Security Engineer Data Security

Johannesburg, Gauteng Standard Bank of South Africa Limited

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

Business Segment: Personal & Private Banking

Location: ZA, GP, Johannesburg, 30 Baker Street

  • Manage and fine-tune Microsoft Purview DLP policies for endpoints, SharePoint, OneDrive & Teams
  • Investigate DLP alerts, coordinate incident response with stakeholders, and document outcomes.
  • Work closely with Legal, Risk, and Compliance teams to align DLP policies with regulatory and internal requirements (e.g., POPIA, GDPR, PCI-DSS).
  • Tune policy exceptions and reduce false positives without compromising security.

Email Security (Microsoft Defender for Office 365)

  • Administer and optimize anti-phishing, anti-malware, and anti-spoofing policies.
  • Monitor mail flow, quarantine, and threat reports to detect patterns and enhance protection.
  • Configure Safe Links, Safe Attachments, and ATP policies.
  • Support investigations of email-based threats and data leakage attempts.

Web Security (Forcepoint and DMARC)

  • Maintain and support the Forcepoint Web Security environment, including URL filtering, content categorization, and user policies.
  • Investigate web-based threat alerts and policy violations.
  • Assist in integration of web security controls with broader DLP and SIEM tools.
  • Provide guidance for policy tuning and user experience improvements.
  • Manage, Maintain and Support DMARC to ensure Email is protected against spoofing.

SSE / Cloud Access Controls (Cato Networks)

  • Configure and monitor policies on Cato Networks’ SSE platform for secure internet access and cloud app control.
  • Help define Zero Trust Network Access (ZTNA) policies for remote users and sensitive resources.
  • Review access logs, user behaviour, and cloud application usage for anomalies.
  • Coordinate with network and identity teams to streamline SSE enforcement.
  • Triage alerts across DLP, email, web, and SSE tools; escalate or respond as needed.
  • Provide weekly/monthly reports to leadership on data protection metrics, incident trends, and policy effectiveness.
  • Collaborate with SOC and Blue Teams on threat correlation and data security posture assessments.
  • Maintain documentation and support audit readiness.
Qualifications

Technical Skills

  • Strong hands-on experience with Microsoft Purview DLP (E5).
  • Proficient in Microsoft Defender for Office 365 (email hygiene, ATP, threat management).
  • Experience with Forcepoint Web Security policy design, deployment, and management.
  • Working knowledge of Secure Service Edge (SSE) and ZTNA concepts; Cato Networks experience preferred.
  • Familiarity with security incident workflows, SIEMs (e.g., Sentinel), and PowerShell scripting.

Experience

  • 5+ years in IT Security roles, with at least 2–3 focused on data security.
  • Direct involvement in policy design, incident triage, and ongoing tuning of DLP/email/web security tools.
  • Exposure to regulated environments with compliance reporting (e.g., financial services)
  • Soft Skills
  • Detail-driven with strong analytical skills.
  • Clear communicator, especially when engaging end-users on policy violations or tuning.
  • Able to balance risk mitigation with operational practicality.
  • Comfortable working across InfoSec, Infrastructure, Legal, and Business teams.

Preferred Certifications

  • Bachelors Degree in Computer Science (advantageous)
  • Microsoft Certified: Information Protection Administrator Associate (SC-400)
  • Microsoft Certified: Security Operations Analyst Associate (SC-200)
  • General security certifications (e.g., CompTIA Security+, CISM, CISSP) are a plus
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer Data Security

Johannesburg, Gauteng Standard Bank of South Africa Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Business Segment: Personal & Private Banking

Location: ZA, GP, Johannesburg, 30 Baker Street

  • Manage and fine-tune Microsoft Purview DLP policies for endpoints, SharePoint, OneDrive & Teams
  • Investigate DLP alerts, coordinate incident response with stakeholders, and document outcomes.
  • Work closely with Legal, Risk, and Compliance teams to align DLP policies with regulatory and internal requirements (e.g., POPIA, GDPR, PCI-DSS).
  • Tune policy exceptions and reduce false positives without compromising security.

Email Security (Microsoft Defender for Office 365)

  • Administer and optimize anti-phishing, anti-malware, and anti-spoofing policies.
  • Monitor mail flow, quarantine, and threat reports to detect patterns and enhance protection.
  • Configure Safe Links, Safe Attachments, and ATP policies.
  • Support investigations of email-based threats and data leakage attempts.

Web Security (Forcepoint and DMARC)

  • Maintain and support the Forcepoint Web Security environment, including URL filtering, content categorization, and user policies.
  • Investigate web-based threat alerts and policy violations.
  • Assist in integration of web security controls with broader DLP and SIEM tools.
  • Provide guidance for policy tuning and user experience improvements.
  • Manage, Maintain and Support DMARC to ensure Email is protected against spoofing.

SSE / Cloud Access Controls (Cato Networks)

  • Configure and monitor policies on Cato Networks’ SSE platform for secure internet access and cloud app control.
  • Help define Zero Trust Network Access (ZTNA) policies for remote users and sensitive resources.
  • Review access logs, user behaviour, and cloud application usage for anomalies.
  • Coordinate with network and identity teams to streamline SSE enforcement.
  • Triage alerts across DLP, email, web, and SSE tools; escalate or respond as needed.
  • Provide weekly/monthly reports to leadership on data protection metrics, incident trends, and policy effectiveness.
  • Collaborate with SOC and Blue Teams on threat correlation and data security posture assessments.
  • Maintain documentation and support audit readiness.
Qualifications

Technical Skills

  • Strong hands-on experience with Microsoft Purview DLP (E5).
  • Proficient in Microsoft Defender for Office 365 (email hygiene, ATP, threat management).
  • Experience with Forcepoint Web Security policy design, deployment, and management.
  • Working knowledge of Secure Service Edge (SSE) and ZTNA concepts; Cato Networks experience preferred.
  • Familiarity with security incident workflows, SIEMs (e.g., Sentinel), and PowerShell scripting.

Experience

  • 5+ years in IT Security roles, with at least 2–3 focused on data security.
  • Direct involvement in policy design, incident triage, and ongoing tuning of DLP/email/web security tools.
  • Exposure to regulated environments with compliance reporting (e.g., financial services)
  • Soft Skills
  • Detail-driven with strong analytical skills.
  • Clear communicator, especially when engaging end-users on policy violations or tuning.
  • Able to balance risk mitigation with operational practicality.
  • Comfortable working across InfoSec, Infrastructure, Legal, and Business teams.

Preferred Certifications

  • Bachelors Degree in Computer Science (advantageous)
  • Microsoft Certified: Information Protection Administrator Associate (SC-400)
  • Microsoft Certified: Security Operations Analyst Associate (SC-200)
  • General security certifications (e.g., CompTIA Security+, CISM, CISSP) are a plus
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security engineer data security

Johannesburg, Gauteng Standard Bank Of South Africa Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Business Segment: Personal & Private Banking Location: ZA, GP, Johannesburg, 30 Baker Street Manage and fine-tune Microsoft Purview DLP policies for endpoints, Share Point, One Drive & Teams Investigate DLP alerts, coordinate incident response with stakeholders, and document outcomes. Work closely with Legal, Risk, and Compliance teams to align DLP policies with regulatory and internal requirements (e.g., POPIA, GDPR, PCI-DSS). Tune policy exceptions and reduce false positives without compromising security. Email Security (Microsoft Defender for Office 365) Administer and optimize anti-phishing, anti-malware, and anti-spoofing policies. Monitor mail flow, quarantine, and threat reports to detect patterns and enhance protection. Configure Safe Links, Safe Attachments, and ATP policies. Support investigations of email-based threats and data leakage attempts. Web Security (Forcepoint and DMARC) Maintain and support the Forcepoint Web Security environment, including URL filtering, content categorization, and user policies. Investigate web-based threat alerts and policy violations. Assist in integration of web security controls with broader DLP and SIEM tools. Provide guidance for policy tuning and user experience improvements. Manage, Maintain and Support DMARC to ensure Email is protected against spoofing. SSE / Cloud Access Controls (Cato Networks) Configure and monitor policies on Cato Networks’ SSE platform for secure internet access and cloud app control. Help define Zero Trust Network Access (ZTNA) policies for remote users and sensitive resources. Review access logs, user behaviour, and cloud application usage for anomalies. Coordinate with network and identity teams to streamline SSE enforcement. Triage alerts across DLP, email, web, and SSE tools; escalate or respond as needed. Provide weekly/monthly reports to leadership on data protection metrics, incident trends, and policy effectiveness. Collaborate with SOC and Blue Teams on threat correlation and data security posture assessments. Maintain documentation and support audit readiness. QualificationsTechnical Skills Strong hands-on experience with Microsoft Purview DLP (E5). Proficient in Microsoft Defender for Office 365 (email hygiene, ATP, threat management). Experience with Forcepoint Web Security policy design, deployment, and management. Working knowledge of Secure Service Edge (SSE) and ZTNA concepts; Cato Networks experience preferred. Familiarity with security incident workflows, SIEMs (e.g., Sentinel), and Power Shell scripting. Experience 5+ years in IT Security roles, with at least 2–3 focused on data security. Direct involvement in policy design, incident triage, and ongoing tuning of DLP/email/web security tools. Exposure to regulated environments with compliance reporting (e.g., financial services) Soft Skills Detail-driven with strong analytical skills. Clear communicator, especially when engaging end-users on policy violations or tuning. Able to balance risk mitigation with operational practicality. Comfortable working across Info Sec, Infrastructure, Legal, and Business teams. Preferred Certifications Bachelors Degree in Computer Science (advantageous) Microsoft Certified: Information Protection Administrator Associate (SC-400) Microsoft Certified: Security Operations Analyst Associate (SC-200) General security certifications (e.g., Comp TIA Security+, CISM, CISSP) are a plus #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Compliance and Data Security Expert (Contractor)

Kempton Park, Gauteng Muse Consultancy Services

Posted 25 days ago

Job Viewed

Tap Again To Close

Job Description

Compliance and Data Security Expert (Contractor)

Kempton Park, South Africa | Posted on 03/20/2025

MUSE is a consulting company, specialising in resourcing, recruitment and outsourcing of software development teams.

MUSE was founded and is run by experienced developers who are passionate about technology and innovation. We have a vision to be the best in the industry and to provide software development skills that are cutting-edge and high-quality.

We work with some of the leading companies in South Africa and we help them build software products and solutions that are game-changing and future-oriented. We are also at the forefront of applying AI, AR and Machine-Learning concepts to real-world problems.

Our main goal is to help our clients get the most value from their technology investments. We do this by understanding their needs and providing them with the best talent available. We aim to be a vital part of the SDLC.

Job Description

The Compliance and Data Security Expert will be responsible for developing, implementing, and maintaining a robust compliance and data security program. This role requires a deep understanding of relevant regulations, industry best practices, and security technologies. The ideal candidate will be a proactive problem solver with excellent communication skills and a passion for ensuring the confidentiality, integrity, and availability of our data.

Responsibilities:

  1. Develop and maintain policies and procedures to ensure compliance with relevant regulations (e.g., POPIA, GDPR, ISO 27001, industry-specific regulations).
  2. Conduct regular compliance audits and risk assessments.
  3. Monitor and report on compliance status.
  4. Stay up-to-date with changes in regulations and industry standards.
  5. Provide guidance and training to employees on compliance requirements.
  6. Develop and implement data security policies and procedures.
  7. Conduct security risk assessments and vulnerability scans.
  8. Implement and manage security controls (e.g., access control, encryption, intrusion detection).
  9. Monitor and respond to security incidents.
  10. Manage data loss prevention and data backup/recovery processes.
  11. Implement and maintain data governance frameworks.
  12. Identify and assess potential compliance and security risks.
  13. Develop and implement risk mitigation strategies.
  14. Maintain a risk register.
  15. Conduct business impact analysis.
  16. Develop and maintain an incident response plan.
  17. Lead incident response activities.
  18. Communicate effectively with stakeholders on compliance and security matters.
  19. Provide regular reports to management.
  20. Liaise with external auditors and regulatory bodies.
Requirements

Qualifications and Skills:

  1. Bachelor's degree in Computer Science, Information Security, Law, or a related field (or equivalent experience).
  2. Relevant certifications (e.g., CISSP, CISM, CISA, CDPO/DPO).
  3. Proven experience in compliance and data security management.
  4. Deep understanding of relevant regulations (POPIA, GDPR, ISO 27001, etc.).
  5. Experience with security risk assessments and vulnerability scanning.
  6. Knowledge of security technologies and best practices.
  7. Strong analytical and problem-solving skills.
  8. Excellent communication and interpersonal skills.
  9. Ability to work independently and as part of a team.
  10. Experience with data governance frameworks.
  11. Experience with cloud security.

Desired Attributes:

  1. Proactive and detail-oriented.
  2. Strong ethical principles.
  3. Ability to manage multiple priorities.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Compliance and data security expert (contractor)

Kempton Park, Gauteng Muse Consultancy Services

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Compliance and Data Security Expert (Contractor) Kempton Park, South Africa | Posted on 03/20/2025 MUSE is a consulting company, specialising in resourcing, recruitment and outsourcing of software development teams. MUSE was founded and is run by experienced developers who are passionate about technology and innovation. We have a vision to be the best in the industry and to provide software development skills that are cutting-edge and high-quality. We work with some of the leading companies in South Africa and we help them build software products and solutions that are game-changing and future-oriented. We are also at the forefront of applying AI, AR and Machine-Learning concepts to real-world problems. Our main goal is to help our clients get the most value from their technology investments. We do this by understanding their needs and providing them with the best talent available. We aim to be a vital part of the SDLC. Job Description The Compliance and Data Security Expert will be responsible for developing, implementing, and maintaining a robust compliance and data security program. This role requires a deep understanding of relevant regulations, industry best practices, and security technologies. The ideal candidate will be a proactive problem solver with excellent communication skills and a passion for ensuring the confidentiality, integrity, and availability of our data. Responsibilities: Develop and maintain policies and procedures to ensure compliance with relevant regulations (e.g., POPIA, GDPR, ISO 27001, industry-specific regulations). Conduct regular compliance audits and risk assessments. Monitor and report on compliance status. Stay up-to-date with changes in regulations and industry standards. Provide guidance and training to employees on compliance requirements. Develop and implement data security policies and procedures. Conduct security risk assessments and vulnerability scans. Implement and manage security controls (e.g., access control, encryption, intrusion detection). Monitor and respond to security incidents. Manage data loss prevention and data backup/recovery processes. Implement and maintain data governance frameworks. Identify and assess potential compliance and security risks. Develop and implement risk mitigation strategies. Maintain a risk register. Conduct business impact analysis. Develop and maintain an incident response plan. Lead incident response activities. Communicate effectively with stakeholders on compliance and security matters. Provide regular reports to management. Liaise with external auditors and regulatory bodies. Requirements Qualifications and Skills: Bachelor's degree in Computer Science, Information Security, Law, or a related field (or equivalent experience). Relevant certifications (e.g., CISSP, CISM, CISA, CDPO/DPO). Proven experience in compliance and data security management. Deep understanding of relevant regulations (POPIA, GDPR, ISO 27001, etc.). Experience with security risk assessments and vulnerability scanning. Knowledge of security technologies and best practices. Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Experience with data governance frameworks. Experience with cloud security. Desired Attributes: Proactive and detail-oriented. Strong ethical principles. Ability to manage multiple priorities. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Data Management Security Engineer

Johannesburg, Gauteng NTT Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Data Management Security Engineer page is loaded Senior Data Management Security Engineer Apply remote type Hybrid Working locations Johannesburg, South Africa Cape Town, South Africa time type Full time posted on Posted Yesterday job requisition id R-

Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

The Data Management Security Engineer is responsible for defining and enforcing data security strategies, policies, and controls across the organization’s data landscape. This role ensures that data assets are protected against unauthorized access, breaches, and misuse, while enabling secure and compliant data usage across analytics, operations, and digital platforms.

Key Responsibilities:

Security Architecture & Strategy

  • Define and implement data security architecture aligned with enterprise security and data governance frameworks.

  • Lead the design of secure data platforms, including data lakes, warehouses, and analytics environments.

Access Control & Role-Based Security

  • Develop and manage role-based access control (RBAC) models across data systems.

  • Ensure least-privilege access principles are enforced and regularly reviewed.

Data Classification & Protection

  • Oversee data classification initiatives to identify and tag sensitive, confidential, and regulated data.

  • Implement data masking, encryption, and tokenization strategies where appropriate.

Compliance & Risk Management

  • Ensure compliance with data privacy and protection regulations (e.g., POPIA, GDPR, HIPAA).

  • Conduct risk assessments and audits related to data access, usage, and storage.

Collaboration & Governance

  • Work closely with data governance, engineering, and legal teams to align security with business and regulatory needs.

  • Participate in data governance councils and security steering committees.

Monitoring & Incident Response

  • Define and monitor data access logs and anomaly detection systems.

  • Support incident response teams in investigating and remediating data-related security events.

Knowledge and Attributes:

  • Excellent communication skills to effectively convey technical information to non-technical stakeholders.
  • Excellent analytical thinking and problem-solving skills to prevent hacking on a network.
  • Ability to identify and evaluate potential risks and to develop solutions.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Seasoned familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR).
  • Seasoned proficiency of understanding in network and system architecture, protocols, and security controls.
  • Strong analytical skills to analyze security incidents and assess potential risks.
  • Ability to work both independently and collaboratively in a fast-paced environment.

Academic Qualifications and Certifications:

  • Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related.
  • Certified Information Systems Security Professional (CISSP) or Certified Information Privacy Professional (CIPP/CIPM) or Certified Data Management Professional (CDMP)
  • Cloud security certifications (e.g.,AWS Security Specialty,Azure Security Engineer Associate)

Workplace type :

Hybrid Working

About NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Senior Data Management Security Engineer

Johannesburg, Gauteng NTT America, Inc.

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
The Data Management Security Engineer is responsible for defining and enforcing data security strategies, policies, and controls across the organization's data landscape. This role ensures that data assets are protected against unauthorized access, breaches, and misuse, while enabling secure and compliant data usage across analytics, operations, and digital platforms.
**Key Responsibilities:**
**Security Architecture & Strategy**
+ Define and implement data security architecture aligned with enterprise security and data governance frameworks.
+ Lead the design of secure data platforms, including data lakes, warehouses, and analytics environments.
**Access Control & Role-Based Security**
+ Develop and manage role-based access control (RBAC) models across data systems.
+ Ensure least-privilege access principles are enforced and regularly reviewed.
**Data Classification & Protection**
+ Oversee data classification initiatives to identify and tag sensitive, confidential, and regulated data.
+ Implement data masking, encryption, and tokenization strategies where appropriate.
**Compliance & Risk Management**
+ Ensure compliance with data privacy and protection regulations (e.g., POPIA, GDPR, HIPAA).
+ Conduct risk assessments and audits related to data access, usage, and storage.
**Collaboration & Governance**
+ Work closely with data governance, engineering, and legal teams to align security with business and regulatory needs.
+ Participate in data governance councils and security steering committees.
**Monitoring & Incident Response**
+ Define and monitor data access logs and anomaly detection systems.
+ Support incident response teams in investigating and remediating data-related security events.
**Knowledge and Attributes:**
+ Excellent communication skills to effectively convey technical information to non-technical stakeholders.
+ Excellent analytical thinking and problem-solving skills to prevent hacking on a network.
+ Ability to identify and evaluate potential risks and to develop solutions.
+ Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
+ Seasoned familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR).
+ Seasoned proficiency of understanding in network and system architecture, protocols, and security controls.
+ Strong analytical skills to analyze security incidents and assess potential risks.
+ Ability to work both independently and collaboratively in a fast-paced environment.
**Academic Qualifications and Certifications:**
+ Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related.
+ Certified Information Systems Security Professional (CISSP) or Certified Information Privacy Professional (CIPP/CIPM) or Certified Data Management Professional (CDMP)
+ Cloud security certifications (e.g.,AWS Security Specialty,Azure Security Engineer Associate)
**Workplace type** **:**
Hybrid Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Data security Jobs in Johannesburg !

Information Security Analyst II

Johannesburg, Gauteng nedbank

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.

Job Responsibilities
  • We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
  • Experience with Email and Web Proxies
  • DNS Security knowledge
  • Experience with Microsoft O365
  • Assist with support of current email and web security tasks
  • Liaise with other teams to promote good security practices and explain security procedures
  • Experience with Security Technologies
  • Building relationships with I&O Teams
  • Oversee the implementation of the information security changes and check for the short comings and risks.
  • Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
  • Participate in the implementation of new products as provided in the selection criteria.
  • Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
  • Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
  • Document and maintain all relevant processes and procedures mindful of current policies and standards.
  • Create and maintain information security standards.
  • Oversee and monitor the information security environment according to set standards.
  • Review and contribute to project documentation including business requirements, designs and implementation.
  • Create design documentation according to relevant standards and practices
  • Implement specific Information security technologies.
  • Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
  • Log submit and implement low, medium and high risk changes independently.
  • Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
  • Oversee and ensure change was successful in certain cases and when required perform unit testing.
  • Oversee and ensure back-ups are done, documents are stored and statuses updated.
  • Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
  • Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
  • Ensure job related tasks and processes are in place.
  • Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
  • Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
  • Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
  • Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
  • Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
  • Transfer of knowledge to team members.
  • Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
Technical Knowledge
  • Strong knowledge of Information Security Principles
  • Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
  • Knowledge of Email Security
  • Experience with Email Security Technologies
  • Experience Service Now
  • Experience Microsoft O365
Essential Qualifications - NQF Level
  • Matric / Grade 12 / National Senior Certificate
  • Advanced Diplomas/National 1st Degrees
Preferred Certifications
  • CCNA - Security
  • Security +
  • Network +
  • MS Azure Certifications – MS 365
Minimum Experience Level

Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks

Technical / Professional Knowledge
  • Administrative procedures and systems
  • Data analysis
  • Governance, Risk and Controls
  • Principles of project management
  • Relevant regulatory knowledge
  • Relevant software and systems knowledge
  • Cluster Specific Operational Knowledge
  • System Development Life cycle(SDLC)
  • TCP/IP
  • Information Security terms and definitions
  • Information Security policies and procedures
  • Communication
  • Customer Focus
  • Initiating Action
  • Managing Work
  • Technical/Professional Knowledge and Skills

---

Please contact the Nedbank Recruiting Team at

If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.

Nedbank Ltd Reg No 1951/ /06.
Authorised financial services and registered credit provider (NCRCP16).

For assistance please contact the Nedbank Recruiting Team at

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

InfyStrat is seeking a motivated Cyber Security Analyst to join our team and contribute to our mission of safeguarding our digital assets and infrastructure. In this role, you will monitor, detect, and respond to security threats, vulnerabilities, and incidents across our systems. You'll perform risk assessments, analyze security breaches, and provide remediation recommendations while collaborating with various teams to enhance our security posture. This is a fantastic opportunity to grow your skills in a fast-paced environment while playing a critical role in protecting our organization from cyber threats.

Key Responsibilities:
  • Monitor security alerts and events from various sources, including SIEM tools, to identify and respond to security threats.
  • Conduct thorough investigations of security incidents, documenting findings and coordinating response actions.
  • Assist in the development and implementation of security policies, procedures, and guidelines to protect sensitive information.
  • Perform vulnerability assessments and penetration testing to identify security weaknesses.
  • Analyze trends and patterns in security incidents and provide recommendations for improving defense mechanisms.
  • Stay updated on the latest cybersecurity threats, vulnerabilities, and best practices.
  • Work with IT and development teams to ensure secure configurations and practices across all systems.
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 2+ years of experience in cybersecurity, information security, or a related role.
  • Strong understanding of security principles, concepts, and technologies.
  • Experience with security monitoring tools, SIEM platforms, and incident response procedures.
  • Familiarity with network security, firewalls, intrusion detection/prevention systems, and secure coding practices.
  • Knowledge of security frameworks and regulatory standards (e.g., NIST, ISO 27001, GDPR).
  • Strong analytical and problem-solving skills, with attention to detail.
  • Excellent communication skills to effectively collaborate with cross-functional teams.
  • CERT, CISSP, CISM, or equivalent security certifications are a plus.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Sandton, Gauteng Core Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Overview Support the Cyber Security team in monitoring, remediating, and reporting on security issues across the organisation. This includes handling alerts, engaging users, managing vulnerabilities, supporting awareness training, and assisting with internal reporting. Key Responsibilities Security Incident Handling Resolve cyber security-related support tickets within SLA. Monitor alerts from Slack, email, and security tools. Engage users directly and take full ownership of each incident, ensuring it is thoroughly investigated and resolved without delay. Vulnerability & Endpoint Management Track and drive remediation of vulnerabilities with IT teams and users. Ensure security applications are correctly installed and running on all endpoints. Threat Monitoring Monitor threat intelligence sources for risks to Core Group and escalate where required. Training & Awareness Assist with cyber awareness course creation and reviews. Enrol staff via LMS and manage reminders. Reporting & Presentations Create or contribute to internal presentations (e.g., Cyber Pack Updates, IT meetings). Requirements 3-5 years in a security analyst, SOC, or IT security support role Familiarity with endpoint security, vulnerability tracking, and phishing incident response Strong communication and follow-up skills Comfortable using communication, productivity, and presentation tools Able to work independently and escalate appropriately
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Data Security Jobs View All Jobs in Johannesburg