40 Ethical Hacking jobs in Johannesburg
Information Security Analyst II
Posted 11 days ago
Job Viewed
Job Description
To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.
Job Responsibilities- We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
- Experience with Email and Web Proxies
- DNS Security knowledge
- Experience with Microsoft O365
- Assist with support of current email and web security tasks
- Liaise with other teams to promote good security practices and explain security procedures
- Experience with Security Technologies
- Building relationships with I&O Teams
- Oversee the implementation of the information security changes and check for the short comings and risks.
- Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
- Participate in the implementation of new products as provided in the selection criteria.
- Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
- Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
- Document and maintain all relevant processes and procedures mindful of current policies and standards.
- Create and maintain information security standards.
- Oversee and monitor the information security environment according to set standards.
- Review and contribute to project documentation including business requirements, designs and implementation.
- Create design documentation according to relevant standards and practices
- Implement specific Information security technologies.
- Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
- Log submit and implement low, medium and high risk changes independently.
- Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
- Oversee and ensure change was successful in certain cases and when required perform unit testing.
- Oversee and ensure back-ups are done, documents are stored and statuses updated.
- Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
- Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
- Ensure job related tasks and processes are in place.
- Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
- Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
- Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
- Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
- Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
- Transfer of knowledge to team members.
- Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
- Strong knowledge of Information Security Principles
- Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
- Knowledge of Email Security
- Experience with Email Security Technologies
- Experience Service Now
- Experience Microsoft O365
- Matric / Grade 12 / National Senior Certificate
- Advanced Diplomas/National 1st Degrees
- CCNA - Security
- Security +
- Network +
- MS Azure Certifications – MS 365
Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks
Technical / Professional Knowledge- Administrative procedures and systems
- Data analysis
- Governance, Risk and Controls
- Principles of project management
- Relevant regulatory knowledge
- Relevant software and systems knowledge
- Cluster Specific Operational Knowledge
- System Development Life cycle(SDLC)
- TCP/IP
- Information Security terms and definitions
- Information Security policies and procedures
- Communication
- Customer Focus
- Initiating Action
- Managing Work
- Technical/Professional Knowledge and Skills
---
Please contact the Nedbank Recruiting Team at
If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.
Nedbank Ltd Reg No 1951/ /06.
Authorised financial services and registered credit provider (NCRCP16).
For assistance please contact the Nedbank Recruiting Team at
#J-18808-LjbffrSecurity Analyst - Penetration Testing & Red Teaming
Posted 9 days ago
Job Viewed
Job Description
Our client is looking for a talented Security Analyst who is ready to take on a variety of security assessments and grow their career in a high-energy, cutting-edge environment.
Responsibilities:
Penetration Testing:
- Collaborate within a team of experts to conduct vulnerability assessments and penetration tests across a wide range of technologies.
- Assess network, application (web and thick client), mobile, wireless, social engineering, and physical security, using both automated and manual techniques.
- Engage with clients professionally to deliver insights and constructive feedback, ensuring their security needs are met.
- Dive deep into security topics like network, database, and application security, developing your expertise along the way.
- Leverage your skills with penetration testing tools to uncover vulnerabilities and improve security measures.
Red Teaming:
- Become part of an elite Red Team, focusing on reconnaissance using open-source intelligence (OSINT) to gather actionable data.
- Take the lead in compromising systems by identifying vulnerabilities in people, processes, and technology.
- Develop and deploy command-and-control servers and custom payloads, establishing persistence within target environments.
- Evolve your craft by creating new tools, techniques, and procedures to avoid detection by defenders.
- Work on escalation, maintaining long-term access to compromised networks, and exfiltrating critical data.
Research and Development:
- Stay ahead of the curve by researching and identifying new vulnerabilities, focusing on high-profile products and systems.
- Understand and analyze the latest tactics used by threat actors to craft innovative security strategies.
- Develop and refine attack methodologies that will be used to strengthen future defensive efforts.
Requirements:
Experience:
- 2-5 years' hands-on Penetration Testing, including a strong background in network, mobile, web, and wireless security assessments.
- Strong understanding of common vulnerability assessment and penetration testing tools.
- Ability to think critically and creatively to solve complex security challenges.
- Strong communication skills for both internal collaboration and client-facing interactions.
- Passion for continuous learning and staying updated on the latest in cybersecurity.
Cyber Security Analyst
Posted today
Job Viewed
Job Description
InfyStrat is seeking a motivated Cyber Security Analyst to join our team and contribute to our mission of safeguarding our digital assets and infrastructure. In this role, you will monitor, detect, and respond to security threats, vulnerabilities, and incidents across our systems. You'll perform risk assessments, analyze security breaches, and provide remediation recommendations while collaborating with various teams to enhance our security posture. This is a fantastic opportunity to grow your skills in a fast-paced environment while playing a critical role in protecting our organization from cyber threats.
Key Responsibilities:- Monitor security alerts and events from various sources, including SIEM tools, to identify and respond to security threats.
- Conduct thorough investigations of security incidents, documenting findings and coordinating response actions.
- Assist in the development and implementation of security policies, procedures, and guidelines to protect sensitive information.
- Perform vulnerability assessments and penetration testing to identify security weaknesses.
- Analyze trends and patterns in security incidents and provide recommendations for improving defense mechanisms.
- Stay updated on the latest cybersecurity threats, vulnerabilities, and best practices.
- Work with IT and development teams to ensure secure configurations and practices across all systems.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 2+ years of experience in cybersecurity, information security, or a related role.
- Strong understanding of security principles, concepts, and technologies.
- Experience with security monitoring tools, SIEM platforms, and incident response procedures.
- Familiarity with network security, firewalls, intrusion detection/prevention systems, and secure coding practices.
- Knowledge of security frameworks and regulatory standards (e.g., NIST, ISO 27001, GDPR).
- Strong analytical and problem-solving skills, with attention to detail.
- Excellent communication skills to effectively collaborate with cross-functional teams.
- CERT, CISSP, CISM, or equivalent security certifications are a plus.
Cyber Security Analyst
Posted today
Job Viewed
Job Description
Penetration Tester (Security Analyst)
Posted today
Job Viewed
Job Description
ENVIRONMENT
A leading cybersecurity company based in Johannesburg is seeking a skilled and detail-oriented Red Team Penetration Tester /Security Analyst to join their dynamic team. The ideal candidate will have 2-5 years of hands-on experience in Penetration Testing, with a strong background in identifying and mitigating security vulnerabilities across various environments. This role involves conducting comprehensive security assessments, including but not limited to network, mobile, web, thick-client, wireless, social engineering, and physical penetration testing. The successful candidate will be responsible for analysing security risks, providing actionable recommendations, and collaborating with clients and internal teams to enhance overall cybersecurity posture. If you are passionate about ethical hacking, threat analysis, and proactive security measures, this is an excellent opportunity to grow your career in a fast-paced and innovative environment.
DUTIES Penetration Testing Duties- Work as part of a vulnerability assessment and /or penetration testing team, taking direction from line managers and executing directives in a thorough and timely fashion
- Conduct vulnerability assessments on a wide variety of technologies and implementations utilising both automated tools and manual techniques
- Conduct network penetration tests
- Conduct application penetration tests (web and thick client)
- Conduct wireless and mobile security assessments
- Conduct social engineering assessments
- Conduct physical security assessments
- Effectively communicate successes and obstacles with fellow team members and line managers
- Interface with client contact(s) and staff in a constructive and professional manner
- Develop subject matter expertise in topics to include network, database, wireless and application security assessments and adversarial network operations
- Utilise common vulnerability assessment and penetration testing tools
- Working as part of a Red Team and assisting with the following duties (but not limited to):
- Initial reconnaissance – open-source intelligence (OSINT) for collecting information on the targets
- Initial compromise – gaining a foothold into the target environment through targeting weaknesses in people, process and / or technology.
- Deploy command-and-control servers (C&C or C2) and custom payloads to establish communication / persistence in the target’s network.
- Develop tools, techniques and procedures to evade detection by blue team (including the development of custom payloads)
- Escalate privileges and maintain persistence
- Exfiltrate and / or complete objectives
- Research new vulnerabilities with a focus on high-profile products
- Understand the terminology and tactics employed by threat actors Research new attack methods
- Minimum 2-5 years of Penetration Testing experience required Including conducting different types of assessments, such as network, mobile, web, thick, wireless, social engineering, physical, etc.
- Previous Red Team experience required
Penetration Tester (Security Analyst)
Posted today
Job Viewed
Job Description
ENVIRONMENT
A leading cybersecurity company based in Johannesburg is seeking a skilled and detail-oriented Red Team Penetration Tester / Security Analyst to join their dynamic team. The ideal candidate will have 2-5 years of hands-on experience in Penetration Testing, with a strong background in identifying and mitigating security vulnerabilities across various environments. This role involves conducting comprehensive security assessments, including but not limited to network, mobile, web, thick-client, wireless, social engineering, and physical penetration testing. The successful candidate will be responsible for analysing security risks, providing actionable recommendations, and collaborating with clients and internal teams to enhance overall cybersecurity posture. If you are passionate about ethical hacking, threat analysis, and proactive security measures, this is an excellent opportunity to grow your career in a fast-paced and innovative environment.
DUTIES Penetration Testing Duties- Work as part of a vulnerability assessment and /or penetration testing team, taking direction from line managers and executing directives in a thorough and timely fashion
- Conduct vulnerability assessments on a wide variety of technologies and implementations utilising both automated tools and manual techniques
- Conduct network penetration tests
- Conduct application penetration tests (web and thick client)
- Conduct wireless and mobile security assessments
- Conduct social engineering assessments
- Conduct physical security assessments
- Effectively communicate successes and obstacles with fellow team members and line managers
- Interface with client contact(s) and staff in a constructive and professional manner
- Develop subject matter expertise in topics to include network, database, wireless and application security assessments and adversarial network operations
- Utilise common vulnerability assessment and penetration testing tools
- Working as part of a Red Team and assisting with the following duties (but not limited to):
- Initial reconnaissance – open-source intelligence (OSINT) for collecting information on the targets
- Initial compromise – gaining a foothold into the target environment through targeting weaknesses in people, process and / or technology.
- Deploy command-and-control servers (C&C or C2) and custom payloads to establish communication / persistence in the target’s network.
- Develop tools, techniques and procedures to evade detection by blue team (including the development of custom payloads)
- Escalate privileges and maintain persistence
- Exfiltrate and / or complete objectives
- Research new vulnerabilities with a focus on high-profile products
- Understand the terminology and tactics employed by threat actors Research new attack methods
- Minimum 2-5 years of Penetration Testing experience required Including conducting different types of assessments, such as network, mobile, web, thick, wireless, social engineering, physical, etc.
- Previous Red Team experience required
Senior Information Security Incident Response Analyst
Posted today
Job Viewed
Job Description
Overview
Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.
Your day at NTT DATA
The Senior Information Security Incident Response Analyst is an advanced subject matter expert, responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments).
This role acts as the technical second responder for the team and supports the work of technical staff from various business areas, as well as third-party technical experts.
The Senior Information Security Incident Response uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company information assets.
Key responsibilities- Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated.
- Performs access management activities according to the policy.
- Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses.
- Interacts with a global team of Cyber Security Analysts and specialists.
- Manages 2nd level triaging of security alerts, events, and notifications.
- Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees.
- Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
- Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
- Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
- Maintains an understanding of current and emerging threats, vulnerabilities, and trends.
- Advanced understanding of End Point Protection Software.
- Advanced understanding of Enterprise Detection and Response software.
- Advanced knowledge of technological advances within the information security arena.
- Advanced understanding of inter-relationships in an overall system or process.
- Advanced knowledge of information security management and policies.
- Advanced understanding risk management principles and frameworks is crucial for prioritizing and addressing security incidents
- Advanced understanding of the organization's business operations, goals, and objectives enables the analyst to align incident response efforts with the broader business strategy.
- Ability to effectively communicate technical information to both technical and non-technical stakeholders, and end-users, as well as working with cross-functional teams during incident response.
- Ability to think critically, analyze information, and solve medium to complex problems.
- Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred.
- SANS GIAC Security Essentials (GSEC) or equivalent preferred.
- SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
- SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
- Advanced experience in a Technology Information Security Industry.
- Advanced experience or knowledge of SIEM and IPS technologies.
- Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.
Workplace type: Hybrid Working
About NTT DATANTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
Equal Opportunity EmployerNTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Third parties fraudulently posing as NTT DATA recruiters
NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters—whether in writing or by phone—in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an @nttdata.com email address. If you suspect any fraudulent activity, please contact us.
#J-18808-LjbffrBe The First To Know
About the latest Ethical hacking Jobs in Johannesburg !
Senior Information Security Incident Response Analyst
Posted 1 day ago
Job Viewed
Job Description
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Senior Information Security Incident Response Analyst is an advanced subject matter expert, responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments).
This role acts as the technical second responder for the team and supports the work of technical staff from various business areas, as well as third-party technical experts.
The Senior Information Security Incident Response uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company information assets.
**Key responsibilities:**
+ Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated.
+ Performs access management activities according to the policy.
+ Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses.
+ Interacts with a global team of Cyber Security Analysts and specialists.
+ Manages 2nd level triaging of security alerts, events, and notifications.
+ Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees.
+ Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
+ Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
+ Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
+ Maintains an understanding of current and emerging threats, vulnerabilities, and trends.
**To thrive in this role, you need to have:**
+ Advanced understanding of End Point Protection Software.
+ Advanced understanding of Enterprise Detection and Response software.
+ Advanced knowledge of technological advances within the information security arena.
+ Advanced understanding of inter-relationships in an overall system or process.
+ Advanced knowledge of information security management and policies.
+ Advanced understanding risk management principles and frameworks is crucial for prioritizing and addressing security incidents
+ Advanced understanding of the organization's business operations, goals, and objectives enables the analyst to align incident response efforts with the broader business strategy.
+ Ability to effectively communicate technical information to both technical and non-technical stakeholders, and end-users, as well as working with cross-functional teams during incident response.
+ Ability to think critically, analyze information, and solve medium to complex problems.
**Academic qualifications and certifications:**
+ Bachelor's degree or equivalent in Information Technology, Computer Science or related preferred.
+ SANS GIAC Security Essentials (GSEC) or equivalent preferred.
+ SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
+ SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
**Required experience:**
+ Advanced experience in a Technology Information Security Industry.
+ Advanced experience or knowledge of SIEM and IPS technologies.
+ Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.
**Workplace type** **:**
Hybrid Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
**Third parties fraudulently posing as NTT DATA recruiters**
NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters-whether in writing or by phone-in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an **@nttdata.com** email address. If you suspect any fraudulent activity, please contact us ( ) .
Associate Information Security Incident Response Analyst
Posted 1 day ago
Job Viewed
Job Description
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Associate Information Security Incident Response Analyst is an entry level subject matter expert, responsible for assisting with the detection and monitoring of threats and suspicious activity affecting the organization's technology domain.
This role acts as the technical first responder by supporting the work of technical staff from various business areas as well as third-party technical experts.
This role uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company's information assets.
**Key responsibilities:**
+ Assists with the prevention and resolution of security breaches and ensures incident and problem management processes are initiated.
+ Supports access management activities according to the policy.
+ Assists with the implementation of and discusses security service audit schedules, review access authorization and performs the required access controls and testing to identify security weaknesses.
+ Interacts with a global team of Cyber Security Analysts and specialists.
+ Notifies internal and/or external teams according to agreed alert priority levels, escalation trees, 1st level triaging of security alerts, events, and notifications.
+ Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
+ Ability to follow and update established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
+ Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
**To thrive in this role, you need to have:**
+ Knowledge of technological advances within the information security arena.
+ Understanding of inter-relationships in an overall system or process.
+ Knowledge of information security management and policies.
+ Maintain an understanding of current and emerging threats, vulnerabilities, and trends.
**Academic qualifications and certifications:**
+ Bachelor's degree or equivalent in Information Technology, Computer Science or related preferred.
+ SANS GIAC Security Essentials (GSEC) or equivalent preferred.
+ SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
+ SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred.
**Required experience:**
+ Entry level experience in a Technology Information Security Industry.
+ Experience using End Point Protection Software.
+ Experience using Enterprise Detection & Response software.
+ Experience or knowledge of SIEM and IPS technologies.
+ Experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.
**Workplace type** **:**
Hybrid Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
**Third parties fraudulently posing as NTT DATA recruiters**
NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters-whether in writing or by phone-in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an **@nttdata.com** email address. If you suspect any fraudulent activity, please contact us ( ) .
Information Security Architect
Posted today
Job Viewed
Job Description
Job title: Information Security Architect
Contract duration: Start with 6 months
First preference: EEE candidates
Location: JHB
The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.
Key Responsibilities:
- Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
- Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
- Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
- Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
- Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
- Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
- Define portfolio vision and reusable security patterns aligned with the EA strategy.
- Lead architecture reviews for high-risk projects, driving recommendations to resolution.
- Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
- Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
- Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
- Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
- Manage security architects and mentor engineers, developers, and vendors.
What will you bring?
- Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
- Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
- Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
- Teamwork and Energy – work across different functional and business teams with effective collaboration.
- Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
- Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
- Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).
Requirements / Skills and Competence
- Tertiary qualification in Computer Science, Engineering, or related field (preferred)
- Minimum of 5-10 years of experience in Security Architecture.
- CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
- Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
- Experience in identifying gaps in existing architectures.
- Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
- Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
- Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
- Good experience in security architecture design in Cloud and on-prem.
- Design and implementation of IOT, endpoint protection, and secure IAM.
- Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
- Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
- Knowledge of web application architectures and threat modelling.