81 National Security jobs in South Africa
NATIONAL CONTRACTS MANAGER - SECURITY (PETROLEUM (
Posted 3 days ago
Job Viewed
Job Description
Reference: PTA -MB-1
Location: Westrand based - but travel Nationally
Salary package: R -R CTC + Petrol / Cell allowance
- Grade 12 with Grade A PSIRA registration
- At least 8-10 years’ experience in the Security Industry, preferably in an Industrial industry, especially within the Petroleum/Chemical environment
- At least 5 years’ managerial experience in a National Security Contracts Management structure
- Computer literate, with proficiency in MS Word and Excel
- Very analytical individual with excellent Problem-Solving Skills
- Ability to manage and discipline staff
- Strong Operational Planning, Leadership and Organisational Skills as well as good Interpersonal Communication and Client Liaison Skills are essential
- Knowledge of ISO 9001:2008 Quality Management and its requirements
- Great knowledge and experience in Organisational and Environmental Health and Safety, equivalent courses completed (SAMTRAC & Risk management, Environmental Health & Safety Management, etc.) will be an added advantage
- Risk Audits/Risk Assessments, Implementation of client SOP’s
- Must have above average Investigating skills and experience in conducting incident investigations and audits
- Must be able to work under pressure and for extended hours as and when required
- A Valid unendorsed driver license with own reliable transport and willing to use for business purposes
- Must be able to travel Nationally
- No criminal record or any pending cases
Apply via our website
If you do not hear from us within 5 days, please accept that your application was unsuccessful.
#J-18808-LjbffrNational contracts manager - security (petroleum (
Posted today
Job Viewed
Job Description
Security Specialist
Posted 3 days ago
Job Viewed
Job Description
Overview
Our client has a vacancy for a logical and open-minded security specialist that has a good security foundation based in Johannesburg.
Requirements- Ability to conduct information security risk assessments
- Ability to create and execute security monitoring tool sets such as DLP, SIEM and Web Gateway, Cyber Protection
- Cyber security or SOC monitoring
- Understanding of the NIST and ISO 27000 frameworks
Security Specialist
Posted 5 days ago
Job Viewed
Job Description
Overview
Job Description
Why choose Logicalis? It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4, employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!
We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
Join us and become a part of something epic!
#J-18808-LjbffrSecurity Specialist
Posted 16 days ago
Job Viewed
Job Description
It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.
Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!
We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
Join us and become a part of something epic!
ROLE PURPOSE
The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events
quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.
ROLE AND DELIVERY RESPONSIBILITIES:
The job role includes actively participating in the incident detection process as follows:
- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure
- Acts as an incident “hunter,” not waiting for escalated incidents
- Closely involved in developing, tuning, and implementing threat detection analytics
- Acts as the escalation for Tier 1 and 2 SOC Analysts
- Responds to and oversees the remediation of a declared security incident
- Completes the Root Cause Analysis Report for P1 to P4
- Provides guidance to Tier 1 and 2 SOC Analysts
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
- Make recommendations to the SOC Manager
- Oversees the analysis on running processes and configs on affected systems.
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
- Oversees the containment and recovery
- Oversees the deep-dive incident analysis by correlating data from various sources
- Validates if a critical system or data set has been impacted
- Provides support for analytic methods for detecting threats
- Conducts advanced triage based on defined run books of alerts
- Undertakes threat intelligence research if need be
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
- Further analyses alarms by method e.g. credentials compromised and by asset class
- Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework
- Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time
- Closes tickets in the SIEM platform – this would be automatically created into Service Now
- Manages security incidents using the SIEM platform and defined operational procedures
- Performs a further investigation of potential incidents, and escalate or close events as applicable
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
- Closes out deeper analysis and review activities
- Assist senior SOC staff with operational responsibilities
PERSON REQUIREMENTS:
EXPERIENCE:
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
- Strong knowledge and experience working with Linux Operating systems
- Good experience working with Nessus or Qualys
- Good understanding of the MITRE ATT&CK framework
- Good understanding of the ITIL Framework.
- Brilliant with a support ticketing system and experience in meeting SLA targets.
- Familiarity with risk management and quality assurance control.
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
- Candidate must be eligible to obtain National Security Clearance
QUALIFICATIONS:
- Grade 12
- AZ500,SC100
- Degree or Diploma in Computer Technology
- CompTIA A+, N+ S+
- CompTIA CySa, CISSP and CASP+ advantageous
ADDITIONAL SKILLS/ATTRIBUTES:
- Advanced Microsoft Excel experience, specifically data interpretation
- Good understanding of IT infrastructure
- A high command of the English language both written and verbal is essential.
- Self-motivated with the ability to work unsupervised.
- Punctuality
- Excellent verbal and written communication skills
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
- Possess proficient analytical and decision-making skills
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
- Proficient relationship building skills – predict customer behavior and respond accordingly
- A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations
- Good communicator with the customer environment
- Dynamic but aware of the views and feelings of others
- Able to operate as a good team player
- Drive and Energy
- Demonstrate clear purpose, enthusiasm, and commitment
If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.
#J-18808-LjbffrSecurity Specialist
Posted 7 days ago
Job Viewed
Job Description
The company values professionals who can bridge technical skill with strategic understanding. You will not only execute penetration tests but also contribute to a culture of proactive risk management.
This opportunity is ideal for experienced security professionals looking to deepen their expertise while influencing security policies and practices in a dynamic environment.
Security Specialist
Posted today
Job Viewed
Job Description
Why choose Logicalis?
It's not just IT solutions, It's IT global know-how Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.
Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers' vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world's leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider
We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
Join us and become a part of something epic
ROLE PURPOSE
The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events
quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.
ROLE AND DELIVERY RESPONSIBILITIES:
The job role includes actively participating in the incident detection process as follows:
- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure
- Acts as an incident "hunter," not waiting for escalated incidents
- Closely involved in developing, tuning, and implementing threat detection analytics
- Acts as the escalation for Tier 1 and 2 SOC Analysts
- Responds to and oversees the remediation of a declared security incident
- Completes the Root Cause Analysis Report for P1 to P4
- Provides guidance to Tier 1 and 2 SOC Analysts
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
- Make recommendations to the SOC Manager
- Oversees the analysis on running processes and configs on affected systems.
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
- Oversees the containment and recovery
- Oversees the deep-dive incident analysis by correlating data from various sources
- Validates if a critical system or data set has been impacted
- Provides support for analytic methods for detecting threats
- Conducts advanced triage based on defined run books of alerts
- Undertakes threat intelligence research if need be
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
- Further analyses alarms by method e.g. credentials compromised and by asset class
- Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework
- Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time
- Closes tickets in the SIEM platform – this would be automatically created into Service Now
- Manages security incidents using the SIEM platform and defined operational procedures
- Performs a further investigation of potential incidents, and escalate or close events as applicable
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
- Closes out deeper analysis and review activities
- Assist senior SOC staff with operational responsibilities
PERSON REQUIREMENTS:
EXPERIENCE:
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
- Strong knowledge and experience working with Linux Operating systems
- Good experience working with Nessus or Qualys
- Good understanding of the MITRE ATT&CK framework
- Good understanding of the ITIL Framework.
- Brilliant with a support ticketing system and experience in meeting SLA targets.
- Familiarity with risk management and quality assurance control.
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
- Candidate must be eligible to obtain National Security Clearance
QUALIFICATIONS:
- Grade 12
- SIEM Technology certification.
- AZ500,SC100
- ITIL Foundation qualification
- Degree or Diploma in Computer Technology
- CompTIA A+, N+ S+
- CompTIA CySa, CISSP and CASP+ advantageous
ADDITIONAL SKILLS/ATTRIBUTES:
- Advanced Microsoft Excel experience, specifically data interpretation
- Good understanding of IT infrastructure
- A high command of the English language both written and verbal is essential.
- Self-motivated with the ability to work unsupervised.
- Attention to detail
- Punctuality
- Excellent verbal and written communication skills
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
- Possess proficient analytical and decision-making skills
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
- Proficient relationship building skills – predict customer behavior and respond accordingly
- A strong service-oriented ('can-do') culture, with a strong focus on the 'internal customer' approach, committed to exceeding customer expectations
- Good communicator with the customer environment
- Dynamic but aware of the views and feelings of others
- Able to operate as a good team player
- Drive and Energy
- Demonstrate clear purpose, enthusiasm, and commitment
Be The First To Know
About the latest National security Jobs in South Africa !
Security Specialist
Posted today
Job Viewed
Job Description
Security Specialist
Posted today
Job Viewed
Job Description
We are seeking a Security Specialist for a contract position in East London. This role is crucial in safeguarding the Department's ICT infrastructure by implementing and maintaining robust security measures. The specialist will collaborate with the ECDOH ICT team to ensure adherence to best-practice security standards, manage information security governance, and address security incidents and risks. This position is vital for maintaining the integrity and security of departmental systems and data.
Responsibilities:- Assist in delivering solutions to protect ICT infrastructure from vulnerabilities.
- Collaborate with the ECDOH ICT team to ensure compliance with security standards.
- Manage information security governance, incident, and risk management.
- Develop and manage information security programs.
- Handle information security incident management.
- Maintain up-to-date documentation.
- Resolve customer issues and provide training on new and modified applications.
- Work with Business, Application Support, and IT teams to identify and resolve issues.
- Assist in user training.
- Plan, organize, and control work efforts, providing regular progress feedback.
- Perform additional tasks as required by the line manager.
- Degree/National Diploma in Computer Science/Information Systems.
- Minimum of 6 years of experience in Information Security, or Grade 12 with at least 10 years' experience.
- ISACA CISM certification.
- Experience as an ICT security specialist is advantageous.
- Ability to quickly learn industry concepts and business processes.
- Proficiency in Windows systems update management (WSUS).
- Experience with Microsoft Virus and Threat protection management.
- Knowledge of Windows server security management and firewall management.
- Experience with ECDoH VPN management.
- Ability to manage ICT security threats.
Security Specialist
Posted today
Job Viewed
Job Description
SIMFY AFRICA
SECURITY SPECIALIST - Fixed Term Contract
Purpose & Context:
We are seeking a highly skilled and experienced Security Specialist with a strong background in Site Reliability Engineering (SRE) and DevSecOps. In this role, you will be a key player in designing, implementing, and maintaining secure, scalable, and resilient cloud infrastructure. You will champion security best practices throughout the software development lifecycle (SDLC) while applying SRE principles to ensure high system availability, performance, and operational efficiency.
Simfy Africa, an OPCO of MTN is entering a new phase in its lifecycle in which the key focus is on delivering technology components to support the MTN consolidated app as well as maintain and support the ayoba SuperApp product until its sunset.
The incumbent must therefore ensure the successful delivery in context of:
- An expertise-based multicultural organisation
- A dynamic and evolving field of Telecommunications & Platform based businesses
- Evolving industry sector constantly presenting new challenges and opportunities to the core business
Key Performance Areas:
The Security Specialist
is responsible across the following areas:
Secure Infrastructure and Application Lifecycle:
- Design, implement, and maintain secure and scalable cloud infrastructure using Infrastructure as Code (IaC) principles (e.g., Terraform, Ansible).
- Integrate security controls and automated security testing (e.g., SAST, DAST, SCA) into CI/CD pipelines.
- Conduct threat modeling and risk assessments during the design phase of applications and infrastructure.
- Implement and manage cloud security controls, including IAM, network security (Security Groups, WAFs), data encryption, and secrets management.
- Manage and respond to security incidents and vulnerabilities, ensuring timely remediation and post-incident analysis.
- Stay abreast of the latest offensive security practices and techniques.
Site Reliability & Operations:
- Apply SRE principles to continuously improve system reliability and performance.
- Define, measure, and enforce Service Level Objectives (SLOs) and Service Level Indicators (SLIs).
- Automate operational tasks and "toil" to free up time for engineering work.
- Implement and optimize observability pipelines (logging, monitoring, and alerting) using tools like Prometheus, Grafana, and ELK stack.
- Conduct post-mortems for incidents and drive a culture of blameless problem-solving.
- Perform capacity planning and performance optimization to ensure systems can handle future growth.
Automation and Tooling:
- Integrate security practices CI/CD pipelines for both infrastructure and application deployments.
- Script solutions for automation tasks using languages like Python, Bash, or Go.
- Manage and orchestrate containerized workloads using technologies like Docker and Kubernetes.
- Implement Policy as Code (PaC) to enforce security and compliance standards.
Collaboration and Culture:
- Collaborate closely with development, operations, and security teams to embed a culture of shared responsibility and continuous improvement.
- Promote "shift-left" security, encouraging developers to consider security early in the development process.
Job Requirements
Education:
- 3 + years Tertiary qualification in Computer Science, Computer Engineering or a related field
- Relevant certifications (e.g., AWS Certified DevOps Engineer, Certified Kubernetes Administrator, Certified DevSecOps Professional)
Experience:
- 5+ years of professional software development experience
- Proven experience in a DevSecOps, SRE, or Cloud Engineering role with a strong focus on security and reliability
- Hands-on experience with containerization technologies (Docker) and orchestration platforms (Kubernetes)
- Experience with secrets management solutions (e.g., HashiCorp Vault, AWS Secrets Manager)
- Experience with monitoring and observability tools (e.g., Prometheus, Grafana, Datadog)
- Experience with chaos engineering and/or resilience testing
Competencies:
Functional Knowledge:
- CI/CD pipeline tools (Proficient)
- MTN policies and procedures understanding (Proficient)
- Continuous improvement (Intermediate)
- Modern cloud platforms particularly AWS (S3, CloudWatch, DynamoDB, ElastiCache) (Proficient)
Technical skills
- Proficiency in at least one scripting/programming language (e.g., Python, Bash, Go)
- Security frameworks and standards (e.g., CIS Benchmarks, NIST) (Intermediate)
- Network security, system hardening, and vulnerability management (Proficient)
- Infrastructure and platforms management (Intermediate)
- Data management (Intermediate)
Behavioural Qualities
· Collaboration (Proficient)
· Problem-solving (Proficient)
· Verbal and written communication skills (Proficient)
· Accountability (Proficient)
· Adaptability (Intermediate)
· Interpersonal Skills (Proficient)
· Highly Organised
· Attention to Detail
· Time Management
· Proactive & Self Driven
· Resilient
· Operationally Astute
· Emotional Maturity