44 Hospital Security jobs in South Africa

Application and Security Management Analyst

Johannesburg, Gauteng Experian Group

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Principal Responsibilities

• Collaborate with technical and business teams to address security flaws and implement remediation plans.
• Oversee application security tasks, ensuring alignment with audit requirements and internal policies.
• Support change and incident management processes, with a focus on high-priority incidents (P1 & P2).
• Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance.
• Act as a liaison with internal stakeholders to ensure clear communication and quality engagements.
• Support governance and administrative functions, including audit preparation and policy development.
• Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics.


Required Key Skills (Functional/Technical)
Application Security & Vulnerability Management
• Familiarity with Common Vulnerability Scoring System (CVSS)
• Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM)
• Track and assist in the closure of identified vulnerabilities, working closely with IT and Development teams
• Review and maintain secure configurations for systems, applications, and network devices
Security Fundamentals
• Working knowledge of encryption, authentication, and secure data transmission
• Knowledge of network security principles and firewall configurations
• Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory
• Experience with CyberArk PAM for privileged access management
Security Information and Event Management (SIEM)
• Use of Splunk SIEM for real-time threat detection and log analysis
• Review and optimise SIEM use cases to enhance threat detection and response capabilities
Monitoring & Endpoint Security
• Experience with Tanium and MS Defender for server and endpoint security management
• Familiarity with IBM Guardium for database activity monitoring
• Exposure to Cyera for data identification and classification
Cloud & Infrastructure Security
• Experience with Wiz.IO for cloud security posture management (CSPM) and IaC scanning
• Understanding of secrets management using AWS Secrets Manager, Azure Key Vault, or GCP Secrets Manager
• Familiarity with Thales and AWS KMS/HSM for key management
Other Tools & Platforms
• Knowledge of SailPoint for identity governance
• Experience with CyCognito for external attack surface management
• Familiarity with Imperva for WAF, DDoS, and botnet protection
• Exposure to ProofPoint and MS Office365 Message Security for email security
• Use of 1Password for credential management
• Awareness of Netwrix for password policy enforcement


About Experian


Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to realize their financial goals and help them save time and money.

We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments.

We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at experianplc.com.


Experience and Skills


  • Degree or equivalent qualifications and experience in Computer Science, Information Technology, Data or a related field Technical & Security Experience
  • Experience with automated and manual methods for evaluating security controls in both on-prem and cloud environments
  • Experience in monitoring and reporting on security flaws and supporting related remediation activities
  • Familiarity with change management processes in technology environments Risk, Controls & Compliance
  • Contribute to accurate statistical reporting on the market’s IT security posture
  • Ensure first line of defence (1LoD) ownership of non-compliance issues, exception justifications, mitigation controls, and risk documentation
  • Ensure accuracy and timely completion of control testing and remediations
  • Collaborate with Security Partners, RISOs and other governance functions to drive remediation of identified security deficiencies
  • Ability to compile management reports and presentations on technical risks, controls, and deficiencies Communication & Collaboration
  • Strong ability to communicate complex information clearly and effectively
  • Good collaboration, relationship-building, and interpersonal skills
  • Act as primary liaison with internal, local and regional stakeholders, ensuring quality engagements and clear progress updates

Additional Information


Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what matters; DEI, work/life balance, development, authenticity, collaboration, wellness, reward & recognition, volunteering. the list goes on. Experian's people first approach is award-winning; World's Best Workplaces 2024 (Fortune Top 25), Great Place To Work in 24 countries, and Glassdoor Best Places to Work 2024 to name a few. Check out Experian Life on social or our Careers Site to understand why.

Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity.

Experian Careers - Creating a better tomorrow together

Find out what its like to work for Experian by clicking here

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Management System (ISMS) Specialist

Midrand, Gauteng Vector Logistics

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Information Security Management System (ISMS) Specialist

Join to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics

Information Security Management System (ISMS) Specialist

Join to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics

Overview

We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.

Permanent

Midrand

Overview

We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.

But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.

Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.

Job Purpose

Information Security Management System (ISMS) Specialist is responsible for the end-to-end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO/IEC 27001 standards. The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.

Key Responsibilities

ISMS Development And Implementation

  • Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
  • Develop, implement, and maintain information security policies, procedures, and guidelines.
  • Assess existing information security practices and recommend improvements.
  • Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.

Risk Assessment And Management

  • Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
  • Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
  • Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.

Compliance And Audits

  • Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
  • Prepare the organization for certification audits and support the audit process.
  • Coordinate with auditors and certification bodies.
  • Maintain records and documentation to ensure traceability and compliance with ISMS requirements.

Training And Awareness

  • Provide training to staff and management on information security best practices, policies, and compliance requirements.
  • Promote a culture of information security awareness across the organization.
  • Support the creation of an internal security awareness program.

Incident Response And Management

  • Assist in the development and testing of incident response plans.
  • Provide guidance and support in handling information security incidents.
  • Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.

Continuous Improvement

  • Define and monitor ISMS-related KPIs and metrics.
  • Monitor and report on the performance of the ISMS, identifying areas for improvement.
  • Monitor compliance with security policies and procedures.
  • Lead regular internal audits to assess the effectiveness of the ISMS.
  • Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
  • Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.

Vendor And Third-Party Risk Management

  • Assess and monitor third-party vendors and service providers for information security compliance.
  • Assist in the integration of ISMS controls into third-party contracts and SLAs.

Key Relationships

Key Relationship 1

  • This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
  • These interactions are essential for ensuring the organization’s security posture is robust and aligned with its strategic objectives.

Qualifications And Experience

Qualifications, Skills and Experience Required for the Job

  • Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
  • Mandatory Requirement: ISO27001 Lead Implementer Preferrable: ISO27001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)
  • The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
  • The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
  • Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
  • Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
  • Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
  • Experience in working with ISO27001 certification bodies.
  • Development of audit and ISMS remediation plans.
  • Familiarity with data protection laws and industry regulations.
  • Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.

Skills and Competencies

  • Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
  • Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
  • People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
  • Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
  • Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
  • Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
  • Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
  • Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
  • Ethical Integrity: Commitment to upholding the highest ethical standards in all security practices

We look forward to hearing from you!

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Transportation, Logistics, Supply Chain and Storage

Referrals increase your chances of interviewing at Vector Logistics by 2x

Sign in to set job alerts for “Information Security Specialist” roles.

Johannesburg, Gauteng, South Africa 2 days ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg Metropolitan Area 3 days ago

Johannesburg, Gauteng, South Africa 1 month ago

Randburg, Gauteng, South Africa 4 days ago

Johannesburg, Gauteng, South Africa 1 week ago

Randburg, Gauteng, South Africa 5 days ago

Senior Manager: Information Systems Audit (Cyber Security)

Pretoria, Gauteng, South Africa 2 weeks ago

Johannesburg Metropolitan Area 3 days ago

Centurion, Gauteng, South Africa 4 days ago

Johannesburg, Gauteng, South Africa 1 day ago

Johannesburg, Gauteng, South Africa 6 days ago

Johannesburg, Gauteng, South Africa 5 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Management System (ISMS) Specialist

Midrand, Gauteng Vector Logistics Limited

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Information Security Management System (ISMS) Specialist

Permanent

Midrand

Overview

We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.

But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.

Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.

Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.

Key Responsibilities

ISMS Development and Implementation:

  • Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
  • Develop, implement, and maintain information security policies, procedures, and guidelines.
  • Assess existing information security practices and recommend improvements.
  • Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.

Risk Assessment and Management:

  • Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
  • Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
  • Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.

Compliance and Audits:

  • Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
  • Prepare the organization for certification audits and support the audit process.
  • Coordinate with auditors and certification bodies.
  • Maintain records and documentation to ensure traceability and compliance with ISMS requirements.

Training and Awareness:

  • Provide training to staff and management on information security best practices, policies, and compliance requirements.
  • Promote a culture of information security awareness across the organization.
  • Support the creation of an internal security awareness program.

Incident Response and Management:

  • Assist in the development and testing of incident response plans.
  • Provide guidance and support in handling information security incidents.
  • Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.

Continuous Improvement:

  • Define and monitor ISMS-related KPIs and metrics.
  • Monitor and report on the performance of the ISMS, identifying areas for improvement.
  • Monitor compliance with security policies and procedures.
  • Lead regular internal audits to assess the effectiveness of the ISMS.
  • Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
  • Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.

Vendor and Third-Party Risk Management:

  • Assess and monitor third-party vendors and service providers for information security compliance.
  • Assist in the integration of ISMS controls intothird-party contracts and SLAs.

Key Relationships

Key Relationship 1

  • This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
  • These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.

Qualifications, Skills and Experience Required for the Job

Qualifications and Experience

  • Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
  • Mandatory Requirement: ISO27001 Lead Implementer
    Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
  • The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
  • The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
  • Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
  • Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
  • Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
  • Experience in working with ISO27001 certification bodies.
  • Development of audit and ISMS remediation plans.
  • Familiarity with data protection laws and industry regulations.
  • Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.

Skills and Competencies

  • Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
  • Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
  • People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
  • Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
  • Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
  • Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
  • Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
  • Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
  • Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices

We look forward to hearing from you!

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Management System (ISMS) Specialist

Midrand, Gauteng Vector Logistics Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Information Security Management System (ISMS) Specialist

Permanent

Midrand

Overview

We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.

But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.

Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.

Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.

Key Responsibilities

ISMS Development and Implementation:

  • Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
  • Develop, implement, and maintain information security policies, procedures, and guidelines.
  • Assess existing information security practices and recommend improvements.
  • Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.

Risk Assessment and Management:

  • Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
  • Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
  • Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.

Compliance and Audits:

  • Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
  • Prepare the organization for certification audits and support the audit process.
  • Coordinate with auditors and certification bodies.
  • Maintain records and documentation to ensure traceability and compliance with ISMS requirements.

Training and Awareness:

  • Provide training to staff and management on information security best practices, policies, and compliance requirements.
  • Promote a culture of information security awareness across the organization.
  • Support the creation of an internal security awareness program.

Incident Response and Management:

  • Assist in the development and testing of incident response plans.
  • Provide guidance and support in handling information security incidents.
  • Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.

Continuous Improvement:

  • Define and monitor ISMS-related KPIs and metrics.
  • Monitor and report on the performance of the ISMS, identifying areas for improvement.
  • Monitor compliance with security policies and procedures.
  • Lead regular internal audits to assess the effectiveness of the ISMS.
  • Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
  • Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.

Vendor and Third-Party Risk Management:

  • Assess and monitor third-party vendors and service providers for information security compliance.
  • Assist in the integration of ISMS controls intothird-party contracts and SLAs.

Key Relationships

Key Relationship 1

  • This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
  • These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.

Qualifications, Skills and Experience Required for the Job

Qualifications and Experience

  • Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
  • Mandatory Requirement: ISO27001 Lead Implementer
    Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
  • The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
  • The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
  • Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
  • Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
  • Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
  • Experience in working with ISO27001 certification bodies.
  • Development of audit and ISMS remediation plans.
  • Familiarity with data protection laws and industry regulations.
  • Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.

Skills and Competencies

  • Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
  • Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
  • People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
  • Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
  • Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
  • Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
  • Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
  • Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
  • Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices

We look forward to hearing from you!

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Security Risk Management Mobile Implementation Officer

Iqtalent

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Location: Homebased, but mainly carried out in our projects

Contract type: Fixed term contract – Full time – 12 months (extendable)

Deadline for application: 15th of May 2024

CONTEXT

The Security Risk Management Unit (SRMU) is based within the Operations Department of MSF Belgium (OCB – Operational Centre Brussels). Our unit aims to strengthen MSF OCB’s skills and experience in security and crisis management, in particular, the adjustment of mindset, decision-making and tools in response to the volatility of a security context.

As Security Risk Management (SRM) Mobile Implementation Officer (MIO) , you contribute to the security and safety support of MSF-OCB projects in terms of training, assessment, and advice.

MAIN RESPONSIBILITIES

Capacity Building and Training

  • Conduct SRM trainings at the headquarter and projects level for logistics teams, Field Coordinators, and Heads of Mission (HoMs).
  • Identify needs for new trainings.
  • Design and elaborate the training’s offer in the risk management area of expertise.

Security assessment, Risk Analysis & Risk reduction

  • Conduct SRM assessments and contribute to the Risk Analysis and Risk Reduction process for the benefit of the projects.
  • Design and elaborate operational tools concerning SRM for MSF-OCB projects.
  • Engage in SRMU operational research projects.

Security support to our projects

  • Provide operational support for the design and implementation of SRM procedures in MSF countries of intervention.
  • Promote an embedded SRM culture among MSF-OCB projects.
  • Provide SRM “Individualized support” to identified HoMs, Field Coordinators, or Logistic Coordinators.

Crisis Management Preparation

  • Reinforce Field Incident Management Team (FIMT) capacity at project level through trainings and E-learning modules.
  • Assist in the preparation of the Central Incident Management Team (CIMT).
  • Collaborate with SFP at MSF Partner Section CIMT trainings and/or Regional OCB Hub.

Administration and support

  • Support the SFP on request.
  • Assist in the daily administration of the MSF-OCB incident reporting system.
  • Conduct research in the SRM area of interest.

REQUIREMENTS

Education & Experience

  • Humanitarian experience with an IO/INGO is mandatory.
  • 5 years’ international experience with an IO/ INGO.
  • 2 years in a volatile context, preferably in an operations position.
  • Experience in security risk management with MSF or other IO/ INGO is mandatory.
  • 2 years’ experience in a coordination position (Field Coordinator, Head of Mission, Emergency Coordinator) with MSF or other IO/ INGO.
  • Experience in coaching and training of staff is an asset.
  • Experience in crisis management is an asset.

Competencies

  • Capacity to work under pressure.
  • Resistance.
  • Knowledge of INGO security management mechanisms.
  • Knowledge of MSF OCB security management approaches is a plus.
  • Written and oral communication skills.
  • Ability to set priorities and organize work effectively.
  • Ability to work independently.
  • Ability to plan and organize in a stressful environment.
  • Adherence to confidentiality.
  • A sense of humor is highly appreciated.
  • Motivation to work with MSF.

Languages

  • Proficiency in English (written and spoken).
  • Knowledge of Arabic is an asset.

Other

An important availability is required to answer requests for support that can happen during working days, nights, or weekends. In case of a Crisis Cell at OCB, the RMU is highly impacted requiring important flexibility. Willingness and capacity to travel on short notice to any context, sometimes under difficult conditions, is expected.

CONDITIONS

  • Starting date: June 2024.
  • Homebased, but mainly carried out in our projects.
  • Up to 70% mobility in our projects (3 to 4 visits of 2 to 3 weeks per year) and in Brussels HQ (3 visits of 1 to 3 weeks per year).
  • Type: Fixed-term contract – Full time.
  • Length of contract: 12 months (extendable).
  • Salary according to MSF field salary grid.

The contractual terms, conditions, and salary will be established according to the official residence of the selected candidate and in compliance with the standard MSF function and salary grids; in agreement with the MSF contracting office in charge based on the residence of the candidate.

Medical Insurance 100% covered as per international package; 45 paid leaves.

  • Adhere to the MSF principles and to our managerial values: Respect, Transparency, Integrity, Accountability, Trust, and Empowerment.
  • Adhere to the MSF Behavioral Commitments.

Deadline for applications: 15th of May 2024.

How to apply?

Please send your CV and cover letter to and mention “Security Risk Management MIO” in the subject of your email.

Female candidates are strongly encouraged to apply.

Only shortlisted candidates will be contacted.

MSF values diversity and is committed to creating an inclusive working environment. We welcome applications from all qualified candidates regardless of disability, gender identity, marital or civil partnership status, race, color or ethnic and national origins, religion or belief, or sexual orientation.

The protection of your personal data is important to MSF. By submitting your application, you consent to MSF using your personal data. For more information, consult our privacy notice to job applicants.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Risk Management Mobile Implementation Officer

Iqtalent

Posted today

Job Viewed

Tap Again To Close

Job Description

Location: Homebased, but mainly carried out in our projects

Contract type: Fixed term contract – Full time – 12 months (extendable)

Deadline for application: 15th of May 2024

CONTEXT

The Security Risk Management Unit (SRMU) is based within the Operations Department of MSF Belgium (OCB – Operational Centre Brussels). Our unit aims to strengthen MSF OCB’s skills and experience in security and crisis management, in particular, the adjustment of mindset, decision-making and tools in response to the volatility of a security context.

As Security Risk Management (SRM) Mobile Implementation Officer (MIO) , you contribute to the security and safety support of MSF-OCB projects in terms of training, assessment, and advice.

MAIN RESPONSIBILITIES

Capacity Building and Training

  • Conduct SRM trainings at the headquarter and projects level for logistics teams, Field Coordinators, and Heads of Mission (HoMs).
  • Identify needs for new trainings.
  • Design and elaborate the training’s offer in the risk management area of expertise.

Security assessment, Risk Analysis & Risk reduction

  • Conduct SRM assessments and contribute to the Risk Analysis and Risk Reduction process for the benefit of the projects.
  • Design and elaborate operational tools concerning SRM for MSF-OCB projects.
  • Engage in SRMU operational research projects.

Security support to our projects

  • Provide operational support for the design and implementation of SRM procedures in MSF countries of intervention.
  • Promote an embedded SRM culture among MSF-OCB projects.
  • Provide SRM “Individualized support” to identified HoMs, Field Coordinators, or Logistic Coordinators.

Crisis Management Preparation

  • Reinforce Field Incident Management Team (FIMT) capacity at project level through trainings and E-learning modules.
  • Assist in the preparation of the Central Incident Management Team (CIMT).
  • Collaborate with SFP at MSF Partner Section CIMT trainings and/or Regional OCB Hub.

Administration and support

  • Support the SFP on request.
  • Assist in the daily administration of the MSF-OCB incident reporting system.
  • Conduct research in the SRM area of interest.

REQUIREMENTS

Education & Experience

  • Humanitarian experience with an IO/INGO is mandatory.
  • 5 years’ international experience with an IO/ INGO.
  • 2 years in a volatile context, preferably in an operations position.
  • Experience in security risk management with MSF or other IO/ INGO is mandatory.
  • 2 years’ experience in a coordination position (Field Coordinator, Head of Mission, Emergency Coordinator) with MSF or other IO/ INGO.
  • Experience in coaching and training of staff is an asset.
  • Experience in crisis management is an asset.

Competencies

  • Capacity to work under pressure.
  • Resistance.
  • Knowledge of INGO security management mechanisms.
  • Knowledge of MSF OCB security management approaches is a plus.
  • Written and oral communication skills.
  • Ability to set priorities and organize work effectively.
  • Ability to work independently.
  • Ability to plan and organize in a stressful environment.
  • Adherence to confidentiality.
  • A sense of humor is highly appreciated.
  • Motivation to work with MSF.

Languages

  • Proficiency in English (written and spoken).
  • Knowledge of Arabic is an asset.

Other

An important availability is required to answer requests for support that can happen during working days, nights, or weekends. In case of a Crisis Cell at OCB, the RMU is highly impacted requiring important flexibility. Willingness and capacity to travel on short notice to any context, sometimes under difficult conditions, is expected.

CONDITIONS

  • Starting date: June 2024.
  • Homebased, but mainly carried out in our projects.
  • Up to 70% mobility in our projects (3 to 4 visits of 2 to 3 weeks per year) and in Brussels HQ (3 visits of 1 to 3 weeks per year).
  • Type: Fixed-term contract – Full time.
  • Length of contract: 12 months (extendable).
  • Salary according to MSF field salary grid.

The contractual terms, conditions, and salary will be established according to the official residence of the selected candidate and in compliance with the standard MSF function and salary grids; in agreement with the MSF contracting office in charge based on the residence of the candidate.

Medical Insurance 100% covered as per international package; 45 paid leaves.

  • Adhere to the MSF principles and to our managerial values: Respect, Transparency, Integrity, Accountability, Trust, and Empowerment.
  • Adhere to the MSF Behavioral Commitments.

Deadline for applications: 15th of May 2024.

How to apply?

Please send your CV and cover letter to and mention “ Security Risk Management MIO” in the subject of your email.

Female candidates are strongly encouraged to apply.

Only shortlisted candidates will be contacted.

MSF values diversity and is committed to creating an inclusive working environment. We welcome applications from all qualified candidates regardless of disability, gender identity, marital or civil partnership status, race, color or ethnic and national origins, religion or belief, or sexual orientation.

The protection of your personal data is important to MSF. By submitting your application, you consent to MSF using your personal data. For more information, consult our privacy notice to job applicants.

#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Divisional Head: Security Integrity Management/Pretoria

Johannesburg, Gauteng Rooftop Recruitment

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

Description

The main purpose of this position is to provide leadership and strategic direction as well as manage the provision of security integrity management services within the SARB Group. This includes the provision and oversight of security investigations, security personnel vetting, project security, due diligence and integrity management.

  • Oversee the functions of the division (i.e. security investigations, security personnel vetting, project security, due diligence and integrity management) to ensure effective delivery.
  • Provide input into the departmental strategy and policy in line with the South African Reserve Banks (SARB) strategy, and communicate and clarify the vision and strategic goals of the department to own team.
  • Develop and implement policies for the division in line with the departmental strategy.
  • Develop and implement the divisional operational plan to ensure strategic and operational objectives are achieved.
  • Ensure compliance with policy, procedures and audit findings to mitigate risk in the division.
  • Oversee the management of all personnel and resources allocated to the division.
  • Create a performance culture in the division, define performance expectations and conduct effective performance management of direct reports.
  • Oversee the prioritisation of work and resource utilisation.
  • Oversee the divisional costs, ensuring alignment with related functions and the organisational value chain.
  • Oversee and authorise the provision of management information for the decision-making purposes.
  • Collaborate with senior leadership to develop and enforce security policies and procedures that align with organisational goals and industry best practices.
  • Provide expert guidance on security matters to project teams and stakeholders, ensuring that security considerations are integrated into project planning and execution.
  • Develop and provide reports on due diligence and personnel risk to senior management and relevant committees.

Requirements

an Honours degree/Postgraduate Diploma (NQF8) in Internal Audit, Risk Management, Social Science (Psychology/Sociology/Criminology) or an equivalent qualification;

a minimum of 10 years experience in security and/or security risk management with at least five years in a senior management position; and sound knowledge and experience in areas such as security investigations, personnel security vetting, project security, due diligence and integrity management, and stakeholder engagement.

The following would be an added advantage:

  • Successfully completed a Senior Management Development Programme
  • leading change
  • strategic thinking
  • Building and maintaining trust
  • Developing and empowering others
  • Fostering diversity and inclusion
  • Leading teams through effective communication and collaboration
  • Managing complexity and ambiguity
  • Building and maintaining relationships
  • Drive for results; and sound judgement and decision-making skills.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Hospital security Jobs in South Africa !

Senior Data Management Security Engineer

Western Cape, Western Cape NTT DATA, Inc.

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
Senior Data Management Security Engineer

Join to apply for the Senior Data Management Security Engineer role at NTT DATA, Inc.

Senior Data Management Security Engineer

3 days ago Be among the first 25 applicants

Join to apply for the Senior Data Management Security Engineer role at NTT DATA, Inc.

Get AI-powered advice on this job and more exclusive features.

Make an impact with NTT DATA

Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

Make an impact with NTT DATA

Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

The Data Management Security Engineer is responsible for defining and enforcing data security strategies, policies, and controls across the organization’s data landscape. This role ensures that data assets are protected against unauthorized access, breaches, and misuse, while enabling secure and compliant data usage across analytics, operations, and digital platforms.

Key Responsibilities:

Security Architecture & Strategy

  • Define and implement data security architecture aligned with enterprise security and data governance frameworks.
  • Lead the design of secure data platforms, including data lakes, warehouses, and analytics environments.

Access Control & Role-Based Security

  • Develop and manage role-based access control (RBAC) models across data systems.
  • Ensure least-privilege access principles are enforced and regularly reviewed.

Data Classification & Protection

  • Oversee data classification initiatives to identify and tag sensitive, confidential, and regulated data.
  • Implement data masking, encryption, and tokenization strategies where appropriate.

Compliance & Risk Management

  • Ensure compliance with data privacy and protection regulations (e.g., POPIA, GDPR, HIPAA).
  • Conduct risk assessments and audits related to data access, usage, and storage.

Collaboration & Governance

  • Work closely with data governance, engineering, and legal teams to align security with business and regulatory needs.
  • Participate in data governance councils and security steering committees.

Monitoring & Incident Response

  • Define and monitor data access logs and anomaly detection systems.
  • Support incident response teams in investigating and remediating data-related security events.

Knowledge and Attributes:

  • Excellent communication skills to effectively convey technical information to non-technical stakeholders.
  • Excellent analytical thinking and problem-solving skills to prevent hacking on a network.
  • Ability to identify and evaluate potential risks and to develop solutions.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Seasoned familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR).
  • Seasoned proficiency of understanding in network and system architecture, protocols, and security controls.
  • Strong analytical skills to analyze security incidents and assess potential risks.
  • Ability to work both independently and collaboratively in a fast-paced environment.

Academic Qualifications and Certifications:

  • Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related.
  • Certified Information Systems Security Professional (CISSP) or Certified Information Privacy Professional (CIPP / CIPM) or Certified Data Management Professional (CDMP)
  • Cloud security certifications (e.g., AWS Security Specialty, Azure Security Engineer Associate)

Workplace type:

Hybrid Working

About NTT DATA

NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer

NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at NTT DATA, Inc. by 2x

Sign in to set job alerts for “Senior Security Engineer” roles.

Stellenbosch, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 2 days ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 3 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 2 weeks ago

Software Engineer - 85 Percent Average in Matric

Cape Town, Western Cape, South Africa 1 month ago

Junior Software Development Engineer (CPT)

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa ZAR65,000.00-ZAR80,000.00 3 months ago

Cape Town, Western Cape, South Africa 3 hours ago

Cape Town, Western Cape, South Africa 2 months ago

Cape Town, Western Cape, South Africa 2 days ago

Front end Developer at Datonomy Solutions

Cape Town, Western Cape, South Africa 3 weeks ago

Cape Town, Western Cape, South Africa ZAR65,000.00-ZAR80,000.00 1 month ago

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 2 weeks ago

Software Developer (Full Stack Developer)

Cape Town, Western Cape, South Africa 1 month ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 7 months ago

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 5 days ago

Software Engineer (Python) - Supply Chain

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 3 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Data Management Security Engineer

Western Cape, Western Cape NTT

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

The Data Management Security Engineer is responsible for defining and enforcing data security strategies, policies, and controls across the organization’s data landscape. This role ensures that data assets are protected against unauthorized access, breaches, and misuse, while enabling secure and compliant data usage across analytics, operations, and digital platforms.

Key Responsibilities:

Security Architecture & Strategy

  • Define and implement data security architecture aligned with enterprise security and data governance frameworks.

  • Lead the design of secure data platforms, including data lakes, warehouses, and analytics environments.

Access Control & Role-Based Security

  • Develop and manage role-based access control (RBAC) models across data systems.

  • Ensure least-privilege access principles are enforced and regularly reviewed.

Data Classification & Protection

  • Oversee data classification initiatives to identify and tag sensitive, confidential, and regulated data.

  • Implement data masking, encryption, and tokenization strategies where appropriate.

Compliance & Risk Management

  • Ensure compliance with data privacy and protection regulations (e.g., POPIA, GDPR, HIPAA).

  • Conduct risk assessments and audits related to data access, usage, and storage.

Collaboration & Governance

  • Work closely with data governance, engineering, and legal teams to align security with business and regulatory needs.

  • Participate in data governance councils and security steering committees.

Monitoring & Incident Response

  • Define and monitor data access logs and anomaly detection systems.

  • Support incident response teams in investigating and remediating data-related security events.

Knowledge and Attributes:

  • Excellent communication skills to effectively convey technical information to non-technical stakeholders.
  • Excellent analytical thinking and problem-solving skills to prevent hacking on a network.
  • Ability to identify and evaluate potential risks and to develop solutions.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Seasoned familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR).
  • Seasoned proficiency of understanding in network and system architecture, protocols, and security controls.
  • Strong analytical skills to analyze security incidents and assess potential risks.
  • Ability to work both independently and collaboratively in a fast-paced environment.

Academic Qualifications and Certifications:

  • Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related.
  • Certified Information Systems Security Professional (CISSP) or Certified Information Privacy Professional (CIPP/CIPM) or Certified Data Management Professional (CDMP)
  • Cloud security certifications (e.g.,AWS Security Specialty,Azure Security Engineer Associate)

Workplace type:

Hybrid Working

About NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Data Management Security Engineer

Gauteng, Gauteng NTT

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

The Data Management Security Engineer is responsible for defining and enforcing data security strategies, policies, and controls across the organization’s data landscape. This role ensures that data assets are protected against unauthorized access, breaches, and misuse, while enabling secure and compliant data usage across analytics, operations, and digital platforms.

Key Responsibilities:

Security Architecture & Strategy

  • Define and implement data security architecture aligned with enterprise security and data governance frameworks.

  • Lead the design of secure data platforms, including data lakes, warehouses, and analytics environments.

Access Control & Role-Based Security

  • Develop and manage role-based access control (RBAC) models across data systems.

  • Ensure least-privilege access principles are enforced and regularly reviewed.

Data Classification & Protection

  • Oversee data classification initiatives to identify and tag sensitive, confidential, and regulated data.

  • Implement data masking, encryption, and tokenization strategies where appropriate.

Compliance & Risk Management

  • Ensure compliance with data privacy and protection regulations (e.g., POPIA, GDPR, HIPAA).

  • Conduct risk assessments and audits related to data access, usage, and storage.

Collaboration & Governance

  • Work closely with data governance, engineering, and legal teams to align security with business and regulatory needs.

  • Participate in data governance councils and security steering committees.

Monitoring & Incident Response

  • Define and monitor data access logs and anomaly detection systems.

  • Support incident response teams in investigating and remediating data-related security events.

Knowledge and Attributes:

  • Excellent communication skills to effectively convey technical information to non-technical stakeholders.
  • Excellent analytical thinking and problem-solving skills to prevent hacking on a network.
  • Ability to identify and evaluate potential risks and to develop solutions.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Seasoned familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR).
  • Seasoned proficiency of understanding in network and system architecture, protocols, and security controls.
  • Strong analytical skills to analyze security incidents and assess potential risks.
  • Ability to work both independently and collaboratively in a fast-paced environment.

Academic Qualifications and Certifications:

  • Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related.
  • Certified Information Systems Security Professional (CISSP) or Certified Information Privacy Professional (CIPP/CIPM) or Certified Data Management Professional (CDMP)
  • Cloud security certifications (e.g.,AWS Security Specialty,Azure Security Engineer Associate)

Workplace type:

Hybrid Working

About NTT DATA
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Hospital Security Jobs