Security Operations Centre Analyst II

Randburg, Gauteng R400000 - R800000 Y FirstRand

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Hello Future SOC Analyst II

Welcome to FNB, the home of the #changeables. We design for the shapeshifters and deliver products and services that make us incredibly proud of people that make it happen.

As part of our talent team, you will be surrounded by unique talents, diverse minds, and an adaptable environment that lives up to the promise of staying curious. Now's the time to imagine your potential in a team where experts come together and ignite effective change.

Overview of the role and requirements:

  • To protect the organization by pro-actively monitoring for Cyber Security Events. This includes the Identification, Analysis, Triage and Response
  • Administer and Configure Policies on FNB's Security Products.
  • Guidance of L1 SOC Analyst's

What you will need:

  • Minimum 2 years' experience in a SOC Analyst Role (SOC operations experience)
  • Security Product Knowledge
  • Cisco Products (AMP, Stealthwatch)
  • Microsoft Products (Azure, ATA and ATP, BitDefender)
  • Understanding of common network services (web, mail, DNS, authentication)
  • Knowledge of host-based firewalls, Anti-Malware
  • General Desktop OS and Server OS knowledge
  • TCP/IP, Internet Routing, UNIX / LINUX & Windows
  • Understanding of modern malware threats
  • SANS Knowledge
  • Familiarity with system log information and what it means
  • Threat Intelligence Research

You will be responsible for:

Incident Monitoring and Response

  • Review and analyse all alerts and respond according to prescribed processes
  • Guidance of L1 SOC Analysts
  • Create incidents in our change management system for other teams to take remediation actions when required.

Remediation Recommendations

  • Provide mitigation recommendations for each identified security incident where applicable
  • Based on the types of alerts and actions being taken identify root causes and recommend ways to improve the protection capabilities of the organization (e.g. upload malicious URL to tools to security controls, and manage indicators of compromise)

Case Management

  • Update the alert/case information with closure information (All fields that are required to be updated when the alert/case is closed)

Reporting

  • Run, Analyse and Interpret reports on different platforms.

Manage and Administer Technical Controls

  • Create, configure and deploy policies and signatures on technical security controls

Perform Threat Hunts

  • Document the outcome of the hunt with recommendation if any IOC's picked up.

Oversight of Level 1 SOC Analysts

  • Assisting L1's during investigations and review the recommendations made
  • Guiding and Mentoring of Level 1 SOC Analysts

Participate in Cyber Security War Rooms (P1 and P2 Incidents)

Responsible for logging changes to update the security products to pro-actively block potentially malicious actions (e.g. URL's, phishing emails, etc)

Playbooks

  • Feedback into the Detection Engineering team around tuning of playbooks or input into potential new playbooks

We can be a match if you have:

  • Bachelor's Degree in Technical Field (Computer Science/Computer Security/Computer Networking)
  • Enterprise Security Product Certification
  • Analysis and Attention to Detail
  • Problem Solving
  • Time and Self-Management
  • Knowledge Sharing
  • Drive and Results Orientated
  • Teamwork
  • Self-motivated with ability to work without supervision
  • Outcomes Driven ("Can Do" Attitude)

You will have access to:

  • Opportunities to network and collaborate.
  • Challenging Work.
  • Opportunities to innovate.
Post
FNB
LI-NN2

Are you interested to take the step? We look forward to engaging with you further. Apply now

Job Details

Take note that applications will not be accepted on the below date and onwards, kindly submit applications ahead of the closing date indicated below.

28/08/25

All appointments will be made in line with FirstRand Group's Employment Equity plan. The Bank supports the recruitment and advancement of individuals with disabilities. In order for us to fulfill this purpose, candidates can disclose their disability information on a voluntary basis. The Bank will keep this information confidential unless we are required by law to disclose this information to other parties.

This advertiser has chosen not to accept applicants from your region.

Strategic Sourcing Specialist (IT Security & Operations)

Johannesburg, Gauteng ClarkHouse

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

In this role, youll take ownership of end-to-end IT procurement , including tendering, supplier evaluation, and contract management across both local and international markets. Youll work closely with IT, Finance, Legal, and project teams , providing advice and guidance to influence sourcing decisions, ensure compliance, and deliver commercial value.

Were looking for someone with:
  • +-6 years experience in IT procurement , ideally within the financial services sector
  • Practical experience with tendering, supplier negotiations, and contract management
  • Strong ability to engage and influence internal and external stakeholders , including Legal, IT architects, and Finance teams
  • Exposure to local and international markets and IT categories such as IT Security, Software, Systems Operations, Licensing, and Maintenance
  • A degree in Procurement, Supply Chain, Commerce, or related field, with a CIPS qualification (essential)
  • A practical, self-driven approach , with strong organizational skills and commercial awareness

This is an excellent opportunity for someone who enjoys managing complex sourcing processes, shaping procurement decisions, and delivering value across critical IT initiatives , all while working in a collaborative, hybrid environment.

If youre a proactive, commercially savvy sourcing professional ready to make an impact, lets connect to discuss this exciting opportunity -
This advertiser has chosen not to accept applicants from your region.

Strategic Sourcing Specialist (IT Security & Operations)

Johannesburg, Gauteng

Posted today

Job Viewed

Tap Again To Close

Job Description

In this role, youll take ownership of end-to-end IT procurement , including tendering, supplier evaluation, and contract management across both local and international markets. Youll work closely with IT, Finance, Legal, and project teams , providing advice and guidance to influence sourcing decisions, ensure compliance, and deliver commercial value. Were looking for someone with: -6 years experience in IT procurement , ideally within the financial services sector Practical experience with tendering, supplier negotiations, and contract management Strong ability to engage and influence internal and external stakeholders , including Legal, IT architects, and Finance teams Exposure to local and international markets and IT categories such as IT Security, Software, Systems Operations, Licensing, and Maintenance A degree in Procurement, Supply Chain, Commerce, or related field, with a CIPS qualification (essential) A practical, self-driven approach , with strong organizational skills and commercial awareness This is an excellent opportunity for someone who enjoys managing complex sourcing processes, shaping procurement decisions, and delivering value across critical IT initiatives , all while working in a collaborative, hybrid environment. If youre a proactive, commercially savvy sourcing professional ready to make an impact, lets connect to discuss this exciting opportunity -
This advertiser has chosen not to accept applicants from your region.

Information Security Lead

Johannesburg, Gauteng Harris Computer

Posted today

Job Viewed

Tap Again To Close

Job Description

Join Interfile—South Africa’s leading Electronic Bill Presentment & Payment (EBPP) fintech—where we design, build, and run large-scale digital services used by millions, partnering with top banks, major corporates, and government. You’ll work on modern architectures across both new builds and enhancements in a culture that prizes innovation, seamless integration, and exceptional delivery. We’re customer-obsessed and known for helping organizations modernise. Our Fourways office—right across from Montecasino—offers a modern workspace with a Vitality-certified gym, canteen, and great chill areas.

Purpose of the role:

Lead and continuously improve our information security posture across on-prem and cloud—covering platforms, hardware, networks, and data centres. You’ll drive vulnerability remediation through both automation and hands-on work, ensure compliance with POPIA, and design, implement, and uplift security standards and frameworks (e.g., ISO 27001/27002, NIST CSF 2.0). You’ll also own risk management and incident response while championing a security-first culture across the business.

Responsibilities:

  • Security Assessment & Management
    • Conduct regular security assessments across infrastructure, applications, and data environments.
    • Implement and manage SAST and DAST tools and processes.
    • Track, report, and drive remediation of vulnerabilities and security issues.
  • Security Posture & Reporting
    • Develop and maintain dashboards and reports that clearly communicate the organization’s security posture.
    • Define and track KPIs for security posture, remediation velocity, and compliance.
    • Collaborate with internal teams to ensure visibility and accountability for remediation efforts.
  • Automation & Remediation
    • Design and implement automated security controls and remediation workflows.
    • Work with DevOps and IT teams to integrate security into CI/CD pipelines.
  • Compliance & Regulatory Alignment
    • Ensure alignment with POPIA and other applicable data protection regulations.
    • Support audits and compliance reporting requirements.
    • Work with legal and compliance teams to ensure data handling aligns with privacy laws.
  • Standards & Frameworks
    • Contribute to the design and rollout of security standards such as ISO 20027.
    • Align security practices with NIST CSF 2.0 and other relevant frameworks.
  • Risk Management
    • Conduct risk assessments and maintain a security risk register.
    • Collaborate with business units to understand and mitigate security risks tied to operations and products.
  • Incident Response & Forensics
    • Develop and maintain incident response plans.
    • Lead investigations into security breaches and coordinate post-incident reviews.
  • Security Awareness & Training
    • Design and deliver security awareness programs for staff.
    • Promote a security-first culture across technical and non-technical teams.
  • Third-Party & Vendor Security
    • Assess and manage security risks related to vendors, partners, and third-party services.
    • Ensure contracts and SLAs include appropriate security clauses.
  • Secure Architecture & Design
    • Participate in solution architecture reviews to ensure security is embedded from the start.
  • Advise on secure design patterns and threat modeling.

Requirements (Essential):

  • Bachelor’s degree in Information Security, Computer Science, or related field.
  • At least one security certification: CISSP, CISM, CEH, CompTIA Security+, ISO 27001 Lead Implementer (or similar).
  • 5+ years in an information security role (or similar).
  • Proven security experience across infrastructure, applications, and data environments.
  • Hands-on with SAST/DAST tools (e.g., SonarQube, OWASP ZAP, Burp Suite).
  • Strong vulnerability management and remediation workflow expertise.
  • Familiarity with automation/scripting (e.g., Python, PowerShell) and CI/CD tooling.
  • Working knowledge of POPIA and other data-protection regulations.
  • Experience with security frameworks (e.g., NIST CSF, ISO 27001/27002).
  • Ability to communicate technical risks and remediation plans to non-technical stakeholders.

Nice to Have (Desirable)

  • Proactive, detail-oriented, strong sense of ownership.
  • Comfortable collaborating across multiple teams and disciplines.
  • Passion for security, compliance, and continuous improvement.
  • Multiple or advanced security certifications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Architect

Johannesburg, Gauteng InfyStrat

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities:

  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
  • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
  • Define portfolio vision and reusable security patterns aligned with the EA strategy.
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
  • Manage security architects and mentor engineers, developers, and vendors.

What will you bring?

  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
  • Teamwork and Energy – work across different functional and business teams with effective collaboration.
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

Requirements / Skills and Competence

  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture.
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures.
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
  • Good experience in security architecture design in Cloud and on-prem.
  • Design and implementation of IOT, endpoint protection, and secure IAM.
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Johannesburg, Gauteng Kalagadi

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.

TASK AND RESPONSIBILITIES:

  1. Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
  2. Perform research, testing, evaluating, and deployment of security technology and procedures.
  3. Run diagnostics on any changes to data to verify any undetected breaches.
  4. Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
  5. Develop and implement information security standards, guidelines, and procedures.
  6. Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
  7. Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
  8. Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.

FUNCTIONAL KNOWLEDGE:

Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.

MINIMUM REQUIREMENTS

• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.

EXPERIENCE

• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Manager

Midrand, Gauteng R1200000 - R3600000 Y PSG Konsult

Posted today

Job Viewed

Tap Again To Close

Job Description

Designation:

Information Security Manager | Waterfall, Midrand, Gauteng | Permanent

Category:

Information Technology

Job Level:

Professionally qualified and experienced specialists and mid-management

Posted by:

PSG Financial Services

Posted on:

03 Oct 2025

Reference Number:

POS08450

Closing date:

30-Oct-2025

Position Type:

Permanent

Location:

Waterfall Magwa Crescent

Overview:

VACANCY | INFORMATION SECURITY MANAGER | WATERFALL, MIDRAND, GAUTENG | PERMANENT

PSGs commitment to transform and embrace diversity is what drives us to achieve a diverse workplace with employment equity as a key goal to create an inclusive workforce. In achieving our employment equity goals, we give preference to applicants from designated groups, and we encourage people with disability to apply.

Job description:

The Information Security Manager will lead PSG's cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).

Responsibilities:
Strategic Leadership & Governance
  • Develop and maintain PSG's enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
  • Establish and enforce security governance frameworks, policies, and standards.
  • Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
  • Lead the implementation of relevant security compliance initiatives.
  • Collaborate with divisional CIOs and executive leadership to align security posture across business units.
  • Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.
Architecture & Identity Management
  • Design secure solutions for hybrid environments (on-prem + Azure).
  • Integrate security into infrastructure and application projects.
  • Manage identity and access controls, including Azure AD, MFA, and privileged access management.
Security Operations
  • Manage day-to-day security monitoring, incident handling, and threat intelligence.
  • Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
  • Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
  • Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
  • Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.
Financial Management
  • Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
  • Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
  • Support procurement and vendor management for security solutions.
Cyber Security Operations Center (SOC) Oversight
  • Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
  • Define SOC roles, workflows, and incident response playbooks.
  • Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
  • Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
  • Coordinate with external threat intelligence providers and law enforcement when necessary.
Security Technology Lifecycle Management
  • Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
  • Ensure timely patching, configuration updates, and feature adoption.
  • Maintain compatibility and integration of security tools with PSG's hybrid infrastructure.
  • Document system configurations and update operational procedures regularly.
Risk Management & Compliance
  • Conduct regular risk assessments, vulnerability scans, and penetration tests.
  • Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
  • Maintain a risk register and track mitigation actions.
  • Coordinate internal and external audits and ensure timely remediation of findings.
Awareness, Education & Training
  • Lead organization-wide cybersecurity awareness programs.
  • Deliver targeted training for IT, business, and executive teams.
  • Promote secure behaviour and incident reporting culture.
Team Leadership & Culture
  • Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
  • Define clear roles, responsibilities, and performance expectations.
  • Conduct regular coaching, performance reviews, and career development planning.
  • Foster a culture of accountability, innovation, and continuous improvement.
  • Promote cybersecurity awareness and ownership across all departments.
Reporting
  • Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.
Minimum requirements:
  • Bachelor's degree in Computer Science, Information Technology, or related field.
  • 8+ years of IT Security experience, with 5+ years in a leadership role.
  • CISSP, CISM, or equivalent
  • Microsoft Certified: Cybersecurity Architect Expert
  • GIAC Security Operations (GSOM) or equivalent SOC certification
  • Familiarity with scripting (PowerShell, Bash) and automation tools.
Experience in the following technologies and concepts:
  • Microsoft 365 and SharePoint Online
  • Proven experience in cybersecurity leadership within hybrid cloud environments.
  • Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
  • Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
  • Experience managing BYOD environments and securing distributed branch networks.
  • Familiarity with ISO/IEC 27001, ISO/IEC 2000, NIST, and CIS controls.
  • Excellent communication, stakeholder engagement, and team leadership skills.
  • Technical documentation
Competencies required:
  • Strong leadership and problem-solving skills.
  • Attention to detail
  • Decision making
  • Leadership
  • Attention to detail
  • Resilience
  • Good verbal and written communication skills
  • Time management skills
  • Deadline driven
How to apply:

Candidates interested must apply here by no later than 30 October 2025 OR browse available PSG Careers vacancies

By submitting your application, you are giving PSG Financial Services implicit consent to the storage and processing of your personal information. If you are not contacted within 4 weeks of your application, please accept that your application was not successful. For more information about careers at PSG, visit

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity analyst Jobs in Johannesburg !

Information security specialist

Johannesburg, Gauteng Kalagadi

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities. TASK AND RESPONSIBILITIES: Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure. Perform research, testing, evaluating, and deployment of security technology and procedures. Run diagnostics on any changes to data to verify any undetected breaches. Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware. Develop and implement information security standards, guidelines, and procedures. Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications. Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation. Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures. FUNCTIONAL KNOWLEDGE: Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness. MINIMUM REQUIREMENTS • NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields. EXPERIENCE • 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security lead

Johannesburg, Gauteng Harris Computer

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Join Interfile—South Africa’s leading Electronic Bill Presentment &
This advertiser has chosen not to accept applicants from your region.

Information security specialist

Johannesburg, Gauteng Kalagadi

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities. TASK AND RESPONSIBILITIES: Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure. Perform research, testing, evaluating, and deployment of security technology and procedures. Run diagnostics on any changes to data to verify any undetected breaches. Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware. Develop and implement information security standards, guidelines, and procedures. Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications. Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation. Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures. FUNCTIONAL KNOWLEDGE: Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness. MINIMUM REQUIREMENTS • NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields. EXPERIENCE • 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Analyst Jobs View All Jobs in Johannesburg