119 Cybersecurity jobs in South Africa

Cybersecurity Engineer

George, Western Cape TMC TECHNOLOGIES

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

Share this job as a link in your status update to LinkedIn.

Job Title

Cybersecurity Engineer

Location

King George, VA 22485 US (Primary)

Category

Information Technology

Job Type

Full-time

Staff

Education

Bachelor's Degree

Travel

Security Clearance Required

Ability to obtain and maintain a U.S. Security Clearance

Job Description

TMC Technologies is looking for a Cybersecurity Engineer to join our team supporting the mission of the Naval Surface Warfare Dahlgren Division (NSWCDD). The TMC team provides development and maintenance of tactical initiatives and baseline developments in support of Naval Weapons Systems /Combat Systems (e.g. AEGIS, Aegis BMD, FMS, etc). The Computer Program Engineering Services (CPES) provided include support for Weapon System Element and Combat System Domain Engineering, Fleet and Land Based Test Site Support.

TASKING:

Engineering support for technical implementation of cybersecurity solutions in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration.

Conduct vulnerability research, malware analysis, penetration testing, and reverse engineering development of computer network operations, as required.

Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and applications and perform proof-of-concept, product evaluation of those tools and applications to determine feasibility of meeting the Navy’s cybersecurity requirements.

Responsible for researching, deriving, and documenting cybersecurity requirements as they relate to Navy tactical applications at the A-Level and B-Level specifications. These cybersecurity requirements must align with Department of Navy (DoN) cybersecurity instructions 8500.1 and NAVSEA 9400.2, plus other combat system-specific requirements documented in PEO IWS 5239.1.

Responsible for mapping and evaluating specific cybersecurity guidance and controls documented in CNSSI1253, NIST 800-53, and NIST 800-125B, etc., against the associated A-level and B-level specification cybersecurity requirements.

Generate Plans of Action and Milestones (POA&Ms) for the tasking and ability to monitor and track task completion against plan and define mitigation strategies due to task re-planning

Job Requirements

Ability to obtain a Secret security clearance (US Citizenship required)

Bachelor’s Degree in Computer Science or related field

Knowledge of cybersecurity concepts that identify, exploit, protect against, or mitigate cyber security vulnerabilities

Knowledge of Virtual Machine (VM) architecture and configurations is preferred

We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law.


Whether you’re interested in your next big role or would just like to join our network, we’d love to hear from you!
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Specialist

Johannesburg, Gauteng SavageOne Pty Ltd

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

The Cybersecurity Specialist is responsible for ensuring the security of systems, networks, and data, defending against breaches, vulnerabilities, and cyber-attacks. The role requires an in-depth understanding of security protocols, tools, and best practices to protect the organizations assets from cyber threats. Cybersecurity specialists are tasked with monitoring, detecting, and mitigating potential risks, while ensuring compliance with security regulations and standards. This position is crucial in maintaining the integrity and confidentiality of data and systems, as well as safeguarding against evolving cyber threats in a rapidly changing digital landscape.

Key Skills:
  • Security Tools: Proficient in using security tools and systems such as firewalls , Intrusion Detection Systems (IDS) , Intrusion Prevention Systems (IPS) , and Security Information and Event Management (SIEM) platforms to monitor and protect IT environments.
  • Protocols & Encryption: Strong knowledge of HTTPS , SSL/TLS , and VPN protocols for securing data in transit and protecting user privacy.
  • Scripting: Ability to automate security tasks, data collection, and analysis using scripting languages like Python and PowerShell .
  • Compliance Standards: Knowledge and experience in compliance frameworks such as GDPR , ISO 27001 , PCI-DSS , and HIPAA to ensure that security practices align with legal and regulatory requirements.
  • Threat Analysis: Expertise in performing risk assessments, identifying potential threats, and implementing appropriate mitigation strategies.
  • Incident Response: Understanding of incident detection and response processes, including analyzing logs and network traffic to identify malicious activity.
Responsibilities:
  • Conduct Vulnerability Assessments and Penetration Testing:
    Perform regular vulnerability assessments to identify weaknesses in the system and infrastructure. Conduct penetration testing to simulate cyber-attacks and assess the systems resilience against threats.
  • Develop and Enforce Security Policies:
    Design, implement, and enforce organizational security policies and procedures to safeguard systems and data. Ensure compliance with industry standards and internal guidelines.
  • Monitor and Respond to Security Incidents:
    Continuously monitor network traffic, system logs, and alerts from security tools to detect and respond to potential threats in real-time. Take proactive measures to mitigate any security breaches, from malware outbreaks to unauthorized access.
  • Security Infrastructure Management:
    Configure and manage firewalls, IDS/IPS systems, and other security tools to provide proactive protection against attacks. Optimize security settings for both internal and external communications.
  • Conduct Security Awareness Training:
    Educate employees about best practices for maintaining security hygiene, recognizing phishing attempts, and adhering to organizational security policies.
  • Risk and Threat Analysis:
    Evaluate potential risks to the organizations digital assets and infrastructure. Continuously assess emerging threats and adjust security measures accordingly to stay ahead of evolving attack strategies.
  • Incident Forensics and Reporting:
    Investigate security incidents, identify the root cause, and recommend improvements to prevent future occurrences. Document incidents, responses, and remediation efforts for compliance and reporting purposes.
  • Collaboration with Other Teams:
    Work closely with IT, development, and operational teams to ensure security is integrated into all processes and systems from the outset, particularly in the case of new technology deployments or system updates.
  • Continuous Improvement:
    Stay current with the latest cybersecurity trends, emerging threats, and evolving attack vectors. Recommend and implement improvements to the security infrastructure, tools, and processes.
Preferred Qualifications:
  • Certifications like Certified Information Systems Security Professional (CISSP) , Certified Ethical Hacker (CEH) , Certified Information Security Manager (CISM) , or CompTIA Security+ are highly preferred.
  • Experience with advanced threat detection tools and techniques (e.g., AI/ML-based security systems ).
  • Proficiency in analyzing network traffic using Wireshark or similar tools.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity specialist

Sandton, Gauteng ICTEngage

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

We are seeking a Cybersecurity Specialist to join our dynamic IT and security operations team. The ideal candidate will be responsible for protecting enterprise systems, networks, and client environments from internal and external threats. This role involves proactive threat detection, vulnerability assessments, incident response, and security architecture reviews across hybrid and cloud platforms.

Key Responsibilities

  • Monitor, analyze, and respond to security incidents across on-premises, cloud, and hybrid environments.
  • Perform vulnerability assessments, threat modeling, and penetration testing using industry tools and frameworks.
  • Implement and manage endpoint protection platforms, EDR, and SIEM systems (e.g., SentinelOne, Sophos, FortiSIEM, Microsoft Defender).
  • Develop and enforce IT security policies, procedures, and awareness training programs.
  • Coordinate incident response efforts and lead investigations, containment, and remediation.
  • Manage firewall policies, VPN configurations, and access control across networks.
  • Conduct security reviews of applications, systems, and infrastructure for compliance and best practices.
  • Assist in client cybersecurity onboarding and provide expert advisory support to clients and internal teams.
  • Stay current on evolving cyber threats, vulnerabilities, and regulatory compliance standards (e.g., POPIA, GDPR, ISO 27001).
  • Document risks, controls, and maintain reports for audits and management dashboards.

Requirements

  • Minimum 4 years' experience in cybersecurity, network security, or information security roles.
  • Proficiency in configuring and maintaining firewalls, EDR, SIEM, anti-virus, and threat detection systems.
  • Hands-on experience with security audits, vulnerability scanners, and compliance frameworks.
  • Understanding of TCP / IP, DNS, IDS / IPS, email security, and authentication protocols.
  • Experience with Microsoft 365 and Azure security tools (Defender for Endpoint, Purview, Conditional Access).
  • Ability to manage and respond to incidents under pressure with clear documentation and communication.
  • Strong analytical, troubleshooting, and reporting skills.

Preferred Qualifications

  • Relevant certifications such as CompTIA Security+, CEH, Microsoft SC-200 / SC-300, or CISSP.
  • Familiarity with MDR / XDR platforms and cybersecurity frameworks (NIST, MITRE ATT&CK).
  • Experience supporting cybersecurity in an MSP or client-facing environment.
Create a job alert for this search #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Parow, Western Cape The Foschini Group

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities:
Security Monitoring
  • Perform log ingestion, define use cases, and create alerts for critical assets.
  • Perform daily SIEM health checks and remediate accordingly.
  • Monitor security alerts and events using various tools and technologies.
  • Analyze and investigate security incidents to identify potential threats.
  • Collaborate with team members to develop and implement effective monitoring strategies.
  • Using IOCs and threat intelligence, perform threat hunting across environment.
Incident Response
  • Respond promptly to security incidents, provide initial analysis, conduct business impact assessment, isolate, eradiate and recovery from threats.
  • Document and report incidents, ensuring accurate and comprehensive records.
  • Follow established incident response procedures, playbooks and contribute to their enhancement.
EndPoint Protection
  • Manage and maintain endpoint security and EDR solutions.
  • Perform daily health checks endpoint security and EDR solutions and remediate accordingly.
  • Conduct regular scans and assessments to identify and mitigate potential vulnerabilities.
  • Work with IT teams to ensure endpoint security configurations align with organizational standards.
Vulnerability Management
  • Assist in the identification and prioritization of vulnerabilities within the organization's infrastructure.
  • Collaborate with system owners and IT teams to remediate identified vulnerabilities.
  • Stay informed about the latest security threats and vulnerabilities.
Email Security
  • Monitor and analyze email traffic for potential security threats.
  • Respond to and mitigate email-borne security incidents.
  • Work with email security solutions to enhance protection against phishing and malware attacks.
Qualifications and Experience:
  • Relevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience.
  • One or more certifications in: EC-Council SOC, Security+, AWS Certifications, Microsoft Certifications, Google Certifications
  • Must have 3-6 years' experience in a Cybersecurity related role.
  • Practical experience with system monitoring SIEM, assessment, and reporting tools (ArcSight, IBM QRadar, Splunk, Sentinel, Exabeam, SIEMonster, AlientVault etc.)
  • Practical experience with EDR and XDR tools.
  • Proficiency in network security, operating systems, and security technologies.
  • Experience with common information technologies (Windows, VMware, and Cisco as well as some UNIX, Linux).
  • Experience with Vulnerability and Malware Analysis (threat and attack analysis).
  • Experience with security tools (WAF, Proxy, DNS, IDS, firewalls, anti-virus, data loss prevention, etc.).
  • Knowledge of Cloud Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Protection
  • Technology experience to be considered; Security+; Microsoft Security Certifications (MS-SC200); Azure Certifications, Recognised SOC certification
Skills:
  • Ability to work in independent environments under aggressive timelines.
  • Ability to develop and maintain working relationships in a global environment.
  • Excellent analytical and problem-solving skills
  • Outstanding written skills for preparing reports and briefings.
Behaviours:
  • Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner
  • Decision Quality - consistently makes timely, well-rounded and informed decisions
  • Ensures Accountability - takes accountability and ensures others are held to account on agreed upon performance targets
  • Manages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problems
  • Tech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growth
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

George, Western Cape TMC TECHNOLOGIES

Posted today

Job Viewed

Tap Again To Close

Job Description

Share this job as a link in your status update to LinkedIn.

Job Title

Cybersecurity Engineer

Location

King George, VA 22485 US (Primary)

Category

Information Technology

Job Type

Full-time

Staff

Education

Bachelor's Degree

Travel

Security Clearance Required

Ability to obtain and maintain a U.S. Security Clearance

Job Description

TMC Technologies is looking for a Cybersecurity Engineer to join our team supporting the mission of the Naval Surface Warfare Dahlgren Division (NSWCDD). The TMC team provides development and maintenance of tactical initiatives and baseline developments in support of Naval Weapons Systems /Combat Systems (e.g. AEGIS, Aegis BMD, FMS, etc). The Computer Program Engineering Services (CPES) provided include support for Weapon System Element and Combat System Domain Engineering, Fleet and Land Based Test Site Support.

TASKING:

Engineering support for technical implementation of cybersecurity solutions in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration.

Conduct vulnerability research, malware analysis, penetration testing, and reverse engineering development of computer network operations, as required.

Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and applications and perform proof-of-concept, product evaluation of those tools and applications to determine feasibility of meeting the Navy’s cybersecurity requirements.

Responsible for researching, deriving, and documenting cybersecurity requirements as they relate to Navy tactical applications at the A-Level and B-Level specifications. These cybersecurity requirements must align with Department of Navy (DoN) cybersecurity instructions 8500.1 and NAVSEA 9400.2, plus other combat system-specific requirements documented in PEO IWS 5239.1.

Responsible for mapping and evaluating specific cybersecurity guidance and controls documented in CNSSI1253, NIST 800-53, and NIST 800-125B, etc., against the associated A-level and B-level specification cybersecurity requirements.

Generate Plans of Action and Milestones (POA&Ms) for the tasking and ability to monitor and track task completion against plan and define mitigation strategies due to task re-planning

Job Requirements

Ability to obtain a Secret security clearance (US Citizenship required)

Bachelor’s Degree in Computer Science or related field

Knowledge of cybersecurity concepts that identify, exploit, protect against, or mitigate cyber security vulnerabilities

Knowledge of Virtual Machine (VM) architecture and configurations is preferred

We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law.


Whether you’re interested in your next big role or would just like to join our network, we’d love to hear from you!
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Aspen Pharma Group

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

Company Description

Aspen TESS is Aspen's technology enabled shared services business, established to be a partner in unlocking business value through digital innovation and process efficiency. Aspen TESS will eliminate repetitive effort and use technology to optimize standardized processes, by delivering cost-effective services and innovative solutions to Aspen business units globally. 

OBJECTIVE

The Cybersecurity Engineer plays a crucial role in protecting Aspen’s infrastructure by implementing, maintaining, and enhancing security technologies and processes. This role works closely with the SOC, IT, and Compliance teams to ensure systems and data remain secure and threats are identified and mitigated.

p>Below is a general description of the key responsibilities, qualifications, and skills needed for this role:


KEY RESPONSIBILITIES

Incident Response and Escalation

  • Act as a Tier 2/3 escalation point for complex security incidents raised by the SOC or IT teams.
  • Lead and support incident response activities, including forensic analysis and root cause investigation.
  • Support red/blue team exercises to test and improve detection, response, and defense capabilities.

Security Platform Management

  • Manage configurations and policies for the Cyber Security platforms, ensuring optimal performance and alignment with security standards.

Vulnerability Management

  • Analyze vulnerability scan reports to identify and assess security weaknesses.
  • Coordinate remediation efforts with relevant teams and ensure timely closure of vulnerabilities

Secure Systems and Network Configuration

  • Collaborate with IT teams to implement secure system and network configurations, following industry best practices and compliance requirements.

Training and Mentorship

  • Provide training and mentorship to junior analysts, fostering their professional development and enhancing team capabilities.

Project Involvement

  • Participate in cross-functional IT and business projects to ensure security requirements are identified, integrated, and enforced throughout the project lifecycle

SKILLS AND COMPETENCIES:

  • Hands-on experience with Cisco Umbrella, Defender for Endpoint, Identity, Office, and Sentinel.
  • Working knowledge of SIEM, SOAR, EDR, vulnerability and data protection tools.
  • Scripting skills (e.g., PowerShell, Python, KQL) for automation and threat hunting.
  • Strong understanding of networking, authentication, certificates and cloud security principles.
  • Familiarity with MITRE ATT&CK, NIST CSF, and other industry frameworks.
  • Strong analytical and problem-solving skills.
  • Clear and concise communication for incident handling and documentation.
  • Collaborative mindset with the ability to work independently when required.
  • Effective multitasking under pressure.

QUALIFICATIONS & EXPERIENCE

  • Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent experience).
  • li>Preferred certifications:

Microsoft Certified: Security Operations Analyst Associate

Microsoft Security, Compliance, and Identity Fundamentals

Cisco Certified CyberOps Associate or CCNP Security

CompTIA Security+, CySA+, or similar

This advertiser has chosen not to accept applicants from your region.

Cybersecurity Sales Consultant

Gauteng, Gauteng iCloudz - AI Cyber Security & Cloud

Posted today

Job Viewed

Tap Again To Close

Job Description

workfromhome

Get AI-powered advice on this job and more exclusive features.

We’re Hiring: Cybersecurity Sales Consultant / Lead Generator (Contract Role)

We are seeking a results-driven Cybersecurity Sales Consultant / Lead Generator / Business Developer to join our team on an initial contract basis. This role focuses on driving new business for our advanced cybersecurity solutions, including SIEM, SOAR, and Adaptive MDR , targeting mid-to-large enterprises.

The ideal candidate combines strong technical knowledge of cybersecurity operations—particularly SIEM—with proven experience in enterprise sales.

Key Responsibilities

  • Develop and execute strategic sales plans
  • Identify and convert new enterprise opportunities
  • Deliver product presentations and demos
  • Align customer needs with our solutions (SIEM, SOAR, MDR)
  • Lead negotiations and close deals
  • Build relationships with key stakeholders and partners
  • Stay informed on cybersecurity trends and technologies

Requirements

  • Bachelor’s degree in Business, Computer Science, Information Security, or related
  • 3+ years of cybersecurity sales experience (enterprise focus)
  • Strong knowledge of SIEM tools (e.g., Splunk, QRadar, Securonix)
  • Excellent communication, presentation, and negotiation skills
  • Proactive, self-motivated, and collaborative

If you’re commercially driven, technically strong, and thrive in a flexible, remote environment, we’d love to hear from you.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Contract
Job function
  • Job function Sales and Business Development
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at iCloudz - AI Cyber Security & Cloud by 2x

Get notified about new Security Sales Consultant jobs in Johannesburg Metropolitan Area .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity Jobs in South Africa !

Cybersecurity Sales Consultant

Gauteng, Gauteng Fruitz

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

We’re Hiring: Cybersecurity Sales Consultant / Lead Generator (Contract Role)

We are seeking a results-driven Cybersecurity Sales Consultant / Lead Generator / Business Developer to join our team on an initial contract basis. This role focuses on driving new business for our advanced cybersecurity solutions, including SIEM, SOAR, and Adaptive MDR , targeting mid-to-large enterprises.

The ideal candidate combines strong technical knowledge of cybersecurity operations—particularly SIEM—with proven experience in enterprise sales.

Key Responsibilities

  • Develop and execute strategic sales plans
  • Identify and convert new enterprise opportunities
  • Deliver product presentations and demos
  • Align customer needs with our solutions (SIEM, SOAR, MDR)
  • Lead negotiations and close deals
  • Build relationships with key stakeholders and partners
  • Stay informed on cybersecurity trends and technologies

Requirements

  • Bachelor’s degree in Business, Computer Science, Information Security, or related
  • 3+ years of cybersecurity sales experience (enterprise focus)
  • Strong knowledge of SIEM tools (e.g., Splunk, QRadar, Securonix)
  • Excellent communication, presentation, and negotiation skills
  • Proactive, self-motivated, and collaborative

If you’re commercially driven, technically strong, and thrive in a flexible, remote environment, we’d love to hear from you.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Contract
Job function
  • Job function Sales and Business Development
  • Industries Farming

Referrals increase your chances of interviewing at Fruitz by 2x

Sign in to set job alerts for “Security Sales Consultant” roles.

Johannesburg, Gauteng, South Africa 1 day ago

Sales Executive - Document Security Solutions & Brand Protection

Sandton, Gauteng, South Africa 5 days ago

Sandton, Gauteng, South Africa 2 weeks ago

Johannesburg, Gauteng, South Africa 8 months ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

Key Account Manager-Johannesburg/Durban/Cape Town

Johannesburg Metropolitan Area 4 days ago

Counter Sales - Security Technology Roodepoort

Johannesburg, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 1 month ago

City of Johannesburg, Gauteng, South Africa 2 days ago

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 6 days ago

Johannesburg, Gauteng, South Africa 3 months ago

Internal / Counter Sales - Security Technology Roo

Johannesburg, Gauteng, South Africa 1 month ago

Kempton Park, Gauteng, South Africa 2 weeks ago

Johannesburg Metropolitan Area 3 days ago

Midrand, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 21 hours ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Operations Manager

Sandton, Gauteng AB InBev Africa

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Cybersecurity Operations Manager role at AB InBev Africa

Join to apply for the Cybersecurity Operations Manager role at AB InBev Africa

Get AI-powered advice on this job and more exclusive features.

Dreaming big is in our DNA. It’s who we are as a company. It’s our culture. It’s our heritage. And more than ever, it’s our future. A future where we’re always looking forward. Always serving up new ways to meet life’s moments. A future where we keep dreaming bigger. We look for people with passion, talent, and curiosity, and provide them with the teammates, resources and opportunities to unleash their full potential. The power we create together – when we combine your strengths with ours – is unstoppable. Are you ready to join a team that dreams as big as you do?

The Key Purpose of this role is to oversee the daily operations of the cybersecurity team, ensuring the implementation of effective security measures and managing incident response activities. This role requires a strategic leader with extensive experience in IT security management, capable of fostering collaboration across departments and ensuring compliance with the internal IT Controls Framework and regulatory requirements.

Key Roles and Responsibilities:

Operational Oversight

  • Manage 24/7 cybersecurity operations, including threat detection, incident response, and vulnerability management.
  • Our globally centralized SOC requires strong teamwork and leadership skills for a unified response to cyber threats.
  • Oversee the development and implementation of security policies, procedures, and standards to safeguard information and assets.

Incident Management

  • Lead incident response efforts, coordinating with zone and global teams and external partners to detect, contain, eradicate, and recover from cybersecurity incidents.
  • Ensure incidents are handled according to best practices and regulatory requirements.

Team Leadership

  • Supervise a team of cybersecurity analysts and engineers, providing guidance, training, and performance evaluations.
  • Foster a culture of continuous improvement and professional development within the team.

Strategic Planning

  • Execute the comprehensive global cybersecurity strategy aligned with zone business objectives.
  • Collaborate with senior management to identify risks and implement appropriate mitigation strategies.

Compliance and Risk Management

  • Ensure compliance with relevant laws, regulations, and standards (e.g., POPIA, ISO 27001).
  • Conduct regular risk assessments and security audits to identify vulnerabilities and recommend improvements.
  • Execute regular global routines for data protection, privacy, third-party risk management, and vulnerability management.

Communication

  • Serve as the primary liaison between the cybersecurity team and other departments, ensuring effective communication regarding security issues.
  • Prepare reports for senior management on security metrics, incidents, and ongoing cybersecurity projects.

Key Attributes and Competencies:

  • Strong understanding of cybersecurity frameworks (NIST, ISO) and compliance requirements.
  • Technical proficiency in security technologies such as SIEM, IDS/IPS, firewalls, and antivirus solutions.
  • Excellent leadership skills with the ability to manage cross-functional teams effectively.
  • Strong analytical skills to assess complex situations and make informed decisions.
  • Outstanding verbal and written communication skills.

Minimum Requirements:

  • Bachelor’s degree in Computer Science, Information Technology, or a related field.
  • Minimum of 8 years of experience in cybersecurity or IT security roles, with at least 3 years in a managerial position.

Proven experience leading security operations.

  • Relevant certifications such as CISSP, CISM (preferred) or CC (minimum requirement).
  • Experience with cloud security platforms and technologies.
  • Familiarity with securing on-premises servers and cloud technology. Proficiency in programming/scripting languages (e.g., Python, Bash, PowerShell) for automation tasks.

Additional Information:

Band: VI

SAB is an equal opportunity employer and all appointments will be made in line with SAB employment equity plan and talent requirements.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Management and Manufacturing
  • Industries Food and Beverage Services

Referrals increase your chances of interviewing at AB InBev Africa by 2x

Sign in to set job alerts for “Operations Manager” roles.

Johannesburg Metropolitan Area 1 week ago

Brakpan, Gauteng, South Africa 4 hours ago

City of Johannesburg, Gauteng, South Africa 1 day ago

Centurion, Gauteng, South Africa 1 day ago

Johannesburg, Gauteng, South Africa 5 days ago

Centurion, Gauteng, South Africa 1 day ago

Modderfontein, Gauteng, South Africa 6 days ago

City of Johannesburg, Gauteng, South Africa 1 day ago

Kempton Park, Gauteng, South Africa 2 weeks ago

Boksburg, Gauteng, South Africa 21 hours ago

City of Johannesburg, Gauteng, South Africa 3 months ago

Johannesburg, Gauteng, South Africa 4 months ago

Boksburg, Gauteng, South Africa 1 week ago

Back of House Supervisor- Mall of Africa

Johannesburg, Gauteng, South Africa 1 week ago

Brakpan, Gauteng, South Africa 44 minutes ago

Business Planning and Operations Manager

Johannesburg, Gauteng, South Africa 5 days ago

Midrand, Gauteng, South Africa 4 hours ago

Johannesburg, Gauteng, South Africa 1 week ago

Randburg, Gauteng, South Africa 4 weeks ago

Johannesburg Metropolitan Area 22 hours ago

Boksburg, Gauteng, South Africa 2 weeks ago

Meredale, Gauteng, South Africa 4 weeks ago

Operations & Grants Manager - 0653 - Johannesburg , South Africa

Johannesburg, Gauteng, South Africa $2,200.00-$2,800.00 1 day ago

Operations and Projects Manager: Logistics at Famous Brands

Midrand, Gauteng, South Africa 2 weeks ago

SATIC: Business Services Support Operations Manager

Johannesburg Metropolitan Area 5 days ago

Kempton Park, Gauteng, South Africa 4 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Consultant iKapa

Cape Town, Western Cape Xcede Group

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Security Specialist

My client in the financial industry is looking for a Cyber Security Specialist.

The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.

What will you be responsible for?

* On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of:

  • Anti-Virus Infrastructure
  • Data Leakage Prevention system, rules, and reports
  • Privileged Account Management process
  • Network Access Control - process and exception handling
  • Vulnerability Scanning, reporting, proposing remediation actions, and tracking compliance
  • Security hardening baseline compliance scanning, reporting, and remediation

* On an ad hoc basis, the consultant will support businesses in:

  • Issuing, renewing, and revoking PKI digital certificates.
  • Assessing internet and email use on request of Forensics or HR departments.
  • Performing scheduled tasks like reviewing Firewall rule configuration and reporting.

* The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.
* The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.
* The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or through interaction with experts.

Qualifications
* Matric
* Information Technology diploma or degree
* Information Security certification (preferable)

Experience
At least 3 - 5 years of hands-on technical experience which includes:

  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Anti-Virus System management and Configuration
  • Data Leakage Prevention tool configuration
  • Logical Access Management (AD, PAM)
  • Information Security Operations (Security+, CISSP will be beneficial)
  • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)


Required Skills

  • Security Auditing
  • Reporting and Administration
  • Security tools monitoring
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs