Computer Engineer
Centurion
Our Client requires an applicant who is comfortable working with C and C++ on an operating system level. A good understanding of networking and network security is a must; knowledge of cryptographic
would be in business support, experience of security solutions selling is preferred) Experience in tenders
Specialist who will specify the parameters that security solutions require to function properly while contributing contributing to the engineering of the security solutions. You will identify vulnerabilities in systems and and incidents. Conducting operations using security solutions such as IAM and DLP. Providing support and to entities for installing and operating security solutions. Designing and producing indicators, reporting documents, and reports on the performance of security solutions. Implementing warranties such as alerts and
Researches, plans and implements information security technical solutions to meet business requirements. Develops gateways, Network Access Control, endpoint security solutions experience is essential
policy breaches.
and ICT policy breaches. Administers all security solutions in the Information Security domain including Researches, plans and implements information security technical solutions to meet business requirements. Develops gateways, Network Access Control, endpoint security solutions, PKI, Security Operations Centre tasks and
gateways, Network Access Control, endpoint security solutions, PKI, Security Operations Centre tasks and use and ICT policy breaches Administers all security solutions in the Information Security domain including Researches, plans and implements information security technical solutions to meet business requirements Develops
gateways, Network Access Control, endpoint security solutions, PKI, Security Operations Centre tasks and use and ICT policy breaches Administers all security solutions in the Information Security domain including Researches, plans and implements information security technical solutions to meet business requirements Develops
/>Implementation and managing information security solutions in the following environments:
MS Windows
br />