521 Identity And Access Management jobs in South Africa

Identity / Access Management (IAM) Analyst at Parvana Recruitment

Cape Town, Western Cape Parvana Strategic Sourcing

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

About our client:

Our client is a global investment advisory firm focusing on long-term value creation through investment strategies. They work with a diverse group of institutional partners and pride themselves on their collaborative, sustainable, inclusive culture and performance.



What you will be doing:

  • Manage user access and permissions, applying least privilege principles.
  • Administer Identity and Access Management (IAM) tools and systems.
  • Oversee user onboarding and offboarding processes within IAM.
  • Implement and manage Role-Based Access Control (RBAC) frameworks.
  • Monitor and resolve IAM-related incidents and service requests promptly.
  • Ensure IAM practices comply with relevant policies and regulations (e.g., GDPR, SOX).
  • Support security audits and develop comprehensive IAM documentation.
  • Collaborate on the implementation of strong authentication methods such as MFA and SSO.
  • Identify IAM automation opportunities and recommend improvements based on emerging trends.



What our client is looking for:

  • A relevant tertiary degree would be beneficial (Computer Science, IT, Cybersecurity, etc.)
  • An ITIL v3 or v4 certification would be ideal.
  • Certified Identity and Access Manager (CIAM) would be beneficial.
  • 3-5 years of IAM, IT Security, or related experience.
  • Financial services or private equity experience preferred.
  • Proficient in IAM tools (e.g., Okta, SailPoint, CyberArk, Azure AD, etc.).
  • Strong understanding of security protocols (e.g., SAML, OAuth, OpenID Connect, LDAP, etc.).
  • Familiarity with directory and cloud services (e.g., Active Directory, Azure AD, AWS, Azure, GCP, etc.).
  • Experience with scripting languages for automation (e.g., PowerShell, Python, etc.).



Job ID:

  • J



For a more comprehensive list of opportunities that we have on offer, do visit our website - (URL Removed)

Desired Skills:

  • IAM Tools
  • IT Security
  • Financial Services
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Identity and Access Management Specialist

Randburg, Gauteng R45000 - R55000 Y LSA Recruit

Posted today

Job Viewed

Tap Again To Close

Job Description

Educational qualifications


3 Year IT related Degree

Relevant experience


At least 5 years of experience in building and managing IAM systems.


MS AD/ EntraID preferred.


Expertise in IAM protocols, directory services, access control models and identity lifecycle management.

Required certifications


Comptia S+


SC-300


AZ-500

For more info, Please share updated CV

This advertiser has chosen not to accept applicants from your region.

Security Engineer

Gauteng, Gauteng Nintex

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

About Nintex:

At Nintex, we are transforming the way people work, everywhere.

As the global standard for process intelligence and automation, we're trusted by over 10,000 public and private sector organizations across 90 countries. Our customers, from industry giants like Amazon, Coca-Cola, and Microsoft, rely on the Nintex Platform to accelerate their digital transformation journeys by managing, automating, and optimizing business processes quickly and efficiently. We improve their lives through the technology we build.

We are committed to fostering a workplace that supports amazing people in doing their very best work every day. Collaboration is constant, our workplace is fun, the environment is fast-paced, and we value our people’s curiosity, ideas, and enthusiasm. Driven by passion and accountability, we take initiative, measure progress, and deliver results. Our culture fosters innovation and problem-solving, fueled by curiosity and a commitment to thinking big. Together, we move with agility, prioritize customer needs, and build unity through empathy, leaving a positive impact wherever we go.

About the role:

The Security Engineer will implement the organization's security policies, procedures, and standards. This role requires an in-depth understanding of current and emerging threats and technology to drive innovation and improvement in all technical areas of security.

This role requires a proven background in Cloud Application Security Operations on Azure or AWS.

This role is hybrid in JHB.

Your contribution will be:

  • Manage and support vulnerability scanning tools (e.g., Tenable, Qualys, Rapid7) including scheduling, result analysis, and report generation.
  • Support and enhance SIEM platforms (e.g., Splunk, QRadar) including data ingestion, parsing, correlation rules, dashboards, and alerts.
  • Collaborate with DevOps, IT, and development teams to ensure proper tool integration and secure configurations across environments.
  • Troubleshoot and resolve issues related to security tool performance, configurations, and updates.
  • Maintain and document tool configurations, SOPs, and knowledge base articles.
  • Contribute to tool selection and evaluation processes by providing technical input and performing proof-of-concepts.
  • Oversee security tooling and strategic automation as it relates to managing remediations at scale
  • Assist in incident response and remediation of identified security-related events

To be successful , we think you need:

  • 3+ years’ experience in software security / penetration testing role, or equivalent experience
  • Experience with SIEM platforms like Splunk/QRadar etc
  • Experience supporting API security tools (e.g., AWS WAF, Cloudflare, F5, Imperva)
  • Blue team experience would be highly beneficial
  • Some cloud experience i.e. AWS/GCP/Azure

What’s in it for you?

Nintex has a hybrid working model, enabling us to build culture, learn, and grow together. We intentionally connect and collaborate, while emphasizing flexibility with a blend of at-home and in-office work. This role is a hybrid role in our local Nintex office.

While our offerings differ from country to country, we offer our entire global workforce an array of exciting perks and benefits, including

  • Global Gratitude and Recharge Days
  • Flexible, paid time off policy
  • Employee wellness programs and counseling resources
  • Meaningful peer recognition and awards
  • Paid parental leave
  • Invention/patenting assistance
  • Community impact, paid volunteer time, and opportunities
  • Intercultural learning and celebration
  • Multiple tools through which to learn and grow, and an incredible global community

View more about our benefits here: .

Equity Statement : Preference will be given to People Living with Disability who are members of the designated groups in line with the Employment Equity Plan and Targets of the Company.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer

Johannesburg, Gauteng Outsidecapital

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Description We are exclusively representing a mission-driven global leader in the Health-Tech sector. This rapidly scaling organization is dedicated to developing smart affordable digital health solutions that increase access to care for millions of people worldwide. With a strong presence in the market and significant growth ahead they are committed to building a world-class security and compliance function to protect their users and enable their mission.

This is a greenfield opportunity for a senior security professional to build a mature cybersecurity program from the ground up. The current environment is agile and fast-paced and this role is pivotal in embedding security into the fabric of the organization. Your mission is to move the company from a reactive to a proactive security posture architecting the systems processes and compliance frameworks required for global scale. This isnt a maintenance role; its a chance to be the foundational security leader and architect with a direct impact on the companys ability to grow and enter new markets securely.

Performance Objectives for Year One

Success in this role will be measured by your ability to achieve the following key objectives :

  • Spearhead Compliance Readiness: Within the first 12-18 months successfully architect and lead the organizations preparation for SOC2 Type 2 and HiTrust certifications. This involves conducting gap analyses developing remediation plans and partnering with internal teams and external auditors to build a robust auditable compliance framework.
  • Modernize Vulnerability Management: Overhaul the existing vulnerability management program by establishing an automated scanning triaging and remediation workflow. Your success will be demonstrated by a measurable reduction in the average time-to-remediate critical vulnerabilities across the companys AWS infrastructure and applications.
  • Establish a DevSecOps Culture: Architect and integrate a comprehensive security strategy into the entire software development lifecycle. This includes implementing automated security gates within the CI / CD pipeline and working closely with development teams to ensure secure coding standards and infrastructure provisioning are adopted and followed.
  • Architect Automated Threat Detection & Response: Design and deploy a modern automated security monitoring and incident response capability for the AWS cloud environment. You will leverage tools like AWS GuardDuty and WAF and implement SIEM / SOAR principles to significantly reduce the mean time to detect (MTTD) and respond (MTTR) to security threats.
  • Build the Cybersecurity Roadmap & Knowledge Base: Develop and own the companys first formal cybersecurity roadmap and create a centralized comprehensive document bank for all security policies procedures and architectural diagrams. This will serve as the single source of truth for internal governance and to satisfy external customer and audit requests efficiently.
Profile for Success
  • Minimum Requirements: An engineering degree in Computer Science Software or a related field is essential.
  • Proven Compliance Leadership: Demonstrated track record of leading an organization through a major compliance certification process such as SOC2 HiTrust or ISO 27001.
  • Hands-On Cloud Security Expertise: Deep practical experience architecting and securing cloud-native infrastructure particularly within the AWS ecosystem (IAM GuardDuty WAF EKS / ECS etc.).
  • DevSecOps Champion: Experience building security into the CI / CD pipeline and fostering a collaborative security culture within engineering teams.
  • Strategic & Tactical Mindset: You can create a high-level security roadmap while also being comfortable diving deep to implement technical controls automate processes and respond to incidents.
  • Certifications (Desirable): Professional certifications such as CISSP CCSP OSCP or PNPT are highly advantageous.
Key Skills

Key Skills: Splunk, IDS, Network security, Computer Networking, Identity & Access Management, PKI, PCI, NIST Standards, Security System Experience, Information Security, Encryption, Siem

Employment Type: Full-Time

Experience: years

Vacancy: 1

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer

Pretoria, Gauteng wePlace

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Purpose:

Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

As the IT Security Engineer, you'll support the company by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect their systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

Minimum education (essential):
Engineering degree (Computer, Software, Mechanical or Electronic

Minimum education (desirable):

  • OSCP (Offensive Security Certified Professional)
  • PNPT (Practical Network Penetration Tester)
  • CISSP (Certified Information Systems Security Professional)
  • CCSP (Certified Cloud Security Practitioner)
Minimum applicable experience (years):
AWS' ecosystem:

  • AWS Well Architected Framework
  • Trusted Advisor
  • GuardDuty / SCP / SSM / IAM / WAF
  • Container services such as ECS/EKS
  • Incident detection and response management.
  • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
  • Drafting and implementing security policies, security procedures, security design and implementation.
The following would be advantageous:

  • ISO 14971 (risk management) compliance
  • ISO 27032 (cybersecurity) compliance
  • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)
Skills and Knowledge (essential):

  • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
  • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
  • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
  • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
  • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
  • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
  • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.
Cybersecurity Management 40%

  • Drive development standards and processes related to cybersecurity compliance.
  • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
  • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
  • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
  • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
  • Identify, implement and maintain all security tools and technology.
  • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
  • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
  • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.
Infrastructure Management 30%

  • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
  • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
  • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
  • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
  • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
  • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that the IT team follows the requirements set in line with cybersecurity standards.
  • Implement cybersecurity continuous improvement programs.
  • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
  • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.
Risk Management and Compliance 20%

  • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
  • Improve the automation of security controls.
  • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
  • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
  • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
  • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
  • Manage internal and external audits as required with relation to cybersecurity.
  • Maintain documentation for cybersecurity-related risks, processes and findings.
QMS and Documentation 10%

  • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
  • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
  • Proactively keep stakeholders updated on status, progress, risks and problems.
  • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
  • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
  • Maintain cybersecurity documents and records in line with certification requirements.
  • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.
2 days work-from-home in line with Company Policy (only applicable after probation is successfully passed).


Should you not receive a response from us within one week of your application, your application has unfortunately not been successful.

This advertiser has chosen not to accept applicants from your region.

Security Engineer

Pretoria, Gauteng The Hiring House

Posted 27 days ago

Job Viewed

Tap Again To Close

Job Description

Key Performance Areas
- Cybersecurity Management
- Infrastructure Management
- Risk Management and Compliance
- QMS and Documentation

Minimum education (essential):
- Engineering degree (Computer, Software, Mechanical or Electronic)

Minimum education (desirable):
- OSCP (Offensive Security Certified Professional)
- PNPT (Practical Network Penetration Tester)
- CISSP (Certified Information Systems Security Professional)
- CCSP (Certified Cloud Security Practitioner)

Minimum applicable experience (years):
- AWS' ecosystem:
- AWS Well Architected Framework
- Trusted Advisor
- GuardDuty / SCP / SSM / IAM / WAF
- Container services such as ECS/EKS
- Incident detection and response management.
- Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
- Drafting and implementing security policies, security procedures, security design and implementation.

The following would be advantageous:
- ISO 14971 (risk management) compliance
- ISO 27032 (cybersecurity) compliance
- SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)

Skills and Knowledge (essential):
- Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
- Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
- Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
- Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
- Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
- Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
- Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.

This advertiser has chosen not to accept applicants from your region.

Security Engineer

Pretoria, Gauteng

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Purpose: Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company. As the IT Security Engineer, you'll support the company by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect their systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events. Minimum education (essential): Engineering degree (Computer, Software, Mechanical or Electronic Minimum education (desirable): OSCP (Offensive Security Certified Professional) PNPT (Practical Network Penetration Tester) CISSP (Certified Information Systems Security Professional) CCSP (Certified Cloud Security Practitioner) Minimum applicable experience (years): AWS' ecosystem: AWS Well Architected Framework Trusted Advisor GuardDuty / SCP / SSM / IAM / WAF Container services such as ECS/EKS Incident detection and response management. Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments. Drafting and implementing security policies, security procedures, security design and implementation. The following would be advantageous: ISO 14971 (risk management) compliance ISO 27032 (cybersecurity) compliance SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent) Skills and Knowledge (essential): Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design. Familiarity with operational observability, including log aggregation, application performance monitoring, etc. Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture. Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting). Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design. Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain. Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2. Cybersecurity Management 40% Drive development standards and processes related to cybersecurity compliance. Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance. Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation. Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust). Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective. Identify, implement and maintain all security tools and technology. Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements. Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans. Complete required cybersecurity applications and records for large customers and audits, including reporting as required. Infrastructure Management 30% Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required. Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs. Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration. Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement. Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure. Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that the IT team follows the requirements set in line with cybersecurity standards. Implement cybersecurity continuous improvement programs. Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures. Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary. Risk Management and Compliance 20% Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective. Improve the automation of security controls. Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning. Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice. Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times. Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future. Manage internal and external audits as required with relation to cybersecurity. Maintain documentation for cybersecurity-related risks, processes and findings. QMS and Documentation 10% Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar. Work closely with the Compliance team to gather and submit evidence for all security and IT audits. Proactively keep stakeholders updated on status, progress, risks and problems. Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities. Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities. Maintain cybersecurity documents and records in line with certification requirements. Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources. 2 days work-from-home in line with Company Policy (only applicable after probation is successfully passed). Should you not receive a response from us within one week of your application, your application has unfortunately not been successful.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Identity and access management Jobs in South Africa !

Security Engineer

MSP Staffing LTD

Posted today

Job Viewed

Tap Again To Close

Job Description

Seeking a mid-level Security Engineer with 37 years of hands-on experience in cybersecurity operations. Key Requirements · 37 years experience in information security or a related role · Proficient in cybersecurity frameworks (NIST, ISO 27001) and remote workforce security practices · Strong experience with endpoint protection, anti-virus management, and device hardening · Expertise in email security, phishing detection, and threat analysis · Working knowledge of SSDLC and DevSecOps methodologies · Familiarity with SAST and DAST tools and integration · Experience with log analysis, SIEM tools, and threat monitoring platforms · Understanding of POPIA, GDPR, and regulatory compliance standards · Solid foundation in encryption, access controls, and identity management · Strong communication skills, capable of delivering engaging security training Should you meet the requirements for this position, please email your CV to You can also contact the IT team on XXX-XXX or visit our website at NOTE : When replying to the advert, include the reference number in the subject line. Correspondence will only be conducted with short-listed candidates. Should you not hear from us within 3 days, please consider your application unsuccessful.
This advertiser has chosen not to accept applicants from your region.

Security Engineer

Gauteng, Gauteng MSP Staffing LTD

Posted today

Job Viewed

Tap Again To Close

Job Description

Seeking a mid-level Security Engineer with 37 years of hands-on experience in cybersecurity operations. Key Requirements · 37 years experience in information security or a related role · Proficient in cybersecurity frameworks (NIST, ISO 27001) and remote workforce security practices · Strong experience with endpoint protection, anti-virus management, and device hardening · Expertise in email security, phishing detection, and threat analysis · Working knowledge of SSDLC and DevSecOps methodologies · Familiarity with SAST and DAST tools and integration · Experience with log analysis, SIEM tools, and threat monitoring platforms · Understanding of POPIA, GDPR, and regulatory compliance standards · Solid foundation in encryption, access controls, and identity management · Strong communication skills, capable of delivering engaging security training Should you meet the requirements for this position, please email your CV to You can also contact the IT team on XXX-XXX or visit our website at NOTE : When replying to the advert, include the reference number in the subject line. Correspondence will only be conducted with short-listed candidates. Should you not hear from us within 3 days, please consider your application unsuccessful.
This advertiser has chosen not to accept applicants from your region.

Security Engineer

Western Cape, Western Cape MSP Staffing LTD

Posted today

Job Viewed

Tap Again To Close

Job Description

Seeking a mid-level Security Engineer with 37 years of hands-on experience in cybersecurity operations. Key Requirements · 37 years experience in information security or a related role · Proficient in cybersecurity frameworks (NIST, ISO 27001) and remote workforce security practices · Strong experience with endpoint protection, anti-virus management, and device hardening · Expertise in email security, phishing detection, and threat analysis · Working knowledge of SSDLC and DevSecOps methodologies · Familiarity with SAST and DAST tools and integration · Experience with log analysis, SIEM tools, and threat monitoring platforms · Understanding of POPIA, GDPR, and regulatory compliance standards · Solid foundation in encryption, access controls, and identity management · Strong communication skills, capable of delivering engaging security training Should you meet the requirements for this position, please email your CV to You can also contact the IT team on XXX-XXX or visit our website at NOTE : When replying to the advert, include the reference number in the subject line. Correspondence will only be conducted with short-listed candidates. Should you not hear from us within 3 days, please consider your application unsuccessful.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Identity And Access Management Jobs