163 Devops Security jobs in South Africa

Cloud Security Engineer

R900000 - R1200000 Y Old Mutual South Africa

Posted today

Job Viewed

Tap Again To Close

Job Description

Let's Write Africa's Story Together
Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.

Job Description

  • Matric
  • Degree or diploma in IT or relates field
  • 3- 4 years of relevant experience
  • 2+ years' Cloud security engineer and cloud compliance
  • CompTIA Security+
  • AWS Cloud Practitioner - Certified Cloud Practitioner
  • AWS Security Specialty
  • Certified Cloud Security Professional – CCSP
  • GIAC Cloud Security Automation (GCSA)

Additional Qualifications / Experience (Preferred Not a Requirement

  • CASP+ - CompTIA Advanced Security Practitioner
  • CCNP Cloud: Cisco Certified Network Professional Cloud

Designs and builds the organisation's cybersecurity systems and infrastructure. Provides specialist knowledge on maintaining a secure cyber security framework. Analyses and monitors the organisation's cybersecurity measures and responds to actual penetration attempts by malicious hackers.

Responsibilities
Information Security

Lead in detecting and analyzing security incidents, including attacks, breaches, and identified vulnerabilities, and remediate any security gaps in line with the security incident management procedure.

Company Data Protection

Design and implement disaster recovery and contingency plans to protect company data.

Horizon Scanning

Explore and develop a detailed understanding of external developments or emerging issues and evaluate their potential impact on, or usefulness to, the organization.

Data Exploration

Conduct research and select relevant information to enable analysis of key themes and trends using primary data sources and business intelligence tools.

Policies and Procedures Development

Contribute to the drafting of policies, procedures, and related guidelines within an area of expertise to meet defined key principles and ensure compliance with external requirements.

Business Requirements Identification

Collect business requirements using a variety of methods, such as interviews, document analysis, workshops, and workflow analysis, to express the requirements in terms of target user roles and goals.

Faults Diagnosis and Correction

Provide fault isolation and resolution for complex challenges to limit and address issues promptly.

Technical Developments Recommendation

Discuss and recommend technical developments to improve the quality of the website/portal/applications software and supporting infrastructure to better meet users' needs.

Operational Compliance

Maintain and renew a deep knowledge and understanding of the organization's policies and procedures and of relevant regulatory codes and codes of conduct, and ensure own work adheres to required standards. Or identify, within the team, patterns of noncompliance with the organization's policies and procedures and with relevant regulatory codes and codes of conduct, taking appropriate action to report and resolve these and escalating issues as appropriate.

Database Specifications

Contribute to the approval process for database specifications to ensure all agreed standards and protocols are followed and data integrity is preserved.

Personal Capability Building

Develop own capabilities by participating in assessment and development planning activities as well as formal and informal training and coaching; gain or maintain external professional accreditation, where relevant, to improve performance and fulfill personal potential. Maintain an in-depth understanding of technology, external regulation, and industry best practices through ongoing education, attending conferences, and reading specialist media.

Skills
Adaptive Thinking, Application Development, Computer Literacy, Confidentiality, Data Compilation, Data Compression, Data Controls, Data Modeling, Data Privacy, Data Recovery, Digital Literacy, Gateway Servers, IT Network Security, Probing Questions, Test Case Management

Competencies
Action Oriented

Communicates Effectively

Cultivates Innovation

Ensures Accountability

Manages Complexity

Nimble Learning

Optimizes Work Processes

Persuades

Education
NQF Level 7 - Degree, Advance Diploma or Postgraduate Certificate or equivalent

Closing Date
16 October 2025 , 23:59

The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.
The Old Mutual Story

This advertiser has chosen not to accept applicants from your region.

Cloud Security Engineer

R400000 - R1200000 Y AncerlConsult

Posted today

Job Viewed

Tap Again To Close

Job Description

Location:
Johannesburg (Hybrid) or Remote in South Africa

Contract:
6–12 months, extendable

About the role

Secure our Azure workloads end-to-end—identity, access, controls, monitoring—supporting regulated-industry requirements.

What you'll do

  • Design & implement Azure security controls (MFA/SSO, PAM, conditional access, RBAC, Key Vault, Defender).
  • Harden landing zones, review policies/blueprints, and drive zero-trust posture.
  • Build/run detection & response with logs/telemetry (Sentinel/Defender).
  • Perform risk assessments, security reviews, and remediation plans.
  • Write standards, playbooks, and knowledge articles.

Must-haves

  • Certs:
    AZ-104
    (or
    AZ-305
    if architect track)
    and
    SC-300
    (or
    AZ-500
    /
    Security+
    ).
  • 4+ years in cloud security, IAM, and Azure governance.

Nice-to-haves

  • SC-100, CISSP/CISM, experience with HSM/PKI and regulatory audits.
This advertiser has chosen not to accept applicants from your region.

Cloud Security Engineer

Sandton, Gauteng R1200000 - R2400000 Y Itonga Resourcing

Posted today

Job Viewed

Tap Again To Close

Job Description

We are looking for an experienced Cloud Security Engineer to join our team on an exciting project. This role is perfect for someone passionate about building secure, scalable, and modern cloud environments while driving innovation in cloud security.

Role Overview

As a Cloud Security Engineer, you'll design, build, and maintain secure infrastructure primarily on AWS, with integration across Azure. You'll play a key role in ensuring strong security practices across cryptography, IAM, APIs, and modern application development.

Key Responsibilities:


• Design, implement, and support secure AWS cloud environments (EKS, S3, RDS) with Azure integration.


• Deploy and maintain cryptographic solutions for data security and compliance.


• Manage API security, secrets management, and identity & access controls.


• Develop secure microservices with Java & Spring Boot.


• Implement CI/CD pipelines (Jenkins, Git).


• Deploy and manage Docker and Kubernetes environments.


• Support ETL processes, optimise SQL queries, and ensure data integrity.


• Collaborate with teams to troubleshoot issues and respond to incidents.


• Drive security governance, threat modelling, and compliance activities.

Requirements:


• Bachelor's degree in Computer Science/Information Systems (or related field).


• 5+ years' experience in cloud engineering with strong AWS expertise.


• Proven cryptography, key management, and secure software development experience.


• Strong knowledge of network security, IAM, and API management.


• Proficient in Java, Spring Boot, SQL, Docker, Kubernetes, Jenkins, CI/CD.


• Experience with Azure, monitoring tools, and ETL/data integration.


• Familiarity with Agile and DevOps culture.


• AWS/Azure certifications (advantage).


• Knowledge of Terraform/CloudFormation is a plus.

Interested? Apply by sending your CV to:

leigh-

This advertiser has chosen not to accept applicants from your region.

Cloud Security Analyst

R250000 - R450000 Y Luno

Posted today

Job Viewed

Tap Again To Close

Job Description

About us:

Luno is the crypto investment app you can rely on, enabling you to buy, store and explore crypto securely. We're committed to putting the power of cryptocurrency in everyone's hands sensibly and responsibly.

Since 2013, we've helped millions of people around the world invest safely in crypto. We do this by cutting through the hype and supporting customers at every step of the way. All products and cryptocurrencies on our platform must first meet stringent legal, risk and technical security standards.

Transparency is key for us. Luno stores all crypto on a 1:1 basis and we have rigorous processes in place so you can be confident your investment is secure. We're available in more than 40 countries around the world and we work closely with respective regulators in all of these markets to be fully compliant, as we believe this is the best way to help everyone, everywhere, invest safely.

About the team:

The Cloud Security team at Luno is responsible for identifying security threats and improvement areas within our cloud hosted resources, and ensuring that we both strive to implement best practices everywhere and detect any deviations. This team works closely with engineering and IT operations to ensure the best security practices are followed in both areas of the business.

The Cloud Security team is looking for a Cloud Security Analyst to contribute to the establishment of the function. The successful candidate will assist the Cloud Security team in delivering on the business security mission to be the most secure crypto currency platform in the world.

Your mission will be:
  • To constantly analyse our cloud environments for improvement and automating our detection capabilities.
  • Consulting and advising on best practices for new projects throughout the design and implementation phases of the project.
  • Analysing existing infrastructure, microservices and integration implementations for risks and defining best practice configurations to mitigate such risks.
  • Designing proof of concepts for improvements with safe rollout plans.
  • Improving our detection capability for anomalies and working with the relevant teams to resolve them.

A little about you:

  • Experienced using AWS or other public cloud providers (AWS certifications would be advantageous).
  • Experience using Kubernetes, carrying any current Kubernetes certifications would be an advantage.
  • Experience in Cloud / Platform Engineering, Systems Operations, DevOps and/or other relevant fields.
  • Experience in monitoring and alerting.
  • Experience in automation and development of scripts in any language (Python preferred).
  • Experience with developing infrastructure as code in Terraform.
  • Familiarity with the SDLC.
  • A passion for learning.
Life at Luno:
  • Remote but reachable work policy gives you the freedom to choose between working from home or the office.
  • Plus the option to buy and sell up to 5 days leave
  • Improve body and mind, with excellent private medical insurance
  • Access to Learnably and our additional learning platforms for your personal and professional development
  • 6 months primary care-giver leave
  • Paw-ternity leave for your furry friend
  • Annual Inspiration Day in addition to your annual leave which increases based on your length of service
  • A collaborative, friendly work community, with regular social events.
  • 0 fees up to a certain amount with Luno from the day you start.*

  • Offer only available on Luno Instant Buy, not Luno Exchange

We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, colour, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.

#LI-DNI

This advertiser has chosen not to accept applicants from your region.

Security Engineer

Pretoria, Gauteng Network Recruitment

Posted today

Job Viewed

Tap Again To Close

Job Description

Cybersecurity Management
  • Establish and maintain cybersecurity standards, controls and compliance frameworks (SOC2, HiTrust, PCI DSS).
  • Monitor security operations, controls and regulatory alignment across the business.
  • Perform security design reviews, vulnerability scanning, penetration testing and remediation.
  • Own security tooling lifecycle (selection, implementation, maintenance).
  • Lead audit readiness and external engagements for cybersecurity certifications.
Infrastructure & Security Operations
  • Securely plan, deploy and maintain IT and cloud infrastructure with a cybersecurity focus.
  • Implement and mature processes for threat detection, prevention and incident response.
  • Define and enforce infrastructure and software security standards with Dev, IT and DevOps.
  • Lead disaster recovery and crisis communication processes.
  • Manage vendors and collaborate across teams to maintain secure environments.
Risk, Compliance & Governance
  • Identify, assess and mitigate cybersecurity and privacy risks across products and services.
  • Improve automation of security controls and secure SDLC processes.
  • Drive remediation of audit and risk findings, ensuring non-recurrence.
  • Manage internal/external security audits and maintain risk documentation.
Documentation & QMS
  • Own the cybersecurity roadmap, evidence packs, audit calendar and reporting.
  • Maintain centralised documentation of security assets, controls and test outcomes.
  • Approve and store penetration test and vulnerability scan outcomes with remediation tracking.
  • Ensure documentation meets certification and customer-audit requirements.
Job experience and Skills Required:
  • AWS Well Architected Framework
  • Trusted Advisor
  • GuardDuty / SCP / SSM / IAM / WAF
  • Container services such as ECS/EKS
  • Incident detection and response management.
  • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
  • Drafting and implementing security policies, security procedures, security design and implementation
Apply now!
This advertiser has chosen not to accept applicants from your region.

Security Engineer

Pretoria, Gauteng Rad Resources

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

AWSMinimum education (essential):
Engineering degree (Computer, Software, Mechanical or Electronic
Minimum education (desirable):


  • OSCP (Offensive Security Certified Professional)
  • PNPT (Practical Network Penetration Tester)
  • CISSP (Certified Information Systems Security Professional)
  • CCSP (Certified Cloud Security Practitioner)
Minimum applicable experience (years):
AWS' ecosystem:


  • AWS Well Architected Framework
  • Trusted Advisor
  • GuardDuty / SCP / SSM / IAM / WAF
  • Container services such as ECS/EKS
  • Incident detection and response management.
  • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
  • Drafting and implementing security policies, security procedures, security design and implementation.
The following would be advantageous:
  • ISO 14971 (risk management) compliance
  • ISO 27032 (cybersecurity) compliance
  • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)
Skills and Knowledge (essential):
  • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
  • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
  • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
  • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
  • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
  • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2
This advertiser has chosen not to accept applicants from your region.

Security Engineer

R600000 - R1200000 Y hearX

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

As our IT Security Engineer, you'll support us by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect our systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

Cybersecurity Management 40%

  • Drive development standards and processes related to cybersecurity compliance.
  • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
  • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
  • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
  • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
  • Identify, implement and maintain all security tools and technology.
  • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
  • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
  • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.

Infrastructure Management 30%

  • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
  • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
  • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
  • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
  • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
  • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that
  • the IT team follows the requirements set in line with cybersecurity standards.
  • Implement cybersecurity continuous improvement programs.
  • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
  • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.

Risk Management and Compliance 20%

  • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
  • Improve the automation of security controls.
  • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
  • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
  • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
  • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
  • Manage internal and external audits as required with relation to cybersecurity.
  • Maintain documentation for cybersecurity-related risks, processes and findings.

QMS and Documentation 10%

  • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
  • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
  • Proactively keep stakeholders updated on status, progress, risks and problems.
  • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
  • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
  • Maintain cybersecurity documents and records in line with certification requirements.
  • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.

Role Requirements

Minimum education
 
(essential):

Engineering degree (Computer, Software, Mechanical or Electronic)

Minimum education (desirable):

  • OSCP (Offensive Security Certified Professional)
  • PNPT (Practical Network Penetration Tester)
  • CISSP (Certified Information Systems Security Professional)
  • CCSP (Certified Cloud Security Practitioner)

Minimum applicable experience (years):

AWS' ecosystem:

  • AWS Well Architected Framework
  • Trusted Advisor
  • GuardDuty / SCP / SSM / IAM / WAF
  • Container services such as ECS/EKS
  • Incident detection and response management.
  • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
  • Drafting and implementing security policies, security procedures, security design and implementation.

The following would be advantageous:

  • ISO risk management) compliance
  • ISO cybersecurity) compliance
  • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)

Skills and Knowledge
 
(essential):

  • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
  • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
  • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
  • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
  • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
  • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
  • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.

This job description is not a definitive or exhaustive list of responsibilities and is subject to change depending on changing business requirements. Employees will be consulted on any changes. Employee's performance will be reviewed based on the agreed upon objectives
.

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Devops security Jobs in South Africa !

Security Engineer

Sandton, Gauteng R600000 - R1200000 Y Discovery Ltd.

Posted today

Job Viewed

Tap Again To Close

Job Description

Business Unit: Discovery Bank

Function: Banking

Date: 17 Oct 2025

Security Engineer

About Discovery

Discovery's core purpose is to make people healthier and to enhance and protect their lives. We seek out and invest in exceptional individuals who understand and support our core purpose, and whose own values align with those of Discovery. Our fast-paced and dynamic environment enables smart, self-driven people to be their best. As global thought leaders, Discovery is passionate about innovating in order to not only achieve financial success, but to ignite positive and meaningful change within our society.

About Discovery Bank

We're the world's first behavioural bank, designed with our clients in mind. We haven't changed just one thing, we've changed everything. Our main goal is to improve the financial health of our clients by helping change how they work with their money. Through Vitality Money, our clients will learn more about what it means to be financially healthy and get rewarded for managing their money well. If you are a problem solver, always questioning the way things are done, passionate about doing what is right, have the ability to change direction quickly when needed and / or love to dazzle your clients, Discovery Bank, has a job where you can be yourself and your best in an environment that is safe and nurturing.

Job Purpose

The Security Engineer is responsible for designing and building security solutions for Discovery Bank. The incumbent will develop and integrate security solutions for application systems, projects and applied technologies, also solving for technical problems and challenges that arise. The Security Engineer is also responsible for overseeing and conducting penetration tests within the Discovery Bank environment.

Areas of responsibility may include but not limited to

  • Acquiring a detailed understanding of business processes and applications.
  • Translating technology and environmental conditions (business, legal and regulatory requirements) into the security design for applications and business processes.
  • Proactively engaging in all stages of the development lifecycle to ensure that solutions are securely designed, built, verified, deployed and maintained.
  • Create and implement penetration testing methods, scripts and tools.
  • Check for gaps in security that could occur and advise on best practice to minimise risk
  • Perform risk and threat modelling as part of security assessments and solution design
  • Participate in resolution of incidents in order to engineer requisite solutions.
  • Deliver report, papers and track issues to resolution.
  • Define, implement and maintain security policy and security standards.
  • Evaluate new technologies and processes that enhance security capabilities for the bank.
  • Collaborate with colleagues on and provide thought leadership on security topics e.g. authorisation, authentication, encryption, integration solutions, etc.

Personal Attributes and Skills

  • Values driven.
  • Facilitation and conflict resolution capabilities, and builds working relationships.
  • Problem solving and analytical capabilities.
  • Excellent written and verbal communication skills, with the ability to convey technical detail in clear and concise manner.
  • Ability to work under time constraints with minimal supervision in an agile environment.
  • Looks for ways to optimise and automate solutions and testing in continuous integration/development and deployment environments.
  • Willingness to both issue and accept challenges to analytical problems.
  • Knowledge of Banking products, processes and systems is an advantage.

Education and Experience

  • Bachelor of Science degree in computer/electronic engineering or software programming.
  • At least 3-5 years' experience software development/engineering within banking or financial institutions.
  • Experience with popular programming languages and frameworks e.g. Javascript, Node, Java, Spring, .Net, etc.
  • Experience with integration protocols and technologies e.g. SOAP, REST, JSON, XML, etc.
  • Solid understanding of cloud, virtualisation and containerisation security.
  • Solid understanding of modern federated authentication and authorization frameworks e.g. SAML, OIDC, ADFS, OAuth2, etc.
  • Working experience with network security and mainstream operating systems e.g. Linux, Windows, etc.
  • Working knowledge of data protection best practices (at rest, in flight and in use).
  • Experience with encryption protocols, technologies and techniques.
  • Experience working with product teams specifying secure application requirements.
  • Certifications advantages CISSP, CEH, ISACA CRISC/CISM, CISSP-ISSAP, CISSP-CSSLP, CSK, CCSP, etc.
  • Working knowledge of security penetration methods and tools
  • Knowledge of SAP security, micro-services & API security is considered an advantage.
  • Working knowledge of tools such as log management and log analytics tools e.g. splunk is advantageous.
  • Experience building monitoring dashboards and management reporting is considered advantageous.

EMPLOYMENT EQUITY

The Company's approved Employment Equity Plan and Targets will be considered as part of the recruitment process. As an Equal Opportunities employer, we actively encourage and welcome people with various disabilities to apply.

This advertiser has chosen not to accept applicants from your region.

Security Engineer

R600000 - R1200000 Y Discovery Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

About Discovery
Discovery's core purpose is to make people healthier and to enhance and protect their lives. We seek out and invest in exceptional individuals who understand and support our core purpose, and whose own values align with those of Discovery. Our fast-paced and dynamic environment enables smart, self-driven people to be their best. As global thought leaders, Discovery is passionate about innovating in order to not only achieve financial success, but to ignite positive and meaningful change within our society.

About Discovery Bank
We're the world's first behavioural bank, designed with our clients in mind. We haven't changed just one thing, we've changed everything. Our main goal is to improve the financial health of our clients by helping change how they work with their money. Through Vitality Money, our clients will learn more about what it means to be financially healthy and get rewarded for managing their money well. If you are a problem solver, always questioning the way things are done, passionate about doing what is right, have the ability to change direction quickly when needed and / or love to dazzle your clients, Discovery Bank, has a job where you can be yourself and your best in an environment that is safe and nurturing.

Job Purpose
The Security Engineer is responsible for designing and building security solutions for Discovery Bank. The incumbent will develop and integrate security solutions for application systems, projects and applied technologies, also solving for technical problems and challenges that arise. The Security Engineer is also responsible for overseeing and conducting penetration tests within the Discovery Bank environment.

Areas of responsibility may include but not limited to

  • Acquiring a detailed understanding of business processes and applications.
  • Translating technology and environmental conditions (business, legal and regulatory requirements) into the security design for applications and business processes.
  • Proactively engaging in all stages of the development lifecycle to ensure that solutions are securely designed, built, verified, deployed and maintained.
  • Create and implement penetration testing methods, scripts and tools.
  • Check for gaps in security that could occur and advise on best practice to minimise risk
  • Perform risk and threat modelling as part of security assessments and solution design
  • Participate in resolution of incidents in order to engineer requisite solutions.
  • Deliver report, papers and track issues to resolution.
  • Define, implement and maintain security policy and security standards.
  • Evaluate new technologies and processes that enhance security capabilities for the bank.
  • Collaborate with colleagues on and provide thought leadership on security topics e.g. authorisation, authentication, encryption, integration solutions, etc.

Personal Attributes And Skills

  • Values driven.
  • Facilitation and conflict resolution capabilities, and builds working relationships.
  • Problem solving and analytical capabilities.
  • Excellent written and verbal communication skills, with the ability to convey technical detail in clear and concise manner.
  • Ability to work under time constraints with minimal supervision in an agile environment.
  • Looks for ways to optimise and automate solutions and testing in continuous integration/development and deployment environments.
  • Willingness to both issue and accept challenges to analytical problems.
  • Knowledge of Banking products, processes and systems is an advantage.

Education And Experience

  • Bachelor of Science degree in computer/electronic engineering or software programming.
  • At least 3-5 years' experience software development/engineering within banking or financial institutions.
  • Experience with popular programming languages and frameworks e.g. Javascript, Node, Java, Spring, .Net, etc.
  • Experience with integration protocols and technologies e.g. SOAP, REST, JSON, XML, etc.
  • Solid understanding of cloud, virtualisation and containerisation security.
  • Solid understanding of modern federated authentication and authorization frameworks e.g. SAML, OIDC, ADFS, OAuth2, etc.
  • Working experience with network security and mainstream operating systems e.g. Linux, Windows, etc.
  • Working knowledge of data protection best practices (at rest, in flight and in use).
  • Experience with encryption protocols, technologies and techniques.
  • Experience working with product teams specifying secure application requirements.
  • Certifications advantages CISSP, CEH, ISACA CRISC/CISM, CISSP-ISSAP, CISSP-CSSLP, CSK, CCSP, etc.
  • Working knowledge of security penetration methods and tools
  • Knowledge of SAP security, micro-services & API security is considered an advantage.
  • Working knowledge of tools such as log management and log analytics tools e.g. splunk is advantageous.
  • Experience building monitoring dashboards and management reporting is considered advantageous.

EMPLOYMENT EQUITY

The Company's approved Employment Equity Plan and Targets will be considered as part of the recruitment process. As an Equal Opportunities employer, we actively encourage and welcome people with various disabilities to apply.

This advertiser has chosen not to accept applicants from your region.

Security Engineer

R600000 - R1200000 Y wePlace

Posted today

Job Viewed

Tap Again To Close

Job Description

Our client, an award-winning MedTech is looking for a Security Engineer to join their team.

Job Purpose:

Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

As the IT Security Engineer, you'll support the company by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect their systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

Minimum education
(essential):

Engineering degree (Computer, Software, Mechanical or Electronic

Minimum education (desirable):

  • OSCP (Offensive Security Certified Professional)
  • PNPT (Practical Network Penetration Tester)
  • CISSP
    (Certified Information Systems Security Professional)
  • CCSP (Certified Cloud Security Practitioner)

Minimum applicable experience (years):

AWS' ecosystem:

  • AWS Well Architected Framework
  • Trusted Advisor
  • GuardDuty / SCP / SSM / IAM / WAF
  • Container services such as ECS/EKS
  • Incident detection and response management.
  • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
  • Drafting and implementing security policies, security procedures, security design and implementation.

The following would be advantageous:

  • ISO risk management) compliance
  • ISO cybersecurity) compliance
  • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)

Skills and Knowledge (essential):

  • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
  • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
  • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
  • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
  • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
  • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
  • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.

Cybersecurity Management 40%

  • Drive development standards and processes related to cybersecurity compliance.
  • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
  • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
  • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
  • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
  • Identify, implement and maintain all security tools and technology.
  • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
  • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
  • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.

Infrastructure Management 30%

  • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
  • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
  • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
  • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
  • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
  • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that the IT team follows the requirements set in line with cybersecurity standards.
  • Implement cybersecurity continuous improvement programs.
  • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
  • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.

Risk Management and Compliance 20%

  • Collaborate with divisional the RAQA team and Senior Managers
  • Managers to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
  • Improve the automation of security controls.
  • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
  • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
  • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
  • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
  • Manage internal and external audits as required with relation to cybersecurity.
  • Maintain documentation for cybersecurity-related risks, processes and findings.

QMS and Documentation 10%

  • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
  • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
  • Proactively keep stakeholders updated on status, progress, risks and problems.
  • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
  • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
  • Maintain cybersecurity documents and records in line with certification requirements.
  • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.

2 days' work-from-home in line with Company Policy (only applicable after probation is successfully passed).

Should you not receive a response from us within one week of your application, your application has unfortunately not been successful.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Devops Security Jobs