN
/>• Manage own development to enhance own competencies
• Participate in knowledge sharing in
team members
TECHNICAL/FUNCTIONAL COMPETENCIES:
• Financial acumen
•
Report writing skillsÂ
BEHAVIOURAL COMPETENCIES:
• Presentation and communication
Strong understanding of internet technologies and security Previous experience as a Solution Architect Excellent
Network Computing) is a plus. Familiarity with JDE security and user profile management. R650 per hour
Systems Security Professional (CISSP) – beneficial for projects involving significant security components