61 Cybersecurity Professionals jobs in Johannesburg
Cybersecurity Consultant
Posted 2 days ago
Job Viewed
Job Description
About Reflex
Established in 2000 in South Africa, Reflex has evolved from modest origins to become a distinguished provider of Information and Communication Technology (ICT) solutions. We specialise in delivering innovative ICT solutions across various industries, earning a sterling reputation for our excellence in the retail sector and beyond. With a robust network of partnerships, we pride ourselves on our ability to swiftly address the technological needs of our clients.
Our portfolio of ICT solutions spans various industries. ReflexCarrier understands what is needed to build, manage, and operate complex backbone networks simply. Our solutions are tailored for Fibre Network Operators (FNO), Internet Service Providers (ISPs), and those looking for comprehensive Managed Connectivity solutions.
On the other hand, our Enterprise Solutions take the complexity out of technology, allowing you to focus on what you do best. We provide seamless, high-performance solutions for connectivity, communications, workplace management, cloud, and cybersecurity services.
Together, both divisions reflect our core values of expertise, clarity, and client-centricity. We take pride in being large enough to offer extensive support while remaining small enough to provide personalised service. At Reflex, our clients are at the centre of everything we do, and we’re committed to delivering reliable, jargon-free solutions that drive your success.
About the roleThe Cyber Security Consultant is responsible for assessing, designing, and implementing security measures to protect an organization's digital assets. They work closely with clients to identify vulnerabilities, develop security strategies, and ensure compliance with industry standards and regulations.
Key duties and responsibilities- Conduct Security Assessments: Evaluate the existing security measures of an organization and identify vulnerabilities and weaknesses.
- Develop Security Strategies: Create and implement effective security protocols, policies, and procedures to protect against cyber threats.
- Perform Penetration Testing: Conduct rigorous testing, including penetration testing, to simulate attacks and test the strength of security measures.
- Provide Technical Advice: Offer guidance and instruction on best practices for cybersecurity.
- Keep abreast of all aspects of cybersecurity: Keep up to date with the latest industry trends, threats, and security measures.
- Respond to Incidents: Lead the incident response process, investigating causes and recommending corrective actions.
- Train Staff: Educate staff on cybersecurity related principles, best practices and information security procedures.
- Create Reports: Develop and deliver comprehensive reports on findings and recommendations to management and stakeholders.
- Advise on Compliance: Ensure that security measures comply with relevant regulations and standards.
- 3-5 years of experience in cybersecurity or a related field.
- Original Equipment Manufacturer/Vendor technology certifications
- Strong understanding of security principles, risk management, and relevant technologies.
- Excellent communication and presentation skills, with the ability to explain complex technical concepts to non-technical audiences.
- Ability to work collaboratively with clients and internal teams.
- Strong problem-solving skills and attention to detail.
- A responsible individual who adopts a result driven approach.
- Ability to work well under pressure and meet tight deadlines.
- Positive attitude and a passion for the role.
- Strong leadership and management skills.
- Strong analytical and problem-solving skills.
Cybersecurity Specialist
Posted 2 days ago
Job Viewed
Job Description
The Cybersecurity Specialist is responsible for ensuring the security of systems, networks, and data, defending against breaches, vulnerabilities, and cyber-attacks. The role requires an in-depth understanding of security protocols, tools, and best practices to protect the organizations assets from cyber threats. Cybersecurity specialists are tasked with monitoring, detecting, and mitigating potential risks, while ensuring compliance with security regulations and standards. This position is crucial in maintaining the integrity and confidentiality of data and systems, as well as safeguarding against evolving cyber threats in a rapidly changing digital landscape.
Key Skills:- Security Tools: Proficient in using security tools and systems such as firewalls , Intrusion Detection Systems (IDS) , Intrusion Prevention Systems (IPS) , and Security Information and Event Management (SIEM) platforms to monitor and protect IT environments.
- Protocols & Encryption: Strong knowledge of HTTPS , SSL/TLS , and VPN protocols for securing data in transit and protecting user privacy.
- Scripting: Ability to automate security tasks, data collection, and analysis using scripting languages like Python and PowerShell .
- Compliance Standards: Knowledge and experience in compliance frameworks such as GDPR , ISO 27001 , PCI-DSS , and HIPAA to ensure that security practices align with legal and regulatory requirements.
- Threat Analysis: Expertise in performing risk assessments, identifying potential threats, and implementing appropriate mitigation strategies.
- Incident Response: Understanding of incident detection and response processes, including analyzing logs and network traffic to identify malicious activity.
- Conduct Vulnerability Assessments and Penetration Testing:
Perform regular vulnerability assessments to identify weaknesses in the system and infrastructure. Conduct penetration testing to simulate cyber-attacks and assess the systems resilience against threats. - Develop and Enforce Security Policies:
Design, implement, and enforce organizational security policies and procedures to safeguard systems and data. Ensure compliance with industry standards and internal guidelines. - Monitor and Respond to Security Incidents:
Continuously monitor network traffic, system logs, and alerts from security tools to detect and respond to potential threats in real-time. Take proactive measures to mitigate any security breaches, from malware outbreaks to unauthorized access. - Security Infrastructure Management:
Configure and manage firewalls, IDS/IPS systems, and other security tools to provide proactive protection against attacks. Optimize security settings for both internal and external communications. - Conduct Security Awareness Training:
Educate employees about best practices for maintaining security hygiene, recognizing phishing attempts, and adhering to organizational security policies. - Risk and Threat Analysis:
Evaluate potential risks to the organizations digital assets and infrastructure. Continuously assess emerging threats and adjust security measures accordingly to stay ahead of evolving attack strategies. - Incident Forensics and Reporting:
Investigate security incidents, identify the root cause, and recommend improvements to prevent future occurrences. Document incidents, responses, and remediation efforts for compliance and reporting purposes. - Collaboration with Other Teams:
Work closely with IT, development, and operational teams to ensure security is integrated into all processes and systems from the outset, particularly in the case of new technology deployments or system updates. - Continuous Improvement:
Stay current with the latest cybersecurity trends, emerging threats, and evolving attack vectors. Recommend and implement improvements to the security infrastructure, tools, and processes.
- Certifications like Certified Information Systems Security Professional (CISSP) , Certified Ethical Hacker (CEH) , Certified Information Security Manager (CISM) , or CompTIA Security+ are highly preferred.
- Experience with advanced threat detection tools and techniques (e.g., AI/ML-based security systems ).
- Proficiency in analyzing network traffic using Wireshark or similar tools.
Cybersecurity Engineer
Posted 6 days ago
Job Viewed
Job Description
Join to apply for the Cybersecurity Engineer role at Aspen Pharma Group .
Aspen TESS is Aspen's technology-enabled shared services business, established to unlock business value through digital innovation and process efficiency. It aims to eliminate repetitive effort and optimize standardized processes by delivering cost-effective services and innovative solutions to Aspen's global business units.
ObjectiveThe Cybersecurity Engineer plays a crucial role in protecting Aspen’s infrastructure by implementing, maintaining, and enhancing security technologies and processes. This role collaborates closely with the SOC, IT, and Compliance teams to ensure systems and data security and to identify and mitigate threats.
Key Responsibilities- Act as a Tier 2/3 escalation point for complex security incidents raised by the SOC or IT teams.
- Lead and support incident response activities, including forensic analysis and root cause investigation.
- Support red/blue team exercises to test and improve detection, response, and defense capabilities.
- Manage configurations and policies for the Cyber Security platforms, ensuring optimal performance and alignment with security standards.
- Analyze vulnerability scan reports to identify and assess security weaknesses.
- Coordinate remediation efforts with relevant teams and ensure timely closure of vulnerabilities.
- Collaborate with IT teams to implement secure system and network configurations, following industry best practices and compliance requirements.
- Provide training and mentorship to junior analysts, fostering their professional development and enhancing team capabilities.
- Participate in cross-functional IT and business projects to ensure security requirements are identified, integrated, and enforced throughout the project lifecycle.
- Hands-on experience with Cisco Umbrella, Defender for Endpoint, Identity, Office, and Sentinel.
- Knowledge of SIEM, SOAR, EDR, vulnerability, and data protection tools.
- Scripting skills (e.g., PowerShell, Python, KQL) for automation and threat hunting.
- Strong understanding of networking, authentication, certificates, and cloud security principles.
- Familiarity with MITRE ATT&CK, NIST CSF, and other industry frameworks.
- Strong analytical and problem-solving skills.
- Effective communication skills for incident handling and documentation.
- Ability to work independently and collaboratively.
- Ability to multitask under pressure.
- Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent experience).
- Preferred certifications include:
- Microsoft Certified: Security Operations Analyst Associate
- Microsoft Security, Compliance, and Identity Fundamentals
- Cisco Certified CyberOps Associate or CCNP Security
- CompTIA Security+, CySA+, or similar certifications
- Seniority level: Associate
- Employment type: Full-time
- Job function: Information Technology
- Industry: Pharmaceutical Manufacturing
Cybersecurity consultant
Posted today
Job Viewed
Job Description
Divisional Cybersecurity Officer
Posted today
Job Viewed
Job Description
Data Protection Engineer
Posted 2 days ago
Job Viewed
Job Description
Overview
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva. Designing and deploying data protection systems tailored to organizational needs. Troubleshooting and resolving backup issues promptly to minimize downtime. Managing and monitoring backup and recovering operations to ensure data availability. Creating and enforcing data protection policies compliant with government and industry regulations. Providing training and supporting staff on backup and recovery solutions.
Responsibilities- Design and deployment of data protection systems aligned with organizational needs
- Troubleshoot and resolve backup issues to minimize downtime
- Manage and monitor backup and recovery operations to ensure data availability
- Create and enforce data protection policies compliant with government and industry regulations
- Provide training and support for staff on backup and recovery solutions
- Bachelor’s degree in information technology, Computer Science, Business Administration, or a related field
- 5+ years of experience in data protection and backup technologies
- Proficiency in Dell Data Protection, Veeam, and Druva solutions
- Strong understanding of data protection principles, disaster recovery, and compliance
- Familiarity with HCI, VMware, and enterprise storage technologies
- Microsoft Certified: Information Protection and Compliance Administrator Associate will be an advantage
- Certification in data protection or relevant tools (e.g., Veeam Certified Engineer, Druva, Dell Data Protection Specialist)
Data Protection Engineer
Posted 12 days ago
Job Viewed
Job Description
Job Description
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.
Designing and deploying data protection systems tailored to organizational needs.
Troubleshooting and resolving backup issues promptly to minimize downtime.
Managing and monitoring backup and recovering operations to ensure data availability.
Creating and enforcing data protection policies compliant with government and industry regulations.
Providing training and supporting staff on backup and recovery solutions.
Qualification & Skills
Bachelor’s degree in information technology, Computer Science, Business Administration, or a related field
5+ years of experience in data protection and backup technologies
Proficiency in Dell Data Protection, Veeam, and Druva solutions.
Strong understanding of data protection principles, disaster recovery, and compliance
Familiarity with HCI, VMware, and enterprise storage technologies.
Microsoft Certified: Information Protection and Compliance Administrator Associate will be an advantage
Certification in data protection or relevant tools (e.g., Veeam Certified Engineer, Druva, Dell Data Protection Specialist
Suitable candidates will be contacted. If you do not get a response within 14 days, please consider your application unsuccessful.
Be The First To Know
About the latest Cybersecurity professionals Jobs in Johannesburg !
Data Protection Engineer
Posted 12 days ago
Job Viewed
Job Description
Job Description:
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.
Creating and enforcing data protection policies compliant with government and industry regulations.
Troubleshooting and resolving backup issues promptly to minimize downtime.
Managing and monitoring backup and recovering operations to ensure data availability.
Providing training and supporting staff on backup and recovery solutions.
Designing and deploying data protection systems tailored to organizational needs.
Qualification & Skills
Bachelor’s degree in information technology, Computer Science, Business Administration, or a related field
5+ years of experience in data protection and backup technologies
Proficiency in Dell Data Protection, Veeam, and Druva solutions.
Must have these certifications (Non-negotiable):
PowerProtect Data Manager Deploy
PowerProtect DD Deploy
Avamar Deploy
PowerProtect DD Operate
Avamar Operate
Specialist – Technology Architect, Data Protection Version 2.0 (DES-3612)
Desired certification: Veeam (Veeam Certified Engineer) and Druva (Druva Certified Cloud Professional)
Suitable candidates will be contacted. If you do not get a response within 14 days, please consider your application unsuccessful.
Engineer: Data Protection
Posted 26 days ago
Job Viewed
Job Description
- Bachelors Degree in Information Technology, Computer Science, Business Administration, or a related field.
- Certification in data protection or relevant tools (e.g., Veeam Certified Engineer, Druva, Dell Data Protection Specialist)
- Microsoft Certified: Information Protection and Compliance Administrator Associate will be an advantage.
Minimum Desired Experience
- 5+ years of experience in data protection and backup technologies.
- Proficiency in Dell Data Protection, Veeam, and Druva solutions.
- Strong understanding of data protection principles, disaster recovery, and compliance.
- Familiarity with HCI, VMware, and enterprise storage technologies.
Minimum Desired Competencies
- Strong analytical and troubleshooting skills.
- Excellent organisational and time-management abilities.
- Effective communication and collaboration skills.
- Attention to detail with a focus on accuracy and reliability.
- Proficiency in creating and enforcing data protection policies compliant with regulatory requirements.
Reporting Structure
List of duties and responsibilities:
Design and Implementation
- Design and deploy data protection systems tailored to organizational needs.
- Implement solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.
- Provide recommendations for improving existing data protection infrastructure.
Operational Management
- Manage and monitor backup and recovery operations to ensure data availability.
- Troubleshoot and resolve backup issues promptly to minimize downtime.
- Regularly test recovery procedures to validate effectiveness.
Policy Development and Compliance
- Create and enforce data protection policies compliant with government and industry regulations.
- Ensure compliance with data retention policies and contractual obligations.
Performance and Optimisation
- Create and enforce data protection policies compliant with government and industry regulations.
- Ensure compliance with data retention policies and contractual obligations.
Collaboration and Training
- Work with account managers, infrastructure teams, and business units to identify data protection needs.
- Provide training and support to staff on backup and recovery solutions.
- Liaise with vendors for technical support and system upgrades.
Documentation and Reporting
- Create and enforce data protection policies compliant with government and industry regulations.
- Ensure compliance with data retention policies and contractual obligations.
Note:
The above job profile identifies the key areas of responsibility of the position and is not all - encompassing description of duties and tasks. The job profile may be subject to review from time to time. The incumbent will be required to perform similar such duties and tasks in any area of Data Protection as may be designated by management from time to time. The incumbent will at all times be required to render the highest level of courtesy and service to the company even where such service may fall beyond the main duties or scope of this position.
Data Protection Engineer
Posted today
Job Viewed