...Engineering at Substack We are seeking an experienced engineer to bring security expertise to Substack’s engineering team. As Substack’s first dedicated security hire, you will lead security-oriented initiatives in collaboration with product and engineering teams at...
...Our Business Analyst Team is growing, you have an opportunity to be part of the team.
Could this be for you?
You will enjoy working in this environment if you are a professional who thrives in the proactive involvement of projects from inception to completion....
Remote job
...JOB TITLE:
Platform Support Engineer- Cloud Security and Optimization
LOCATION:
Stellenbosch
ABOUT CYBERLOGIC:
Cyberlogic... ...Associate
Microsoft Certified: Security Operations Analyst Associate
Microsoft Certified: Security, Compliance, and Identity...
...SUMMARY:
Test Analyst-Automation – Midrand – Semi Remote – R450 PH
POSITION INFO:
Are you looking to join a team Where Journeys Become Adventures! We currently have a new role for a Test Analyst Automation to Elevate your daily adventure.
You will Develop...
Remote job
...PowerBI Data Analyst (JB4355)
Remote, South Africa
R35 - 50 000 per month, CTC
Permanent
Our client is currently transitioning to a PowerBI reporting ecosystem and is seeking a skilled Data Analyst to join their expanding team.
As the Data Analyst, you will be...
...The Junior Business Analyst is the key liaison between the commercial and development teams ensuring the successful delivery and ongoing... ...internal testing and user acceptance testing.
Information Security
• Understand their role within the organisation from an...
Remote job
...We're looking for a QA Analyst to join our Technical Team.
As the QA Analyst your role will involve reducing the number of bugs that go to field.
Test bugs, tasks logged on TFS and ensure they have been fixed and programmed correctly according to the scope of the...
Remote job
R 600 ph
...developing high-performance variants, and our brand focuses on superior overall performance!
We have opened a role for Technical Business Analyst are you skilful in gathering and analysing requirements impacting data-intensive applications/systems and building solutions for...
...Business writing, clear and concise communication
Business Analyst experience
Work on ways to automate and improve development... ...Work with QA Engineers to ensure that systems are safe and secure against Cybersecurity threats.
Work with Software Developers...
Remote job
...required.
Build data Integrations
Work closely with data analysts, data scientists, and other stakeholders to assist with data-related... ...RESTful and SOAP services, with a solid understanding of API security best practices
Experience in a fast-paced, high-growth...
Remote job
....
Adheres to the companies work standards.
Information Security
~ Understand their role within the organisation from an information... ...Collaborate with other software developers, business analysts and software architects to plan,
design, develop, test, and...
Remote job
...Understand their role within the organisation from an information security perspective and commit to protecting the organisation's... ...Collaborate with cross-functional teams, including IT, business analysts, and end-users, to ensure reports meet business requirements....
Remote job
...Understand their role within the organisation from an information security perspective and commit to protecting the organisation's... ...project.
Collaborate with other software developers, business analysts and software architects to plan, design, develop, test, and maintain...
Remote job
...Understand their role within the organisation from an information security perspective and commits to protecting the organisation's... ...application.
Collaborate with other software developers, business analysts and software architects to plan,
Participate in...
Remote job
...Understand their role within the organisation from an information security perspective and commit to protecting the organisation's... ...practices
Collaborate with other software developers, business analysts and software architects to plan, design, develop, test, and maintain...
Remote job
...practices and standards
Collaborating with product owners, architects, and developers to define API specifications
Ensuring the security and performance of the APIs
Integrating APIs with internal and external systems
Working with QA teams to automate API...
...contribute innovative solutions to the development process.
Experience with cloud services (AWS or Azure) is desirable.
Knowledge of security best practices, including experience in implementing security protocols and data protection measures.
This is a fully remote...
Remote job
...developer, you should be capable of handling many aspects of the application, including but not limited to performance, scalability, security, and testing.
A fully knowledgeable .NET developer can use .NET to build a highly distributed web application, a sophisticated...
Remote job
...Development
Job Description:
Flipside is a commercialization engine that powers blockchain growth. We activate 100,000+ analysts to produce insights, drive narratives, and transact, building emotional connection and a strong and active community that supports...
...ASP. net, . Net Frameworks.
Experience of range services from the Microsoft Azure Cloud Platform including Infrastructure and Security related services such as Azure AD, IaaS, PaaS, Containers, Storage, Azure Monitoring, Security, App Insights and Log Analytics Experience...
Remote job
...mentor and grow self-motivated less experienced team members
KEY RESPONSIBILITIES
Interact with business users, business analysts and other developers to understand new requirements
Write technical specifications and develop new functionality to company standards...
Remote job
...Product Specialist (to enhance product knowledge), you will configure specifications, and coordinate tasks with Payroll Business Analyst and QA . Collaborate with in country Compliance team (BA/QA) and in country UAT to ensure product delivery is aligned with country...
Remote job
...discovery, definition, implementation, and delivery) by collaborating directly with product engineers, product managers, designers, data analysts, and domain experts. While being primarily responsible for implementation, testing, rollout, and maintenance.
You have strong...
...Requirements:
AWS Cloud
PAAS
IAS
Experience in architecting and developing solutions for scalable, distributed systems
Security of AWS services, securing design of VPC architectures
RESTful APIs
Databases/SQL (PostgreSQL advantageous)
Docker /...
Remote job
...implementation of solutions and also provide support to Partnership Leads and the Advocacy Team who promote your designated products and secure use-case opportunities. You will contribute to building the aspirational OCL culture and will continually develop your own...
....
Ability to identify and implement process improvements.
Understand their role within the organisation from an information security perspective and commit to protecting the organisation's security information assets.
Ensures cost savings and efficiencies in areas...
Remote job
...and help shape the product architecture.
You will find new technical solutions to make industrial IoT and edge computing robust, secure, and usable in production-critical environments. High availability is key.
Provide on-call support for the edge platform (DevOps...
Remote job
...TypeScript, Node.js, Language Server, Git
Frontend Topics: TypeScript, CSS, Vue
Advocate for improvements to product quality, security, and performance that have a particular impact across your team.
Solve technical problems of high scope and complexity. Exert...
...requirements.
Takes personal accountability for service excellence.
Adheres to the company's work standards.
Information security
~ Understand their role within the organisation from an information security perspective and commit to protecting the organisation...
Remote job
...accommodations to all applicants throughout the application process.
Employees will act in accordance with the organization’s information security policies, to include but not limited to protecting assets from unauthorized access, disclosure, modification, destruction or...