24 Network Management jobs in South Africa
Network & Security Engineer
Posted 1 day ago
Job Viewed
Job Description
At GBS Holdings, we're committed to building secure, scalable, and high-performance IT infrastructure that supports our diverse business operations. We're looking for a skilled Network and Security Engineer to join our dynamic team. In this role, you'll be responsible for designing, implementing, and managing robust network systems while ensuring the highest standards of security and reliability. If you're passionate about technology and thrive in a collaborative environment, we want to hear from you.
Key Responsibilities:
- Design, implement, and maintain secure network architectures (LAN, WAN, VPN)
- Configure and manage routing, switching, and wireless infrastructure
- Manage and secure FortiGate firewalls and related network security systems
- Provide 3rd line technical support for complex networking and security issues
- Ensure high availability (99.8% uptime) and proactive system maintenance
- Monitor network performance and conduct vulnerability assessments
- Maintain accurate documentation including network diagrams and configuration standards
- Support and maintain Windows Server 2016/2019 and Exchange hybrid environments
- Administer Office 365 and Microsoft Azure environments
- Implement and manage Veeam Backup & Replication for disaster recovery
- Support external SFTP environments and domain/DNS management
- Support endpoint security via Kaspersky Security Centre
Minimum Qualifications and Experience:
- Matric (Required)
- Diploma or Bachelor’s Degree in Information Technology or related field
- CCNA certification (Required)
- FortiGate certification (Advantageous)
- Must have a minimum of 5+ years as a network and security engineer
- Strong experience with routing, switching, FortiGate firewalls, and security best practices
- Background in cybersecurity and infrastructure management
- Good understanding of Microsoft technologies and cloud platforms (Azure, O365)
Behavioural & Competency Skills:
- Excellent communication and interpersonal skills
- Strong analytical and problem-solving abilities
- Able to work independently and collaboratively
- Task-oriented with a focus on timely, high-quality delivery
- Process-driven with attention to detail
Network Security Engineer
Posted 10 days ago
Job Viewed
Job Description
Bachelors degree /Diploma or equivalent experience
3+ years of IT experience
1+ years of hands-on web application penetration testing / ethical hacking experience
The Purpose of Your Role
Lead testing efforts on web and mobile applications and supporting systems.
Replicate the actual techniques and tools used by malicious attackers in an effort to model potential external threats.
Upon completion of the assessment, you will prepare reports and present the results to application owners, developers, and business unit information security teams.
Analyse test results, draw conclusions from results, and develop targeted exploit examples.
Consult with operations and software - development teams to ensure potential weaknesses are addressed.
Contribute to the research or development of tools to assist in the vulnerability discovery process.
Identify threats to improve the overall security of applications and infrastructure.
Recommend solutions to help migitate risks and protect entire network i.e. Architect security solution
Skills:
Ability to demonstrate manual testing experience including all of OWASP
Working knowledge of application security mechanisms such as authentication and authorization techniques, data validation, and the proper use of encryption
Technical knowledge of, and the ability to recognize, various types of application security vulnerabilities
Demonstrated experience with common penetration testing and vulnerability assessment tools such as nmap, Wireshark, Nessus, NeXpose, Kali, Metasploit, AppScan, WebInspect, Burp Suite Professional, Acunetix, Arachni, w3af, NTOSpider
Knowledge of a programming or scripting language such a C, C#, Python, Objective C, Java, Javascript, SQL,
Knowledge of Web Services technologies such as XML, JSON, SOAP, REST, and AJAX
Knowledge of web frameworks, including XML, SOAP, J2EE, JSON and Ajax
Experience with Enterprise Java or .NET web application frameworks, including Struts and Spring
Proven analytical and problem solving skills, as well as the desire to assist others in solving issues
Excellent interpersonal skills with a strong interest in the application security domain
Excellent communication and presentation skills and a proven ability to communicate threats and facilitate progress towards long-term remediation
Highly motivated with the willingness to take ownership / responsibility for their work and the ability to work alone or as part of a team.
Ability to produce high level reports
Preferred Skills and competencies:
A+, N+, S+, CCNA
Vulnerability Scanning
Vulnerability Assessment
Valid Certified Ethical Hacker Certificate
Certified Penetration Testing Professional/ OR CISA/CISM/SISSP AND CISSP certification.
NB! CV FORMAT MUST BE PDF
Network Security Engineer
Posted 15 days ago
Job Viewed
Job Description
br>3+ years of IT experience
1+ years of hands-on web application penetration testing / ethical hacking experience
The Purpose of Your Role
Lead testing efforts on web and mobile applications and supporting systems.
Replicate the actual techniques and tools used by malicious attackers in an effort to model potential external threats.
Upon completion of the assessment, you will prepare reports and present the results to application owners, developers, and business unit information security teams.
Analyse test results, draw conclusions from results, and develop targeted exploit examples.
Consult with operations and software - development teams to ensure potential weaknesses are addressed.
Contribute to the research or development of tools to assist in the vulnerability discovery process.
Identify threats to improve the overall security of applications and infrastructure.
Recommend solutions to help migitate risks and protect entire network i.e. Architect security solution
Skills:
Ability to demonstrate manual testing experience including all of OWASP
Working knowledge of application security mechanisms such as authentication and authorization techniques, data validation, and the proper use of encryption
Technical knowledge of, and the ability to recognize, various types of application security vulnerabilities
Demonstrated experience with common penetration testing and vulnerability assessment tools such as nmap, Wireshark, Nessus, NeXpose, Kali, Metasploit, AppScan, WebInspect, Burp Suite Professional, Acunetix, Arachni, w3af, NTOSpider
Knowledge of a programming or scripting language such a C, C#, Python, Objective C, Java, Javascript, SQL,
Knowledge of Web Services technologies such as XML, JSON, SOAP, REST, and AJAX
Knowledge of web frameworks, including XML, SOAP, J2EE, JSON and Ajax
Experience with Enterprise Java or .NET web application frameworks, including Struts and Spring
Proven analytical and problem solving skills, as well as the desire to assist others in solving issues
Excellent interpersonal skills with a strong interest in the application security domain
Excellent communication and presentation skills and a proven ability to communicate threats and facilitate progress towards long-term remediation
Highly motivated with the willingness to take ownership / responsibility for their work and the ability to work alone or as part of a team.
Ability to produce high level reports
Preferred Skills and competencies:
A+, N+, S+, CCNA
Vulnerability Scanning
Vulnerability Assessment
Valid Certified Ethical Hacker Certificate
Certified Penetration Testing Professional/ OR CISA/CISM/SISSP AND CISSP certification.
NB! CV FORMAT MUST BE PDF
Network & Security Engineer
Posted today
Job Viewed
Job Description
Network & Security Engineer
Posted today
Job Viewed
Job Description
At GBS Holdings, we're committed to building secure, scalable, and high-performance IT infrastructure that supports our diverse business operations. We're looking for a skilled Network and Security Engineer to join our dynamic team. In this role, you'll be responsible for designing, implementing, and managing robust network systems while ensuring the highest standards of security and reliability. If you're passionate about technology and thrive in a collaborative environment, we want to hear from you.
Key Responsibilities:
- Design, implement, and maintain secure network architectures (LAN, WAN, VPN)
- Configure and manage routing, switching, and wireless infrastructure
- Manage and secure FortiGate firewalls and related network security systems
- Provide 3rd line technical support for complex networking and security issues
- Ensure high availability (99.8% uptime) and proactive system maintenance
- Monitor network performance and conduct vulnerability assessments
- Maintain accurate documentation including network diagrams and configuration standards
- Support and maintain Windows Server 2016/2019 and Exchange hybrid environments
- Administer Office 365 and Microsoft Azure environments
- Implement and manage Veeam Backup & Replication for disaster recovery
- Support external SFTP environments and domain/DNS management
- Support endpoint security via Kaspersky Security Centre
Minimum Qualifications and Experience:
- Matric (Required)
- Diploma or Bachelor’s Degree in Information Technology or related field
- CCNA certification (Required)
- FortiGate certification (Advantageous)
- Must have a minimum of 5+ years as a network and security engineer
- Strong experience with routing, switching, FortiGate firewalls, and security best practices
- Background in cybersecurity and infrastructure management
- Good understanding of Microsoft technologies and cloud platforms (Azure, O365)
Behavioural & Competency Skills:
- Excellent communication and interpersonal skills
- Strong analytical and problem-solving abilities
- Able to work independently and collaboratively
- Task-oriented with a focus on timely, high-quality delivery
- Process-driven with attention to detail
Supervisor Network and Monitoring
Posted 6 days ago
Job Viewed
Job Description
Responsible for:
- Measure adherence to SLA for internal/external customers.
- Report to management on adherence to SLA for internal/external customers.
- Ensure compliance of incidents logged against the call logging process.
- Ensure all monitoring systems and appliances are in working order.
- Good academic background with an IT Diploma or equivalent qualification in Information Technology, Computing or relevant subject.
- 7 Years’ Experience in a Technical Support or similar role (Proven track record within a NOC, IT or ISP environment).
- 2 Years supervisory experience.
Senior Network Security (Fortinet) Engineer - (Sandton)
Posted 1 day ago
Job Viewed
Job Description
Are you a highly motivated security specialist with hands-on Fortinet experience looking for your next big challenge?
Our client is building a dynamic, energetic team and needs YOU to help secure cutting-edge networks!
What You'll Do:- Configure & manage top security tech (Fortinet-focused) - Project Management experience is a must!
- Respond to security alerts & analyze reports
- Keep systems updated & patched
- 3-5+ years in network security engineering
- 2+ years hands-on experience with Fortinet products (mandatory)
- Relevant IT security qualifications (Fortinet certs preferred)
- Strong communication, problem-solving & attention to detail
Salary: Negotiable based on experience
Only applicants with the required experience will be considered. Ready to level up your career?
#J-18808-LjbffrBe The First To Know
About the latest Network management Jobs in South Africa !
Network Security Engineer (CCNP Security certified)
Posted 384 days ago
Job Viewed
Job Description
Minimum Requirements:
Relevant tertiary qualifications and/or applicable courses.Cisco CCNP Security Certification.3-5 years' experience in policy configurations, integrations, deployments, management and troubleshooting of:Cisco Firepower Next-Generation Intrusion Prevention SystemsASASecurity Identity Management3-5 years' experience and expertise in the Cisco Web and Video Conferencing and3-5 years’ experience in the implementation, configuration, support and management of the Cisco Identify Services Engine including architecture.Information Security Management System (ISMS) Specialist
Posted 1 day ago
Job Viewed
Job Description
Join to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Information Security Management System (ISMS) SpecialistJoin to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist is responsible for the end-to-end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO/IEC 27001 standards. The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development And Implementation
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls into third-party contracts and SLAs.
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuring the organization’s security posture is robust and aligned with its strategic objectives.
Qualifications, Skills and Experience Required for the Job
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer Preferrable: ISO27001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding the highest ethical standards in all security practices
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Transportation, Logistics, Supply Chain and Storage
Referrals increase your chances of interviewing at Vector Logistics by 2x
Sign in to set job alerts for “Information Security Specialist” roles.Johannesburg, Gauteng, South Africa 2 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 3 days ago
Johannesburg, Gauteng, South Africa 1 month ago
Randburg, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Randburg, Gauteng, South Africa 5 days ago
Senior Manager: Information Systems Audit (Cyber Security)Pretoria, Gauteng, South Africa 2 weeks ago
Johannesburg Metropolitan Area 3 days ago
Centurion, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 day ago
Johannesburg, Gauteng, South Africa 6 days ago
Johannesburg, Gauteng, South Africa 5 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Management System (ISMS) Specialist
Posted 1 day ago
Job Viewed
Job Description
Information Security Management System (ISMS) Specialist
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development and Implementation:
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
Risk Assessment and Management:
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
Compliance and Audits:
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
Training and Awareness:
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
Incident Response and Management:
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
Continuous Improvement:
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
Vendor and Third-Party Risk Management:
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls intothird-party contracts and SLAs.
Key Relationships
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.
Qualifications, Skills and Experience Required for the Job
Qualifications and Experience
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer
Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
Skills and Competencies
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices
We look forward to hearing from you!
#J-18808-Ljbffr