42 Data Protection jobs in Johannesburg
Data Protection Engineer
Posted 2 days ago
Job Viewed
Job Description
Overview
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva. Designing and deploying data protection systems tailored to organizational needs. Troubleshooting and resolving backup issues promptly to minimize downtime. Managing and monitoring backup and recovering operations to ensure data availability. Creating and enforcing data protection policies compliant with government and industry regulations. Providing training and supporting staff on backup and recovery solutions.
Responsibilities- Design and deployment of data protection systems aligned with organizational needs
- Troubleshoot and resolve backup issues to minimize downtime
- Manage and monitor backup and recovery operations to ensure data availability
- Create and enforce data protection policies compliant with government and industry regulations
- Provide training and support for staff on backup and recovery solutions
- Bachelor’s degree in information technology, Computer Science, Business Administration, or a related field
- 5+ years of experience in data protection and backup technologies
- Proficiency in Dell Data Protection, Veeam, and Druva solutions
- Strong understanding of data protection principles, disaster recovery, and compliance
- Familiarity with HCI, VMware, and enterprise storage technologies
- Microsoft Certified: Information Protection and Compliance Administrator Associate will be an advantage
- Certification in data protection or relevant tools (e.g., Veeam Certified Engineer, Druva, Dell Data Protection Specialist)
Data Protection Engineer
Posted 12 days ago
Job Viewed
Job Description
Job Description
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.
Designing and deploying data protection systems tailored to organizational needs.
Troubleshooting and resolving backup issues promptly to minimize downtime.
Managing and monitoring backup and recovering operations to ensure data availability.
Creating and enforcing data protection policies compliant with government and industry regulations.
Providing training and supporting staff on backup and recovery solutions.
Qualification & Skills
Bachelor’s degree in information technology, Computer Science, Business Administration, or a related field
5+ years of experience in data protection and backup technologies
Proficiency in Dell Data Protection, Veeam, and Druva solutions.
Strong understanding of data protection principles, disaster recovery, and compliance
Familiarity with HCI, VMware, and enterprise storage technologies.
Microsoft Certified: Information Protection and Compliance Administrator Associate will be an advantage
Certification in data protection or relevant tools (e.g., Veeam Certified Engineer, Druva, Dell Data Protection Specialist
Suitable candidates will be contacted. If you do not get a response within 14 days, please consider your application unsuccessful.
Data Protection Engineer
Posted 12 days ago
Job Viewed
Job Description
Job Description:
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.
Creating and enforcing data protection policies compliant with government and industry regulations.
Troubleshooting and resolving backup issues promptly to minimize downtime.
Managing and monitoring backup and recovering operations to ensure data availability.
Providing training and supporting staff on backup and recovery solutions.
Designing and deploying data protection systems tailored to organizational needs.
Qualification & Skills
Bachelor’s degree in information technology, Computer Science, Business Administration, or a related field
5+ years of experience in data protection and backup technologies
Proficiency in Dell Data Protection, Veeam, and Druva solutions.
Must have these certifications (Non-negotiable):
PowerProtect Data Manager Deploy
PowerProtect DD Deploy
Avamar Deploy
PowerProtect DD Operate
Avamar Operate
Specialist – Technology Architect, Data Protection Version 2.0 (DES-3612)
Desired certification: Veeam (Veeam Certified Engineer) and Druva (Druva Certified Cloud Professional)
Suitable candidates will be contacted. If you do not get a response within 14 days, please consider your application unsuccessful.
Engineer: Data Protection
Posted 26 days ago
Job Viewed
Job Description
- Bachelors Degree in Information Technology, Computer Science, Business Administration, or a related field.
- Certification in data protection or relevant tools (e.g., Veeam Certified Engineer, Druva, Dell Data Protection Specialist)
- Microsoft Certified: Information Protection and Compliance Administrator Associate will be an advantage.
Minimum Desired Experience
- 5+ years of experience in data protection and backup technologies.
- Proficiency in Dell Data Protection, Veeam, and Druva solutions.
- Strong understanding of data protection principles, disaster recovery, and compliance.
- Familiarity with HCI, VMware, and enterprise storage technologies.
Minimum Desired Competencies
- Strong analytical and troubleshooting skills.
- Excellent organisational and time-management abilities.
- Effective communication and collaboration skills.
- Attention to detail with a focus on accuracy and reliability.
- Proficiency in creating and enforcing data protection policies compliant with regulatory requirements.
Reporting Structure
List of duties and responsibilities:
Design and Implementation
- Design and deploy data protection systems tailored to organizational needs.
- Implement solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.
- Provide recommendations for improving existing data protection infrastructure.
Operational Management
- Manage and monitor backup and recovery operations to ensure data availability.
- Troubleshoot and resolve backup issues promptly to minimize downtime.
- Regularly test recovery procedures to validate effectiveness.
Policy Development and Compliance
- Create and enforce data protection policies compliant with government and industry regulations.
- Ensure compliance with data retention policies and contractual obligations.
Performance and Optimisation
- Create and enforce data protection policies compliant with government and industry regulations.
- Ensure compliance with data retention policies and contractual obligations.
Collaboration and Training
- Work with account managers, infrastructure teams, and business units to identify data protection needs.
- Provide training and support to staff on backup and recovery solutions.
- Liaise with vendors for technical support and system upgrades.
Documentation and Reporting
- Create and enforce data protection policies compliant with government and industry regulations.
- Ensure compliance with data retention policies and contractual obligations.
Note:
The above job profile identifies the key areas of responsibility of the position and is not all - encompassing description of duties and tasks. The job profile may be subject to review from time to time. The incumbent will be required to perform similar such duties and tasks in any area of Data Protection as may be designated by management from time to time. The incumbent will at all times be required to render the highest level of courtesy and service to the company even where such service may fall beyond the main duties or scope of this position.
Data Protection Engineer
Posted today
Job Viewed
Job Description
Data protection engineer
Posted today
Job Viewed
Job Description
Data protection engineer
Posted today
Job Viewed
Job Description
Be The First To Know
About the latest Data protection Jobs in Johannesburg !
Information Security Lead
Posted today
Job Viewed
Job Description
Join Interfile—South Africa’s leading Electronic Bill Presentment & Payment (EBPP) fintech—where we design, build, and run large-scale digital services used by millions, partnering with top banks, major corporates, and government. You’ll work on modern architectures across both new builds and enhancements in a culture that prizes innovation, seamless integration, and exceptional delivery. We’re customer-obsessed and known for helping organizations modernise. Our Fourways office—right across from Montecasino—offers a modern workspace with a Vitality-certified gym, canteen, and great chill areas.
Purpose of the role:
Lead and continuously improve our information security posture across on-prem and cloud—covering platforms, hardware, networks, and data centres. You’ll drive vulnerability remediation through both automation and hands-on work, ensure compliance with POPIA, and design, implement, and uplift security standards and frameworks (e.g., ISO 27001/27002, NIST CSF 2.0). You’ll also own risk management and incident response while championing a security-first culture across the business.
Responsibilities:
- Security Assessment & Management
- Conduct regular security assessments across infrastructure, applications, and data environments.
- Implement and manage SAST and DAST tools and processes.
- Track, report, and drive remediation of vulnerabilities and security issues.
- Security Posture & Reporting
- Develop and maintain dashboards and reports that clearly communicate the organization’s security posture.
- Define and track KPIs for security posture, remediation velocity, and compliance.
- Collaborate with internal teams to ensure visibility and accountability for remediation efforts.
- Automation & Remediation
- Design and implement automated security controls and remediation workflows.
- Work with DevOps and IT teams to integrate security into CI/CD pipelines.
- Compliance & Regulatory Alignment
- Ensure alignment with POPIA and other applicable data protection regulations.
- Support audits and compliance reporting requirements.
- Work with legal and compliance teams to ensure data handling aligns with privacy laws.
- Standards & Frameworks
- Contribute to the design and rollout of security standards such as ISO 20027.
- Align security practices with NIST CSF 2.0 and other relevant frameworks.
- Risk Management
- Conduct risk assessments and maintain a security risk register.
- Collaborate with business units to understand and mitigate security risks tied to operations and products.
- Incident Response & Forensics
- Develop and maintain incident response plans.
- Lead investigations into security breaches and coordinate post-incident reviews.
- Security Awareness & Training
- Design and deliver security awareness programs for staff.
- Promote a security-first culture across technical and non-technical teams.
- Third-Party & Vendor Security
- Assess and manage security risks related to vendors, partners, and third-party services.
- Ensure contracts and SLAs include appropriate security clauses.
- Secure Architecture & Design
- Participate in solution architecture reviews to ensure security is embedded from the start.
- Advise on secure design patterns and threat modeling.
Requirements (Essential):
- Bachelor’s degree in Information Security, Computer Science, or related field.
- At least one security certification: CISSP, CISM, CEH, CompTIA Security+, ISO 27001 Lead Implementer (or similar).
- 5+ years in an information security role (or similar).
- Proven security experience across infrastructure, applications, and data environments.
- Hands-on with SAST/DAST tools (e.g., SonarQube, OWASP ZAP, Burp Suite).
- Strong vulnerability management and remediation workflow expertise.
- Familiarity with automation/scripting (e.g., Python, PowerShell) and CI/CD tooling.
- Working knowledge of POPIA and other data-protection regulations.
- Experience with security frameworks (e.g., NIST CSF, ISO 27001/27002).
- Ability to communicate technical risks and remediation plans to non-technical stakeholders.
Nice to Have (Desirable)
- Proactive, detail-oriented, strong sense of ownership.
- Comfortable collaborating across multiple teams and disciplines.
- Passion for security, compliance, and continuous improvement.
- Multiple or advanced security certifications.
Information Security Architect
Posted 2 days ago
Job Viewed
Job Description
Job title: Information Security Architect
Contract duration: Start with 6 months
First preference: EEE candidates
Location: JHB
The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.
Key Responsibilities:
- Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
- Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
- Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
- Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
- Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
- Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
- Define portfolio vision and reusable security patterns aligned with the EA strategy.
- Lead architecture reviews for high-risk projects, driving recommendations to resolution.
- Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
- Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
- Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
- Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
- Manage security architects and mentor engineers, developers, and vendors.
What will you bring?
- Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
- Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
- Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
- Teamwork and Energy – work across different functional and business teams with effective collaboration.
- Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
- Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
- Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).
Requirements / Skills and Competence
- Tertiary qualification in Computer Science, Engineering, or related field (preferred)
- Minimum of 5-10 years of experience in Security Architecture.
- CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
- Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
- Experience in identifying gaps in existing architectures.
- Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
- Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
- Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
- Good experience in security architecture design in Cloud and on-prem.
- Design and implementation of IOT, endpoint protection, and secure IAM.
- Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
- Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
- Knowledge of web application architectures and threat modelling.
Information Security Specialist
Posted 2 days ago
Job Viewed
Job Description
ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.
TASK AND RESPONSIBILITIES:
- Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
- Perform research, testing, evaluating, and deployment of security technology and procedures.
- Run diagnostics on any changes to data to verify any undetected breaches.
- Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
- Develop and implement information security standards, guidelines, and procedures.
- Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
- Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
- Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.
FUNCTIONAL KNOWLEDGE:
Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.
MINIMUM REQUIREMENTS• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.
EXPERIENCE• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.
#J-18808-Ljbffr