206 Cloud Security Engineer jobs in South Africa

Cloud Security Engineer

Johannesburg, Gauteng Nedbank

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

To provide expert advice on complex aspects of information security within their fields of expertise. To identify and resolve complex technical issues related to security technologies. To collaboratively perform in-depth analysis with stakeholders on complex information security issues and provide optimum solutions which meet both business and technical requirements while aligning with the information security strategy. To analyse and enhance information security related processes with the aim to optimise work within the sphere of Information Security in its entirety. Working independently to deliver on work tasks. Pro-actively mentor staff. To ensure stability and up-time for areas the incumbent takes responsibility for; which also requires being available on demand to help solve issues outside of normal working hours

Job Responsibilities
  • Exposure in Large Cloud environments in both AWS and Azure
  • Experience in scripting and programming to facilitate automation via infrastructure as code
  • Experienced in working with large cross functional teams
  • Experienced in working in high pressure demanding environments
  • Initial focus will be to support of cloud Security environments for both Azure and AWS Support and maintain both Azure and AWS across Infrastructure as code, containers and applications pipelines
  • Very Strong networking Skills
  • Experience with multiple Security Technologies
  • Building relationships with I&O Teams
  • Linux: advanced knowledge and experience of REHL Kubernetes/ Docker – with experience on either AWS EKS or Azure AKS DevOps – infrastructure as Code, configuration management tools and monitoring Cloud experience for either Azure or AWS Automation covering CI/CD via multiple tool sets
  • A good knowledge of security covering the above-mentioned disciplines would be advantages
  • Contribute to a culture of transformation by participating in Nedbank culture building initiatives, business strategy, and CSI
  • Stay abreast of developments in field of expertise, ensuring personal and professional growth
  • Understand and embrace the Nedbank vision and values, leading by example
  • Seek opportunities to improve business processes, models and systems
  • Participate in Research and Development related to specific Information Security Technology
  • Participate in proof of technology and proof of concept
  • Contribute to the content of the curricula
  • Oversee the implementation of the changes and check for the shortcomings and risks
  • Expert in-depth interpretation of MIS and system logs/reports to correct any deviations against best practices
  • Identify and set selection criteria for new products
  • Participate in the implementation and hand over of new products as provided in the selection criteria
  • Keep abreast of information security policies, rules, standards and processes, procedures and practices, as well as business rules, introducing new industry concepts to information security.
  • Create and review all relevant processes and procedures mindful of current policies and standards
  • Create, maintain and review information security standards
  • Oversee and monitor environment per set standards
  • Review and contribute to project documentation
  • Mitigate risks. Implement specific Information security technologies. Gain further exposure and experience on multiple technologies
  • Log, submit and implement low, medium and high risk security changes independently
  • Provide guidance and supervision to Administrators and other analysts on implementation and changes
  • Oversee and ensure change was success
  • Support the achievement of the business strategy, objectives and values
  • Enable skilling and required corrective action to take place by sharing knowledge and industry trends with team
  • Obtain buy-in for developing new and/or enhanced processes that will improve the functioning of stakeholders' businesses
  • Provide technical mentoring related to specific security product. Participate in defining career stream and role requirements. Attend tech security industry forums and present technical papers
  • Provide technical mentoring both to Individual and specialist development projects
Preferred Scripting Languages
  • Python
  • PowerShell
  • Bash (Shell scripting
  • Terraform (HCL - HashiCorp Configuration Language)
  • YAML and JSON
Essential Qualifications - NQF Level
  • Advanced Diplomas/National 1st Degrees
Essential Certifications
  • CISSP , CISM or relevant qualifications (this is essential certification )
Preferred Certifications
  • SC-200: Microsoft Security Operations Analyst
  • SC-300: Microsoft Identity and Access Administrator
  • SC-400: Microsoft Information Protection Administrator
  • Microsoft Certified: Azure Security Engineer Associate
  • Microsoft Certified: Azure Solutions Architect Expert
  • Microsoft Cybersecurity Architect
  • AWS Certified Solutions Architect – Associate
  • AWS Certified SysOps Administrator – Associate
  • AWS Certified Solutions Architect – Professional
  • Strong certification/ knowledge on Linux Operating System
  • Strong knowledge in Linux virtualization

Minimum Experience Level

Minimum of 5 years’ experience Azure and Or AWS environments

Technical / Professional Knowledge
  • Administrative procedures and systems
  • Banking knowledge
  • Data analysis
  • Governance, Risk and Controls
  • Microsoft Office
  • Principles of project management
  • Relevant regulatory knowledge
  • Relevant software and systems knowledge
  • Business writing skills
  • Information Security Threats and Attact vectors
  • Cluster Specific Operational Knowledge
  • System Development Life cycle(SDLC)
  • TCP/IP
  • Information Security terms and definitions
  • Basic computer concepts
  • Information Security policies and procedures
  • Coaching
  • Decision Making
  • Technical/Professional Knowledge and Skills

---

Please contact the Nedbank Recruiting Team at +27 860 555 566

If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.

Nedbank Ltd Reg No 1951/0009/06.
Authorised financial services and registered credit provider (NCRCP16).

For assistance please contact the Nedbank Recruiting Team at +27 860 555 566

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cloud Security Engineer

Johannesburg, Gauteng Dina Gates Recruitment (Pty) Ltd

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

Key Experience:

  • At least 4-7 years of Cloud Experience (AWS, Azure or GCP (Google))
  • Securing cloud environments and protecting data.
  • Implementing security measures, monitoring cloud infrastructure for threats, and responds to security incidents.
  • May work with various security tools and technologies, including firewalls, intrusion detection systems, and identity and access management solutions.
  • Architecting Microsoft Azure Solutions Certification
  • Configuring and maintaining MS Azure PaaS & IaaS & SaaS offerings
  • Developing Microsoft Azure Solutions Certification
  • Exposure to Active Directory, Hyper-V (admin & config), IIS Administration, OS Internal concepts, Security experience
  • Implementing Microsoft Azure Infrastructure Solutions Certifications
  • Microsoft Management tools (SCOM, SCCM, SCSM, MS Orchestrator (Opalis))
  • MS SQL Server performance tuning
  • Server clustering experience
  • Understanding of security and segregation of duty requirements for an enterprise system
  • Working knowledge with Networking Concepts including VIPs, NAT, DNS, Networking Tools (ping, tracert, tracemon, NetMon, wire shark, etc), and Scripting Tools (Powershell & XML)

Qualifications:

  • Senior Certificate or NQF 4 equivalent
  • Bachelor’s Degree in Computer Science or equivalent is an advantage
  • Relevant Cloud Security Certifications

Soft Skills:

  • Collaborative personality with excellent communication and presentation skills with the ability to interact effectively with all levels in the organization
  • Excellent Analytical Skills
  • Excellent organizational skills with the ability to visualize the big picture and manage minute details
  • Excellent problem-solving skills
  • Excellent time management
  • Excellent training skills
  • Excellent writing skills (English)
  • Motivated and strong work ethic

Scope of Work:

  • Actively participate in Continuous Improvement initiatives
  • Cloud Infrastructure Design/Architecture definition
  • Customer Cloud Infrastructure maintenance
  • Customer Environment Deployment
  • Customer Support on Environments
  • Cyber Security Regulations
  • Design, provision, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure
  • Engage with business users, analysts, and peers to provide solutions following a defined Application Lifecycle Management (ALM) process
  • Estimation of Architecture Costs
  • Performance Monitoring, proactive management, and Reporting
  • Server Administration
This advertiser has chosen not to accept applicants from your region.

Cloud security engineer

New
Johannesburg, Gauteng Dina Gates Recruitment

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Key Experience: At least 4-7 years of Cloud Experience (AWS, Azure or GCP (Google)) Securing cloud environments and protecting data. Implementing security measures, monitoring cloud infrastructure for threats, and responds to security incidents. May work with various security tools and technologies, including firewalls, intrusion detection systems, and identity and access management solutions. Architecting Microsoft Azure Solutions Certification Configuring and maintaining MS Azure Paa S & Iaa S & Saa S offerings Developing Microsoft Azure Solutions Certification Exposure to Active Directory, Hyper-V (admin & config), IIS Administration, OS Internal concepts, Security experience Implementing Microsoft Azure Infrastructure Solutions Certifications Microsoft Management tools (SCOM, SCCM, SCSM, MS Orchestrator (Opalis)) MS SQL Server performance tuning Server clustering experience Understanding of security and segregation of duty requirements for an enterprise system Working knowledge with Networking Concepts including VIPs, NAT, DNS, Networking Tools (ping, tracert, tracemon, Net Mon, wire shark, etc), and Scripting Tools (Powershell & XML) Qualifications: Senior Certificate or NQF 4 equivalent Bachelor’s Degree in Computer Science or equivalent is an advantage Relevant Cloud Security Certifications Soft Skills: Collaborative personality with excellent communication and presentation skills with the ability to interact effectively with all levels in the organization Excellent Analytical Skills Excellent organizational skills with the ability to visualize the big picture and manage minute details Excellent problem-solving skills Excellent time management Excellent training skills Excellent writing skills (English) Motivated and strong work ethic Scope of Work: Actively participate in Continuous Improvement initiatives Cloud Infrastructure Design/Architecture definition Customer Cloud Infrastructure maintenance Customer Environment Deployment Customer Support on Environments Cyber Security Regulations Design, provision, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure Engage with business users, analysts, and peers to provide solutions following a defined Application Lifecycle Management (ALM) process Estimation of Architecture Costs Performance Monitoring, proactive management, and Reporting Server Administration
This advertiser has chosen not to accept applicants from your region.

Information Security Officer

EFT Corp.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Please select a reason for contacting us* I want to enquire about your services Other

What is your role in your organisation

What is your desired timeframe for the project to go live?

In which region(s) do you plan to offer your product/solution?

What are you interested in?

How did you find out about us?

I accept Terms and Conditions

I would like to receive EFT Corporation News and Updates

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form.

At EFT Corporation, success starts with people. Our team of 290+ professionals works across the United Kingdom, South Africa, Zambia, Ghana, Kenya, Mauritius, Zimbabwe, and India, bringing together deep local knowledge and shared ambition.With over 25 years of experience, we partner with more than 100 financial institutions to deliver secure, modern payment solutions that improve access and make everyday transactions easier. We're building the future of payments through smart technology, strong partnerships, and a clear focus on progress.

Why You'll Love Working Here:
  • Career Development: We invest in your future by providing continuous learning, mentorship, and growth opportunities.
  • Work-Life Balance: We support flexible work arrangements and wellness programs to ensure you can thrive both professionally and personally.
  • Impact-Driven Work: Be part of a company driving innovation and transforming financial services across Africa.
  • Diversity, Equity & Inclusion Commitment: Be part of a workplace where everyone feels valued and appreciated
Your Role
  • As an Information Security Officer , your job purpose is to be held accountable in respect to assisting the Senior Security and Infrastructure Engineer and the Senior DevOps Engineers in the following:
    • Assisting in maintaining the safety and security of the organisation’s systems and network database to prevent unauthorized access and avoid data breaches.
    • Maintaining the organisation’s systems and networks.
    • Assisting in overseeing the entire software development process, from planning and development to deployment and maintenance.
    • This role requires expertise in both software development and operations, as well as an understanding of the DevOps methodology.
    • This includes CI/CD, Infrastructure management (AWS), Automation, Monitoring, logging and metrics, Collaboration and Security.
    • The role also requires a significant focus on PCI compliance and support and collaboration with the Security and Infrastructure team is required.
  • You will be responsible for owning the Futurex HSM and Thales HSM device management which includes:
    • Yearly Key management/replacement ceremonies.
    • PCI compliance as it relates to the HSM.
  • Assisting with new security compliance:
    • ISO27001.
    • PCI+PIN.
What You’ll Do Maintain Operational Systems, Networks and Security:
  • Facilitate annual PCI audits.
  • Linux Operating systems are security patched in a timely manner. If patching will affect customers, arrange with operations support, and follow the correct change control process.
  • Maintain Elastic SIEM.
  • Respond to and investigate SIEM alerts.
  • Respond to operational system alerts and/or operational queries across the entire technology stack (Production and QA system issues, infrastructure issues, Databaseissues, Network issues, Security and Firewall issues and any 3rd party or customer integration issues) as they occur.
  • Manage / Deploy system tooling that may be beneficial to the business.
  • Research, POC and deploy new open source or when applicable closed source tooling that is beneficial to the business systems or processes. This can be in supporting Applications, Monitoring, Logging, SIEM, AI/machine Learning, Fraud Detection, Operational Support applications, Authentication systems, BI / Data Analytics, networks, Security or compliance.
  • Create ad hoc Python scripts / Applications to perform various repetitive tasks.
  • Ensure that AWS environments and services are architectured and configured in a secure and redundant manner including all security services from AWS.
  • Maintain AWS services including but not limited to: VPC, EC2, ECS, ECS Fargate, ECR, Guard Duty, Cloudwatch, Cloudtrail, Security groups, VPC Routing, Site to Site VPNs, Application Load balancers / network load balancers, Web application firewalls,etc.
  • Architect, support and maintain connectivity between 3rd parties, Banking partners, integrators and on prem datacentres.
  • Ensure best practice security measures are implemented.
  • Ensure best practices regarding system isolation and scope reduction.
  • Provide support to field engineers on HSMs and key management.
  • Maintain internal HSMs and key management procedures.
  • Provide support to the product and SLDC teams – this includes consulting on design, finding compliant solutions for customer issues, and filling out cyber risk assessments for customers or tenders.
Regulatory Compliance:
  • Maintain/Improve (PC14) PCI.
  • GDPR.
  • Ensure Security, Infrastructure & Procedures (with supporting team) are comprehensive and kept up to date.Security Tooling:
  • Ensure SSO, Intrusion detection, SIEM, Antivirus, Patch Management and PGP are implanted as per the polices.
  • Stimulation / adoption of user-driven security culture (give security a brand within the org and educate).
Automation:
  • To increase efficiency and reduce errors for both security and infrastructure management.
  • To reduce costs (optimize) without sacrificing performance and security.
Perform Security Activities & Reporting:
  • Ensure that weekly vulnerability scans results are tracked, and vulnerabilities are remediated within set severity timeframes weekly.
  • Review all daily and weekly BAU PCI Items for signoff monthly.
  • Ensure weekly Internal and External Scans were completed.
  • Perform data analysis reporting monthly.
  • Maintain a strong security posture within the card holder environment.
  • Work with 3rd party to ensure PCI Certification Audit is completed and passed on time.
  • Review Security Commitment to third parties.
What We’re Looking For Qualification & Experience:
  • Bachelor’s degree in Computer Science or related field.
  • 3 years’ relevant experience.
  • Experience within the payment / banking sector.
  • Experience working with PCI Audits / Security in DevOps, Linux, Mysql, Cloud (AWS).
  • Network experience (particularly cloud based / virtual).
Skills & Knowledge Required:
  • PCI Audits / Security / Processes.
  • Linux, Mysql, and Cloud (AWS).
  • Experience with automation tools like CloudFormation, Ansible, Puppet, Chef, etc.
  • Cloud knowledge, specifically AWS.
  • Logging Frameworks: ELK stack, cloudwatch, etc.
  • Monitoring and Alerting Framework: Zabbix, Nagios, etc.
Personal Attributes:
  • Ability to learn new technologies at pace.
  • Problem solving.
  • Ability to work within a high stress & flux environment.
  • Ability to foster & cultivate relationships with internal & external stakeholders.
  • Ability to work autonomously as well as part of a team.
  • Assertiveness – communicating feelings and beliefs; being non-offensive.
  • Detail & deadline oriented.
  • Analytical & critical thinking.
  • Celebrate Your Special Day: Enjoy a dedicated day off to celebrate your birthday.
  • Wellbeing Matters: Maintain a healthy work-life balance with up to 3 days of wellbeing leave annually.
  • Family Comes First: Support your loved ones when it matters most with up to 20 days of family responsibility leave.
Our Values
  • Empowerment
    We trust our team to lead, make decisions, and drive outcomes.
  • Financial Inclusion for All
    We build payment solutions that broaden access and support diversity.
  • Technology with Purpose
    We design tech that simplifies and improves every transaction.
  • Customer-Centric
    Our customers are at the heart of everything we do.

Join EFTCorporation and help shape simpler, more inclusive payments for millions across Africa.

Ready to make your mark? Apply Now

EFT Corporation is an Equal Opportunity Employer. Diversity drives our success, and we welcome passionate individuals from all walks of life to join our team.

EFT Corporation does not accept unsolicited resumes from search firms/recruiters. EFT Corporation will not pay any fees to search firms/recruiters if a search firm/recruiter submits a candidate unless an agreement has been entered into concerning the specific open position(s). Search firms/recruiters offering resumes to EFT Corporation on an unsolicited basis shall be deemed to accept this condition, regardless of any other provision to the contrary.

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Architect

Johannesburg, Gauteng InfyStrat

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities:

  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
  • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
  • Define portfolio vision and reusable security patterns aligned with the EA strategy.
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
  • Manage security architects and mentor engineers, developers, and vendors.

What will you bring?

  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
  • Teamwork and Energy – work across different functional and business teams with effective collaboration.
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

Requirements / Skills and Competence

  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture.
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures.
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
  • Good experience in security architecture design in Cloud and on-prem.
  • Design and implementation of IOT, endpoint protection, and secure IAM.
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Consultant

Cape Town, Western Cape iLaunch (Pty) Ltd

Posted 19 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis.

Responsibilities
  • Security Auditing
  • Responsible for Security tools monitoring
  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Operating System management and Hardening
  • Anti-Virus System management and Configuration
  • Logical Access Management
  • Vulnerability Management
Minimum Requirements
  • Matric and an Information Technology diploma or degree qualification
  • 4+ years experience in the field
Package & Remuneration

Salary: Market Related

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security consultant

New
Cape Town, Western Cape ILaunch

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job Description Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis. Responsibilities Security Auditing Responsible for Security tools monitoring Network experience (TCP/IP, Firewalls, IPS, NAC) Operating System management and Hardening Anti-Virus System management and Configuration Logical Access Management Vulnerability Management Minimum Requirements Matric and an Information Technology diploma or degree qualification 4+ years experience in the field Package & Remuneration Salary: Market Related #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cloud security engineer Jobs in South Africa !

Information security specialist

Durban, KwaZulu Natal Network Recruitment

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job & Company Description: An opportunity has become available for a Information Cyber Security Specialist to join a leading and well established multi-listed client in Durban. The successful candidate will have exposure to vulnerability management, to build architectural frameworks as well a doing risk assessments amongst other key functions. In essence,we are looking for a techie who has moved into the information security space from a strategic level dealing with Security, Risk, Vulnerability and Compliance. Job Experience & Skills Required: Minimum of a Diploma or Bachelor Degree in IT, Information Security or Information Systems 3+ years' Information Security specialising in Vulnerability Management and Cybersecurity Background experience on Network, Infrastructure and Web Security (advantageous) Experience doing risk assessments from scratch Build architectural frameworks would be a strong advantage Knowledge of ISO 27001 and NIST (Nice to have) Any of the following certifications would be advantageous: CISSP, CISM, CISA, CISO If you are interested in this opportunity, please apply directly or email your CV to For more IT jobs, please visit If you have not had any response in two weeks, please consider the vacancy application unsuccessful. Your profile will be kept on our database for any other suitable roles / positions. For more information contact: Luan French on / Branch Manager #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security architect

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job title: Information Security Architect Contract duration: Start with 6 months First preference: EEE candidates Location: JHB The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital. Key Responsibilities: Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems. Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS. Evaluates and selects security technologies, tools, and frameworks to support the organization’s security. Define portfolio vision and reusable security patterns aligned with the EA strategy. Lead architecture reviews for high-risk projects, driving recommendations to resolution. Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance. Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Experience with Cloud Security platform vendors and technologies such as Azure and AWS. Manage security architects and mentor engineers, developers, and vendors. What will you bring? Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls. Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items. Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture. Teamwork and Energy – work across different functional and business teams with effective collaboration. Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and Dev Sec Ops toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking. Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards. Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF). Requirements / Skills and Competence Tertiary qualification in Computer Science, Engineering, or related field (preferred) Minimum of 5-10 years of experience in Security Architecture. CISSP, CISA, CISM, or other relevant security-related designation(s) preferred. Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP) Experience in identifying gaps in existing architectures. Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid Iaa S/Paa S/Saa S solutions. Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies. Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business. Good experience in security architecture design in Cloud and on-prem. Design and implementation of IOT, endpoint protection, and secure IAM. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products Knowledge of web application architectures and threat modelling. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security consultant

Cape Town, Western Cape ILaunch

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job Description Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis. Responsibilities Security Auditing Responsible for Security tools monitoring Network experience (TCP/IP, Firewalls, IPS, NAC) Operating System management and Hardening Anti-Virus System management and Configuration Logical Access Management Vulnerability Management Minimum Requirements Matric and an Information Technology diploma or degree qualification 4+ years experience in the field Package & Remuneration Salary: Market Related #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cloud Security Engineer Jobs