×
Register Here to Apply for Jobs or Post Jobs. X

Intermediate Software Development Engineer

Job in Cape Town, 7100, South Africa
Listing for: Winning Form
Full Time position
Listed on 2026-01-14
Job specializations:
  • Software Development
    Software Engineer, Data Engineer
Job Description & How to Apply Below

Intermediate Software Development Engineer

Cape Town, Western Cape, South Africa (Hybrid)

Job Info
  • Job Identification 763
  • Job Category Information and Communication Technology
  • Posting Date 01/07/2026, 09:53 AM
  • Locations 3, Cape Town, Western Cape, 7441, ZA (Hybrid)
  • Apply Before 02/27/2026, 09:53 AM
About Us

We Don t Just Recruit Talent... We Cultivate It

BET Software is one of the most diverse betting software providers in Sub-Saharan Africa, with a rapidly growing international footprint. Our multiskilled Team is responsible for providing advanced software solutions, while supporting incredibly high transactional volumes in a fast-paced industry, making BET Software a lively and engaging place to be.

Our progressive use of technology enables our talented Team to work with the tech stack of their choice and we encourage an environment and culture that supports collaboration, learning, and growth. We believe that our strength lies in our diversity and that Teamwork makes the dream work, a place where you can flourish amongst like-minded individuals.

We are a dynamic group of people that stem from a variety of cultures, backgrounds, and locations. While our head office is based in Umhlanga, South Africa we recruit talent throughout South Africa and Internationally.

Responsibilities

Perform Planning

  • Work on objectives or goals within timeline.
  • Consider all reasonable factors, impediments and obstacles.
  • Identify potential alternative strategies and refactor approach for maximum benefit within the shortest possible time.

Technical Outputs:

Perform Planning

  • Identify and establish objectives for self and team.
  • Work on objectives or goals within timeline.
  • Consider all reasonable factors, impediments and obstacles.
  • Identify potential alternative strategies and refactor approach for maximum benefit within the shortest possible time.

Implementation - Ensure the Solution is Functionally Complete

  • Deliver a solution which covers all the agreed specified tasks and user objectives.
  • Deliver a correct solution which provides the correct results with the needed degree of precision.
  • Ensure checked code is reviewed to ensure standards are met.

Implementation – Ensure the Solution is Reliable

  • Ensure the solution performs appropriately under agreed conditions for extended periods of time without the need for intervention.
  • Ensure all steps are taken to reduce the occurrence of faults due to misunderstood requirements, design errors, and implementation errors.
  • Ensure the solution is robust and remains continually available.
  • Respond to outages and failures when and where needed.
  • Improve fault tolerance even when operational conditions are not optimal.
  • Ensure complete data recoverability so that data may be recovered and the desired state of the solution can be re-established.
  • Ensure the solution is maintainable and actively seek methods to reduce downtime.
  • Ensure the solution is durable so that as user volumes and requirements change the solution can evolve over the long term.
  • Ensure the solution simplifies support and maintenance support through traceability and effective error messaging.
  • Ensure over time the solution becomes more mature where the interval between interventions to remain operational becomes less frequent.
  • In the event of a failure reduce effective downtime to the minimum possible.

Implementation – Ensure the Solution has Effective Security

  • Ensure the solution is secure and confidential by protecting all information and data (also data transmission).
  • Ensure persons or other solutions have the degree of access appropriate to their level of authorization and types.
  • Ensure the solution has high integrity where the solution prevents unauthorised access to, modification of computer programs, data, or settings.
  • Ensure the solution has a high degree of survivability despite third-party interventions.
  • Employ logs and records so that actions and events can be proven to have taken place and cannot be disputed later.
  • Ensure wherever possible actions can be traced uniquely to the entity which performed it.
  • Wherever possible the identity of an entity can be proven to be the correct one.

Implementation – Ensure the Solution is Maintainable

  • Ensure the solution…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary