48 Director Of Security jobs in South Africa

Senior Security Operations Engineer

Western Cape, Western Cape Canonical

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Canonical Cape Town, Western Cape, South Africa

We have opened several senior/staff Security Operations Engineer (SOC) positions, creating a new team reporting to the CISO. We are looking for a range of experience in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest an engagement in cyber attack and defence, and outstanding academic and career performance even if experience is limited.

Our goal is to build an entirely new level of assurance and observable rigour into the open source supply chain. We have our own estate to monitor, but more broadly our goal is to raise the robustness of the entire global Ubuntu estate through the work of this team.

The Security Operations (SecOps) team is responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.

The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.

What you will do in this role:

  • Implement and evolve Canonical's Security Operation Center
  • Analyse and improve Canonical's security architecture
  • Evaluate, select and implement new security tools and practices
  • Identify, contain and guide the remediation of security threats and cyber attacks
  • Grow the presence and thought leadership of Canonical SecOps practice
  • Contribute to open source threat intelligence initiatives
  • Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
  • Develop Canonical SecOps learning and development materials
  • Publish blog posts, whitepapers and conference presentations
  • Identify, implement and track SecOps KPIs
  • Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
  • Work with Security leadership to present information and influence change

What we are looking for

  • An exceptional academic track record
  • Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
  • Previous professional experience working or leading a Security Operation Center
  • Deep personal motivation to be at the forefront of technology security
  • Expertise in threat modelling and risk management frameworks
  • Knowledge of security architecture and market-leading security tools
  • Experience contributing to, and consuming, threat intelligence feeds
  • Experience in security risk management frameworks such as NIST CSF and ISO27001

Optional things we value

  • Experience in a security operations team or a security operations centre (SOC)
  • Experience in offensive or defensive security teams with hands-on ability
  • Experience with state-actor and other advanced persistent threats

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Cape Town, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 3 months ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 3 weeks ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Head of Security Operations

Cape Town, Western Cape Canonical

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Canonical Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Head of Security Operations role at Canonical

Canonical Cape Town, Western Cape, South Africa

Join to apply for the Head of Security Operations role at Canonical

This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.

As a leader on cyber security in the company, the SecOps team manager will collaborate with our Organisational Learning and Development team to develop playbooks and facilitate SecOps training across Canonical. They will operate in a wider security organisation, run a high performing security team and improve Canonical's security posture. They will lead initiatives to integrate the team's insights into Canonical's broader software development process.

While this is a management position, we expect managers to be expert practitioners, able to lead by example, contribute at the highest level, and assess work based on their own professional experience and skill. Candidates should have deep, hands-on expertise with a range of open source and proprietary security tooling and practices, which they can integrate into a holistic next generation security solution across the breadth of Canonical's interests.

The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.

This role reports to the CISO.

What you will do in this role:

  • Hire and mentor a team of outstanding technical security professionals
  • Define Canonical's SecOps security standards and playbooks
  • Own and drive the architecture and design of the SOC
  • Analyse and improve Canonical's security architecture
  • Evaluate, select and implement new security tools and practices
  • Identify, contain and guide the remediation of security threats and cyber attacks
  • Grow the presence and thought leadership of Canonical SecOps practice
  • Contribute to open source threat intelligence initiatives
  • Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
  • Develop Canonical SecOps learning and development materials
  • Publish blog posts, whitepapers and conference presentations
  • Identify, implement and track SecOps KPIs
  • Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
  • Work with Security leadership to present information and influence change

What we are looking for

  • Proven track record of mitigating with advanced threat actors and nation state threats
  • Expert technical understanding of SOCs from the ground up
  • In depth knowledge of SOC architecture and design including strategies for logging, firewalls, network segmentation, honeypots etc
  • Someone who understands how the SOC works not just how to use it
  • Expert in Linux security
  • Ability to define, implement, automate and measure effective incident response playbooks
  • Knowledge of security architecture and market-leading security tools
  • Experience contributing to, and consuming, threat intelligence feeds
  • Experience in security risk management frameworks such as NIST CSF
  • An exceptional academic track record from both high school and university
  • Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
  • Drive and a track record of going above-and-beyond expectations
  • Deep personal motivation to be at the forefront of technology security
  • Leadership and management ability
  • Excellent business English writing and presentation skills
  • Confidence to report security performance metrics with accountability for accuracy and completeness

Optional things we value

  • Experience in offensive or defensive security teams with hands-on ability
  • Experience with open source security tools
  • Experience with security standards such as ISO 27001
  • Experience with security posture management of corporate endpoitns

Seniority level
  • Seniority level Director
Employment type
  • Employment type Full-time
Job function
  • Job function Other, Information Technology, and Management
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Sign in to set job alerts for “Head of Security” roles.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Iqtalent

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Security Operations Center Analyst

Job Overview:

We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our dynamic cybersecurity team. The ideal candidate will have a strong background in information security, incident response, and threat detection. As a SOC Analyst, you will play a crucial role in monitoring, analyzing, and responding to security incidents to safeguard our organization’s assets and information.

Responsibilities:

Incident Monitoring and Response:

  • Monitor security alerts and events from various sources, including security information and event management (SIEM) systems.
  • Investigate and respond to security incidents promptly and effectively.
  • Conduct thorough analysis of security events and incidents to identify potential threats and vulnerabilities.

Threat Detection:

  • Utilize advanced threat intelligence to proactively identify and mitigate potential security risks.
  • Stay informed about the latest security threats, vulnerabilities, and industry best practices.
  • Develop and implement detection rules and signatures to enhance threat detection capabilities.

Security Operations:

  • Collaborate with other IT and security teams to ensure the timely resolution of security incidents.
  • Work closely with incident response teams to contain and eradicate security threats.
  • Document and maintain incident response procedures and guidelines.

Log Analysis and Reporting:

  • Analyze security logs to identify patterns, trends, and anomalies.
  • Generate regular reports on security incidents, trends, and analysis for management review.

Vulnerability Management:

  • Assist in vulnerability assessments and penetration testing activities.
  • Provide recommendations for remediation of identified vulnerabilities.

Continuous Improvement:

  • Participate in regular security awareness training and continuous professional development.
  • Contribute to the enhancement of SOC processes, procedures, and technologies.

Qualifications:

  • Bachelor’s degree in Information Security, Cybersecurity, Computer Science, or a related field.
  • Proven experience as a SOC Analyst or in a similar cybersecurity role.
  • In-depth knowledge of cybersecurity principles, technologies, and best practices.
  • Hands-on experience with SIEM tools, intrusion detection systems, and other security technologies.
  • Certifications such as CISSP, CompTIA Security+, or GIAC are highly desirable.
  • Strong analytical and problem-solving skills.

Benefits:

  • Competitive salary and benefits package.
  • Opportunities for professional development and training.
  • Collaborative and innovative work environment.

If you are a passionate and experienced SOC Analyst ready to contribute to the security posture of our organization, we encourage you to apply. Join us in defending against cyber threats and ensuring the resilience of our information assets.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Director: Information Security (P5) (Information & Communication Systems: Management Informatio[...]

Johannesburg, Gauteng University of Johannesburg

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Director: Information Security (P5) (Information & Communication Systems: Management Information Systems)

Advert reference: uj_001817

Advert status: Online

Apply by: 21 February 2025

Position Summary

Job category: Education and Training

Campus: Auckland Park Kingsway Campus

Contract: Permanent

Remuneration: Market Related

EE position: EE

Introduction

The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.

Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:

  • Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses.
  • Fulfil management, leadership, technical and administrative roles in the Department.
Responsibilities:

If you join the Department, you will:

  • Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
  • Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
  • Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
  • Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
  • Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
  • Lead the security documentation process to ensure progress and auditability.
  • Lead the implementation of a secure system development life cycle.
  • Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
  • Conduct information assets security risk assessment.
  • Lead the implementation and monitoring of information and data quality standards, policies and procedures.
  • Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
  • Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
  • Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
  • Integrate an Information and Cyber Security Risk Management Framework.
  • Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
  • Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
  • Conduct security audits to identify gaps and implement controls to mitigate risks.
Minimum Qualifications:
  • Degree or any relevant qualification (NQF 8).
  • 5 to 8 years' of management experience in an Information Security Management.
  • Information security, project management and IT service management experience.
  • Outsourced services and management of commercial partners.
  • Managing strategic change in a dynamic operating environment.
  • Translating broad business needs and understanding the key drivers of enterprise applications.
  • Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP.
Competencies and Behavioural Attributes:

Skills:

  • Good interpersonal and communication skills (verbal and written).
  • Ability to maintain sound human relations and transfer skills and knowledge.
  • Strong decision making and budget control skills.
  • Strong Risk management and Cyber security awareness.
  • IT Policies and Procedures.
  • Collaborating with business managers to determine and deliver value adding IT solutions.
  • Ability to manage a multi technology technical support team.
  • Knowledge of the latest Information security technologies.
  • Firewall standards and protocols.
  • Project Management.
Enquiries:

Enquiries regarding the job content: Ms Maletsema Phofu on Tel: (

Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.

Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University.

For more information, please review the following link: Justice/Criminal/NRSO .

Candidates may be subjected to appropriate psychometric testing and other selection instruments.

In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Director: Information Security (P5) (Information & Communication Systems: Management Informatio[...]

Johannesburg, Gauteng University of Johannesburg

Posted today

Job Viewed

Tap Again To Close

Job Description

Director: Information Security (P5) (Information & Communication Systems: Management Information Systems)

Advert reference: uj_001817

Advert status: Online

Apply by: 21 February 2025

Position Summary

Job category: Education and Training

Campus: Auckland Park Kingsway Campus

Contract: Permanent

Remuneration: Market Related

EE position: EE

Introduction

The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.

Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:

  • Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses.
  • Fulfil management, leadership, technical and administrative roles in the Department.
Responsibilities:

If you join the Department, you will:

  • Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
  • Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
  • Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
  • Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
  • Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
  • Lead the security documentation process to ensure progress and auditability.
  • Lead the implementation of a secure system development life cycle.
  • Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
  • Conduct information assets security risk assessment.
  • Lead the implementation and monitoring of information and data quality standards, policies and procedures.
  • Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
  • Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
  • Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
  • Integrate an Information and Cyber Security Risk Management Framework.
  • Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
  • Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
  • Conduct security audits to identify gaps and implement controls to mitigate risks.
Minimum Qualifications:
  • Degree or any relevant qualification (NQF 8).
  • 5 to 8 years' of management experience in an Information Security Management.
  • Information security, project management and IT service management experience.
  • Outsourced services and management of commercial partners.
  • Managing strategic change in a dynamic operating environment.
  • Translating broad business needs and understanding the key drivers of enterprise applications.
  • Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP.
Competencies and Behavioural Attributes:

Skills:

  • Good interpersonal and communication skills (verbal and written).
  • Ability to maintain sound human relations and transfer skills and knowledge.
  • Strong decision making and budget control skills.
  • Strong Risk management and Cyber security awareness.
  • IT Policies and Procedures.
  • Collaborating with business managers to determine and deliver value adding IT solutions.
  • Ability to manage a multi technology technical support team.
  • Knowledge of the latest Information security technologies.
  • Firewall standards and protocols.
  • Project Management.
Enquiries:

Enquiries regarding the job content: Ms Maletsema Phofu on Tel: (

Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.

Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University.

For more information, please review the following link: Justice/Criminal/NRSO .

Candidates may be subjected to appropriate psychometric testing and other selection instruments.

In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

L2 Security Operations Centre (SOC) Analyst

Cape Town, Western Cape Apex Group Ltd

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

L2 Security Operations Centre (SOC) Analyst

Join to apply for the L2 Security Operations Centre (SOC) Analyst role at Apex Group Ltd

L2 Security Operations Centre (SOC) Analyst

Join to apply for the L2 Security Operations Centre (SOC) Analyst role at Apex Group Ltd

Get AI-powered advice on this job and more exclusive features.

The Apex Group was established in Bermuda in 2003 and is now one of the world’s largest fund administration and middle office solutions providers.

Our business is unique in its ability to reach globally, service locally and provide cross-jurisdictional services. With our clients at the heart of everything we do, our hard-working team has successfully delivered on an unprecedented growth and transformation journey, and we are now represented by over circa 13,000 employees across 112 offices worldwide.Your career with us should reflect your energy and passion.

That’s why, at Apex Group, we will do more than simply ‘empower’ you. We will work to supercharge your unique skills and experience.

Take the lead and we’ll give you the support you need to be at the top of your game. And we offer you the freedom to be a positive disrupter and turn big ideas into bold, industry-changing realities.

For our business, for clients, and for you

Role Purpose

The L2 SOC Analyst plays a critical role in Apex Group’s global cyber defense capabilities. This role is responsible for monitoring, triaging, and analyzing security alerts, assisting with containment actions, and ensuring credible threats are escalated promptly and accurately. All investigative work must be documented within ServiceNow in alignment with incident handling procedures. The L2 Analyst supports continuous monitoring across Apex’s cloud, endpoint, identity, and network environments using approved enterprise security tools.

Key Responsibilities

  • Monitor and triage alerts from SIEM, EDR, and email/cloud security platforms.
  • Investigate security events by correlating telemetry from multiple data sources.
  • Escalate validated security incidents with appropriate context and investigative findings.
  • Assist in executing containment actions such as account disablement or host isolation as instructed by senior analysts.
  • Document all activities, analysis steps, and decisions in ServiceNow with completeness and audit readiness.
  • Collaborate with engineering and detection teams to refine detection logic and reduce false positives.
  • Contribute to SOC runbooks, standard operating procedures, and daily handover
  • documentation.
  • Participate in regular shift handovers and cross-regional coordination within the GSOC model.

Technology Environment

  • SIEM: Exabeam Advanced Analytics
  • Endpoint Detection and Response: Microsoft Defender for Endpoint, Identity, and Email
  • Email Security: Mimecast, Tessian
  • Threat Intelligence: Microsoft Defender Threat Intelligence (MDTI) and integrated sources
  • within Exabeam and Microsoft 365 Security
  • Case Management: ServiceNow
  • Collaboration and Documentation: Microsoft Teams, Confluence.

Required Skills And Experience

  • Minimum 2–3 years of experience in a Security Operations Centre (SOC) or equivalent cyber monitoring role.
  • Strong understanding of cybersecurity concepts, attack techniques, and threat frameworks such as MITRE ATT&CK.
  • Experience working with SIEM and EDR tools in enterprise environments.
  • Familiarity with common log formats (Windows, Linux, cloud services) and basic network

Security principles.

  • Ability to assess the severity and impact of security events and respond appropriately.
  • Strong written and verbal communication skills with a focus on clear and structured escalation reporting.
  • Willingness to participate in rotational or hybrid shift models based on operational requirements.

Preferred Certifications

  • CompTIA Security+ or CySA+
  • Microsoft Certified: Security Operations Analyst Associate (SC-200)
  • SANS GIAC certifications such as GCIH or GCIA (preferred but not mandatory

Performance Metrics

  • Mean Time to Triage (MTTT)
  • Escalation accuracy and incident quality.

Disclaimer: Unsolicited CVs sent to Apex (Talent Acquisition Team or Hiring Managers) by recruitment agencies will not be accepted for this position. Apex operates a direct sourcing model and where agency assistance is required, the Talent Acquisition team will engage directly with our exclusive recruitment partners.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology

Referrals increase your chances of interviewing at Apex Group Ltd by 2x

Get notified about new Security Operations Center Analyst jobs in Cape Town, Western Cape, South Africa .

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 4 months ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 4 days ago

Cape Town, Western Cape, South Africa 3 months ago

Cape Town, Western Cape, South Africa 3 months ago

City of Cape Town, Western Cape, South Africa 3 days ago

Cape Town, Western Cape, South Africa 3 days ago

MS Sentinel SIEM Security Engineer (South Africa)

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 22 hours ago

Cape Town, Western Cape, South Africa 3 months ago

Senior Incident Response Specialist, Bangkok Based (Relocation Provided)

Cape Town, Western Cape, South Africa 5 days ago

Security Operations Engineer – Identify and Access Management (IAM) Specialist

Cape Town, Western Cape, South Africa 5 days ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 2 months ago

International Cybersecurity Sales Partner Manager (Darktrace)

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 3 days ago

City of Cape Town, Western Cape, South Africa 3 days ago

Senior/Staff Application Security Engineer (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 5 days ago

City of Cape Town, Western Cape, South Africa 2 days ago

Senior Application Security Engineer (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 5 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Consultant - Operations

Cape Town, Western Cape Xcede Group

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Security Specialist

My client in the financial industry is looking for a Cyber Security Specialist.

The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.

What will you be responsible for?

On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of:

  • Anti-Virus Infrastructure
  • Data Leakage Prevention system, rules, and reports
  • Privileged Account Management process
  • Network Access Control - process and exception handling
  • Vulnerability Scanning, reporting, proposing remediation actions, and tracking compliance
  • Security hardening baseline compliance scanning, reporting, and remediation

On an ad hoc basis, the consultant will support businesses in:

  • Issuing, renewing, and revoking PKI digital certificates.
  • Assessing internet and email use on request of Forensics or HR departments.
  • Performing scheduled tasks like reviewing Firewall rule configuration and reporting.

The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.

The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.

The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or interaction with experts.

Qualifications

  • Matric
  • Information Technology diploma or degree
  • Information Security certification (preferable)

Experience

At least 3 - 5 years in hands-on technical experience which includes:

  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Anti-Virus System management and Configuration
  • Data Leakage Prevention tool configuration
  • Logical Access Management (AD, PAM)
  • Information Security Operations (Security+, CISSP will be beneficial)
  • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)

Required Skills

  • Security Auditing
  • Reporting and Administration
  • Security tools monitoring
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Director of security Jobs in South Africa !

Information Security Consultant: Operations

Cape Town, Western Cape Recru-IT

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

Role:

The role of the Cyber Security Consultant: Operations will form part of our client’s team which focuses on Cyber Security Operations services to businesses on our client’s Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes.

What will make you successful in this role?
  • On a day-to-day basis the Consultant will be involved with the configuration, monitoring, and management of:
    • Anti-Virus Infrastructure
      • Data Leakage Prevention system, rules, and reports
      • Privileged Account Management process
      • Network Access Control process and exception handling.
      • Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance.
      • Security hardening baseline compliance scanning, reporting and remediation.
  • On an ad hoc basis the consultant will support businesses in:
    • Issuing, renewing, and revoking PKI digital certificates.
    • Assessing internet and email use on request of Forensics or HR departments.
  • The consultant will also be performing scheduled tasks like review Firewall rule configuration and report.
  • The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.
  • The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.
  • The consultant will contribute to Knowledge and Skills of the team, by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts.
Qualifications:
  • Matric
  • Information Technology diploma or degree
  • Information Security certification (preferable)
Experience:

At least 3 – 5 years in hands-on technical experience which includes:

  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Operating System management and Hardening (Windows, Linux, CIS hardening baselines)
  • Anti-Virus System management and Configuration
  • Data Leakage Prevention tool configuration
  • Logical Access Management (AD, PAM)
  • Information Security Operations (Security+, CISSP will be beneficial)
  • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)
Knowledge and Skills:
  • Security Auditing.
  • Risk management.
  • Incident Investigation.
  • Reporting and Administration.
  • Security tools monitoring.
Personal Attributes:
  • Interpersonal savvy - Contributing independently.
  • Decision quality - Contributing independently.
  • Plans and aligns - Contributing independently.
  • Optimises work processes - Contributing independently.
Core Competencies:
  • Cultivates innovation - Contributing independently.
  • Customer focus - Contributing independently.
  • Drives results - Contributing independently.
  • Collaborates - Contributing independently.
  • Being resilient - Contributing independently.
Package & Remuneration

Market related - Monthly

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Risk Management Specialist

Johannesburg, Gauteng Sapientis Talent Management Pty. Ltd.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

We are currently seeking a dynamic and experienced Risk Management Consultant for an exciting fixed-term project. You will play a critical role in assessing, mitigating, and managing risks associated with our client’s operations. This fixed-term project requires a seasoned professional with expertise in risk analysis, compliance, and strategic planning.

You will meet the following minimum requirements

  • Completed Degree in Accounting / Finance / Risk Management / Criminal Sciences / Law
  • Enterprise Risk Management competency
  • Proven experience in risk management (5+ years), ideally in a consulting or advisory capacity.
  • Strong analytical skills with the ability to assess and interpret complex data.
  • Knowledge of relevant industry regulations and compliance standards.
  • Excellent communication and presentation skills.
  • Ability to work independently and collaboratively within a team.
  • Proficiency in risk management software and tools is a plus.

Key responsibilities will include:

  • Conducting comprehensive risk assessments and identifying potential risks.
  • Developing and implementing risk mitigation strategies and action plans.
  • Collaborating with cross-functional teams to ensure risk-related policies and procedures are followed.
  • Analyzing data and trends to provide actionable insights for informed decision-making.
  • Providing guidance on compliance with industry regulations and standards.
  • Preparing and delivering reports to senior management and stakeholders.
  • Aligning risk appetite with key risk indicators
  • Assisting with the preparation of risk reports for submission to the Risk Management Committee and Audit and Risk Board Subcommittees
  • Assisting with the development and implementation of Business Continuity Plan (BCP), Disaster Recovery Plan (DRP) and Crisis Management

Pertinent details:

  • Location: Gauteng
  • Duration: 3+ months

If you are a dedicated risk management professional looking for an exciting project opportunity, we invite you to submit your resume and a cover letter outlining your relevant experience to Please include “Risk Management Consultant” in the subject line of your email.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Risk Management Mobile Implementation Officer

Iqtalent

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Location: Homebased, but mainly carried out in our projects

Contract type: Fixed term contract – Full time – 12 months (extendable)

Deadline for application: 15th of May 2024

CONTEXT

The Security Risk Management Unit (SRMU) is based within the Operations Department of MSF Belgium (OCB – Operational Centre Brussels). Our unit aims to strengthen MSF OCB’s skills and experience in security and crisis management, in particular, the adjustment of mindset, decision-making and tools in response to the volatility of a security context.

As Security Risk Management (SRM) Mobile Implementation Officer (MIO) , you contribute to the security and safety support of MSF-OCB projects in terms of training, assessment, and advice.

MAIN RESPONSIBILITIES

Capacity Building and Training

  • Conduct SRM trainings at the headquarter and projects level for logistics teams, Field Coordinators, and Heads of Mission (HoMs).
  • Identify needs for new trainings.
  • Design and elaborate the training’s offer in the risk management area of expertise.

Security assessment, Risk Analysis & Risk reduction

  • Conduct SRM assessments and contribute to the Risk Analysis and Risk Reduction process for the benefit of the projects.
  • Design and elaborate operational tools concerning SRM for MSF-OCB projects.
  • Engage in SRMU operational research projects.

Security support to our projects

  • Provide operational support for the design and implementation of SRM procedures in MSF countries of intervention.
  • Promote an embedded SRM culture among MSF-OCB projects.
  • Provide SRM “Individualized support” to identified HoMs, Field Coordinators, or Logistic Coordinators.

Crisis Management Preparation

  • Reinforce Field Incident Management Team (FIMT) capacity at project level through trainings and E-learning modules.
  • Assist in the preparation of the Central Incident Management Team (CIMT).
  • Collaborate with SFP at MSF Partner Section CIMT trainings and/or Regional OCB Hub.

Administration and support

  • Support the SFP on request.
  • Assist in the daily administration of the MSF-OCB incident reporting system.
  • Conduct research in the SRM area of interest.

REQUIREMENTS

Education & Experience

  • Humanitarian experience with an IO/INGO is mandatory.
  • 5 years’ international experience with an IO/ INGO.
  • 2 years in a volatile context, preferably in an operations position.
  • Experience in security risk management with MSF or other IO/ INGO is mandatory.
  • 2 years’ experience in a coordination position (Field Coordinator, Head of Mission, Emergency Coordinator) with MSF or other IO/ INGO.
  • Experience in coaching and training of staff is an asset.
  • Experience in crisis management is an asset.

Competencies

  • Capacity to work under pressure.
  • Resistance.
  • Knowledge of INGO security management mechanisms.
  • Knowledge of MSF OCB security management approaches is a plus.
  • Written and oral communication skills.
  • Ability to set priorities and organize work effectively.
  • Ability to work independently.
  • Ability to plan and organize in a stressful environment.
  • Adherence to confidentiality.
  • A sense of humor is highly appreciated.
  • Motivation to work with MSF.

Languages

  • Proficiency in English (written and spoken).
  • Knowledge of Arabic is an asset.

Other

An important availability is required to answer requests for support that can happen during working days, nights, or weekends. In case of a Crisis Cell at OCB, the RMU is highly impacted requiring important flexibility. Willingness and capacity to travel on short notice to any context, sometimes under difficult conditions, is expected.

CONDITIONS

  • Starting date: June 2024.
  • Homebased, but mainly carried out in our projects.
  • Up to 70% mobility in our projects (3 to 4 visits of 2 to 3 weeks per year) and in Brussels HQ (3 visits of 1 to 3 weeks per year).
  • Type: Fixed-term contract – Full time.
  • Length of contract: 12 months (extendable).
  • Salary according to MSF field salary grid.

The contractual terms, conditions, and salary will be established according to the official residence of the selected candidate and in compliance with the standard MSF function and salary grids; in agreement with the MSF contracting office in charge based on the residence of the candidate.

Medical Insurance 100% covered as per international package; 45 paid leaves.

  • Adhere to the MSF principles and to our managerial values: Respect, Transparency, Integrity, Accountability, Trust, and Empowerment.
  • Adhere to the MSF Behavioral Commitments.

Deadline for applications: 15th of May 2024.

How to apply?

Please send your CV and cover letter to and mention “Security Risk Management MIO” in the subject of your email.

Female candidates are strongly encouraged to apply.

Only shortlisted candidates will be contacted.

MSF values diversity and is committed to creating an inclusive working environment. We welcome applications from all qualified candidates regardless of disability, gender identity, marital or civil partnership status, race, color or ethnic and national origins, religion or belief, or sexual orientation.

The protection of your personal data is important to MSF. By submitting your application, you consent to MSF using your personal data. For more information, consult our privacy notice to job applicants.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Director Of Security Jobs