43 Conducting Vulnerability Assessments jobs in Johannesburg
Security Analyst - Penetration Testing & Red Teaming
Posted 2 days ago
Job Viewed
Job Description
Security Analyst - Penetration Testing & Red Teaming
Johannesburg, South Africa
Job Openings Security Analyst - Penetration Testing & Red Teaming
About the job Security Analyst - Penetration Testing & Red TeamingExciting Opportunity: Security Analyst: Penetration Testing & Red Teaming Specialist
Our client is looking for a talented Security Analyst who is ready to take on a variety of security assessments and grow their career in a high-energy, cutting-edge environment.
Responsibilities:
Penetration Testing:
- Collaborate within a team of experts to conduct vulnerability assessments and penetration tests across a wide range of technologies.
- Assess network, application (web and thick client), mobile, wireless, social engineering, and physical security, using both automated and manual techniques.
- Engage with clients professionally to deliver insights and constructive feedback, ensuring their security needs are met.
- Dive deep into security topics like network, database, and application security, developing your expertise along the way.
- Leverage your skills with penetration testing tools to uncover vulnerabilities and improve security measures.
Red Teaming:
- Become part of an elite Red Team, focusing on reconnaissance using open-source intelligence (OSINT) to gather actionable data.
- Take the lead in compromising systems by identifying vulnerabilities in people, processes, and technology.
- Develop and deploy command-and-control servers and custom payloads, establishing persistence within target environments.
- Evolve your craft by creating new tools, techniques, and procedures to avoid detection by defenders.
- Work on escalation, maintaining long-term access to compromised networks, and exfiltrating critical data.
Research and Development:
- Stay ahead of the curve by researching and identifying new vulnerabilities, focusing on high-profile products and systems.
- Understand and analyze the latest tactics used by threat actors to craft innovative security strategies.
- Develop and refine attack methodologies that will be used to strengthen future defensive efforts.
Requirements:
Experience:
- 2-5 years' hands-on Penetration Testing, including a strong background in network, mobile, web, and wireless security assessments.
- Strong understanding of common vulnerability assessment and penetration testing tools.
- Ability to think critically and creatively to solve complex security challenges.
- Strong communication skills for both internal collaboration and client-facing interactions.
- Passion for continuous learning and staying updated on the latest in cybersecurity.
Security analyst - penetration testing & red teaming
Posted today
Job Viewed
Job Description
Security analyst - penetration testing & red teaming
Posted today
Job Viewed
Job Description
Information Security Lead
Posted today
Job Viewed
Job Description
Join Interfile—South Africa’s leading Electronic Bill Presentment & Payment (EBPP) fintech—where we design, build, and run large-scale digital services used by millions, partnering with top banks, major corporates, and government. You’ll work on modern architectures across both new builds and enhancements in a culture that prizes innovation, seamless integration, and exceptional delivery. We’re customer-obsessed and known for helping organizations modernise. Our Fourways office—right across from Montecasino—offers a modern workspace with a Vitality-certified gym, canteen, and great chill areas.
Purpose of the role:
Lead and continuously improve our information security posture across on-prem and cloud—covering platforms, hardware, networks, and data centres. You’ll drive vulnerability remediation through both automation and hands-on work, ensure compliance with POPIA, and design, implement, and uplift security standards and frameworks (e.g., ISO 27001/27002, NIST CSF 2.0). You’ll also own risk management and incident response while championing a security-first culture across the business.
Responsibilities:
- Security Assessment & Management
- Conduct regular security assessments across infrastructure, applications, and data environments.
- Implement and manage SAST and DAST tools and processes.
- Track, report, and drive remediation of vulnerabilities and security issues.
- Security Posture & Reporting
- Develop and maintain dashboards and reports that clearly communicate the organization’s security posture.
- Define and track KPIs for security posture, remediation velocity, and compliance.
- Collaborate with internal teams to ensure visibility and accountability for remediation efforts.
- Automation & Remediation
- Design and implement automated security controls and remediation workflows.
- Work with DevOps and IT teams to integrate security into CI/CD pipelines.
- Compliance & Regulatory Alignment
- Ensure alignment with POPIA and other applicable data protection regulations.
- Support audits and compliance reporting requirements.
- Work with legal and compliance teams to ensure data handling aligns with privacy laws.
- Standards & Frameworks
- Contribute to the design and rollout of security standards such as ISO 20027.
- Align security practices with NIST CSF 2.0 and other relevant frameworks.
- Risk Management
- Conduct risk assessments and maintain a security risk register.
- Collaborate with business units to understand and mitigate security risks tied to operations and products.
- Incident Response & Forensics
- Develop and maintain incident response plans.
- Lead investigations into security breaches and coordinate post-incident reviews.
- Security Awareness & Training
- Design and deliver security awareness programs for staff.
- Promote a security-first culture across technical and non-technical teams.
- Third-Party & Vendor Security
- Assess and manage security risks related to vendors, partners, and third-party services.
- Ensure contracts and SLAs include appropriate security clauses.
- Secure Architecture & Design
- Participate in solution architecture reviews to ensure security is embedded from the start.
- Advise on secure design patterns and threat modeling.
Requirements (Essential):
- Bachelor’s degree in Information Security, Computer Science, or related field.
- At least one security certification: CISSP, CISM, CEH, CompTIA Security+, ISO 27001 Lead Implementer (or similar).
- 5+ years in an information security role (or similar).
- Proven security experience across infrastructure, applications, and data environments.
- Hands-on with SAST/DAST tools (e.g., SonarQube, OWASP ZAP, Burp Suite).
- Strong vulnerability management and remediation workflow expertise.
- Familiarity with automation/scripting (e.g., Python, PowerShell) and CI/CD tooling.
- Working knowledge of POPIA and other data-protection regulations.
- Experience with security frameworks (e.g., NIST CSF, ISO 27001/27002).
- Ability to communicate technical risks and remediation plans to non-technical stakeholders.
Nice to Have (Desirable)
- Proactive, detail-oriented, strong sense of ownership.
- Comfortable collaborating across multiple teams and disciplines.
- Passion for security, compliance, and continuous improvement.
- Multiple or advanced security certifications.
Information Security Architect
Posted 2 days ago
Job Viewed
Job Description
Job title: Information Security Architect
Contract duration: Start with 6 months
First preference: EEE candidates
Location: JHB
The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.
Key Responsibilities:
- Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
- Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
- Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
- Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
- Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
- Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
- Define portfolio vision and reusable security patterns aligned with the EA strategy.
- Lead architecture reviews for high-risk projects, driving recommendations to resolution.
- Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
- Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
- Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
- Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
- Manage security architects and mentor engineers, developers, and vendors.
What will you bring?
- Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
- Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
- Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
- Teamwork and Energy – work across different functional and business teams with effective collaboration.
- Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
- Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
- Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).
Requirements / Skills and Competence
- Tertiary qualification in Computer Science, Engineering, or related field (preferred)
- Minimum of 5-10 years of experience in Security Architecture.
- CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
- Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
- Experience in identifying gaps in existing architectures.
- Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
- Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
- Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
- Good experience in security architecture design in Cloud and on-prem.
- Design and implementation of IOT, endpoint protection, and secure IAM.
- Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
- Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
- Knowledge of web application architectures and threat modelling.
Information Security Specialist
Posted 2 days ago
Job Viewed
Job Description
ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.
TASK AND RESPONSIBILITIES:
- Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
- Perform research, testing, evaluating, and deployment of security technology and procedures.
- Run diagnostics on any changes to data to verify any undetected breaches.
- Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
- Develop and implement information security standards, guidelines, and procedures.
- Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
- Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
- Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.
FUNCTIONAL KNOWLEDGE:
Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.
MINIMUM REQUIREMENTS• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.
EXPERIENCE• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.
#J-18808-LjbffrInformation Security Manager
Posted today
Job Viewed
Job Description
Designation:
Information Security Manager | Waterfall, Midrand, Gauteng | Permanent
Category:
Information Technology
Job Level:
Professionally qualified and experienced specialists and mid-management
Posted by:
PSG Financial Services
Posted on:
03 Oct 2025
Reference Number:
POS08450
Closing date:
30-Oct-2025
Position Type:
Permanent
Location:
Waterfall Magwa Crescent
Overview:
VACANCY | INFORMATION SECURITY MANAGER | WATERFALL, MIDRAND, GAUTENG | PERMANENT
PSGs commitment to transform and embrace diversity is what drives us to achieve a diverse workplace with employment equity as a key goal to create an inclusive workforce. In achieving our employment equity goals, we give preference to applicants from designated groups, and we encourage people with disability to apply.
Job description:The Information Security Manager will lead PSG's cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).
Responsibilities:Strategic Leadership & Governance
- Develop and maintain PSG's enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
- Establish and enforce security governance frameworks, policies, and standards.
- Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
- Lead the implementation of relevant security compliance initiatives.
- Collaborate with divisional CIOs and executive leadership to align security posture across business units.
- Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.
- Design secure solutions for hybrid environments (on-prem + Azure).
- Integrate security into infrastructure and application projects.
- Manage identity and access controls, including Azure AD, MFA, and privileged access management.
- Manage day-to-day security monitoring, incident handling, and threat intelligence.
- Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
- Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
- Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
- Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.
- Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
- Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
- Support procurement and vendor management for security solutions.
- Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
- Define SOC roles, workflows, and incident response playbooks.
- Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
- Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
- Coordinate with external threat intelligence providers and law enforcement when necessary.
- Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
- Ensure timely patching, configuration updates, and feature adoption.
- Maintain compatibility and integration of security tools with PSG's hybrid infrastructure.
- Document system configurations and update operational procedures regularly.
- Conduct regular risk assessments, vulnerability scans, and penetration tests.
- Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
- Maintain a risk register and track mitigation actions.
- Coordinate internal and external audits and ensure timely remediation of findings.
- Lead organization-wide cybersecurity awareness programs.
- Deliver targeted training for IT, business, and executive teams.
- Promote secure behaviour and incident reporting culture.
- Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
- Define clear roles, responsibilities, and performance expectations.
- Conduct regular coaching, performance reviews, and career development planning.
- Foster a culture of accountability, innovation, and continuous improvement.
- Promote cybersecurity awareness and ownership across all departments.
- Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.
- Bachelor's degree in Computer Science, Information Technology, or related field.
- 8+ years of IT Security experience, with 5+ years in a leadership role.
- CISSP, CISM, or equivalent
- Microsoft Certified: Cybersecurity Architect Expert
- GIAC Security Operations (GSOM) or equivalent SOC certification
- Familiarity with scripting (PowerShell, Bash) and automation tools.
- Microsoft 365 and SharePoint Online
- Proven experience in cybersecurity leadership within hybrid cloud environments.
- Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
- Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
- Experience managing BYOD environments and securing distributed branch networks.
- Familiarity with ISO/IEC 27001, ISO/IEC 2000, NIST, and CIS controls.
- Excellent communication, stakeholder engagement, and team leadership skills.
- Technical documentation
- Strong leadership and problem-solving skills.
- Attention to detail
- Decision making
- Leadership
- Attention to detail
- Resilience
- Good verbal and written communication skills
- Time management skills
- Deadline driven
Candidates interested must apply here by no later than 30 October 2025 OR browse available PSG Careers vacancies
By submitting your application, you are giving PSG Financial Services implicit consent to the storage and processing of your personal information. If you are not contacted within 4 weeks of your application, please accept that your application was not successful. For more information about careers at PSG, visit
Be The First To Know
About the latest Conducting vulnerability assessments Jobs in Johannesburg !
Information security specialist
Posted today
Job Viewed
Job Description
Information security lead
Posted today
Job Viewed
Job Description
Information security specialist
Posted today
Job Viewed