233 Security Director jobs in South Africa

Director: Information Security (P5) (Information & Communication Systems: Management Informatio[...]

Johannesburg, Gauteng University of Johannesburg

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Director: Information Security (P5) (Information & Communication Systems: Management Information Systems)

Advert reference: uj_

Advert status: Online

Apply by: 21 February 2025

Position Summary

Job category: Education and Training

Campus: Auckland Park Kingsway Campus

Contract: Permanent

Remuneration: Market Related

EE position: EE

Introduction

The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.

Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:

  • Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses.
  • Fulfil management, leadership, technical and administrative roles in the Department.
Responsibilities:

If you join the Department, you will:

  • Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
  • Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
  • Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
  • Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
  • Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
  • Lead the security documentation process to ensure progress and auditability.
  • Lead the implementation of a secure system development life cycle.
  • Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
  • Conduct information assets security risk assessment.
  • Lead the implementation and monitoring of information and data quality standards, policies and procedures.
  • Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
  • Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
  • Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
  • Integrate an Information and Cyber Security Risk Management Framework.
  • Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
  • Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
  • Conduct security audits to identify gaps and implement controls to mitigate risks.
Minimum Qualifications:
  • Degree or any relevant qualification (NQF 8).
  • 5 to 8 years' of management experience in an Information Security Management.
  • Information security, project management and IT service management experience.
  • Outsourced services and management of commercial partners.
  • Managing strategic change in a dynamic operating environment.
  • Translating broad business needs and understanding the key drivers of enterprise applications.
  • Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP.
Competencies and Behavioural Attributes:

Skills:

  • Good interpersonal and communication skills (verbal and written).
  • Ability to maintain sound human relations and transfer skills and knowledge.
  • Strong decision making and budget control skills.
  • Strong Risk management and Cyber security awareness.
  • IT Policies and Procedures.
  • Collaborating with business managers to determine and deliver value adding IT solutions.
  • Ability to manage a multi technology technical support team.
  • Knowledge of the latest Information security technologies.
  • Firewall standards and protocols.
  • Project Management.
Enquiries:

Enquiries regarding the job content: Ms Maletsema Phofu on Tel:

Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.

Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University.

For more information, please review the following link: Justice/Criminal/NRSO .

Candidates may be subjected to appropriate psychometric testing and other selection instruments.

In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Director: information security (p5) (information & communication systems: management informatio[...]

Johannesburg, Gauteng University Of Johannesburg

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Director: Information Security (P5) (Information & Communication Systems: Management Information Systems) Advert reference: uj_ Advert status: Online Apply by: 21 February 2025 Position Summary Job category: Education and Training Campus: Auckland Park Kingsway Campus Contract: Permanent Remuneration: Market Related EE position: EE Introduction The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4 IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”. Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will: Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses. Fulfil management, leadership, technical and administrative roles in the Department. Responsibilities: If you join the Department, you will: Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme. Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan. Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders. Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme. Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies. Lead the security documentation process to ensure progress and auditability. Lead the implementation of a secure system development life cycle. Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations. Conduct information assets security risk assessment. Lead the implementation and monitoring of information and data quality standards, policies and procedures. Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met. Ensure that information security threats are identified, detected, responded to, recovered from and followed up on. Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings. Integrate an Information and Cyber Security Risk Management Framework. Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation. Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required. Conduct security audits to identify gaps and implement controls to mitigate risks. Minimum Qualifications: Degree or any relevant qualification (NQF 8). 5 to 8 years' of management experience in an Information Security Management. Information security, project management and IT service management experience. Outsourced services and management of commercial partners. Managing strategic change in a dynamic operating environment. Translating broad business needs and understanding the key drivers of enterprise applications. Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP. Competencies and Behavioural Attributes: Skills: Good interpersonal and communication skills (verbal and written). Ability to maintain sound human relations and transfer skills and knowledge. Strong decision making and budget control skills. Strong Risk management and Cyber security awareness. IT Policies and Procedures. Collaborating with business managers to determine and deliver value adding IT solutions. Ability to manage a multi technology technical support team. Knowledge of the latest Information security technologies. Firewall standards and protocols. Project Management. Enquiries: Enquiries regarding the job content: Ms Maletsema Phofu on Tel: Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output. Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University. For more information, please review the following link: Justice/Criminal/NRSO . Candidates may be subjected to appropriate psychometric testing and other selection instruments. In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Director: information security (p5) (information & communication systems: management informatio[...]

Johannesburg, Gauteng University Of Johannesburg

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Director: Information Security (P5) (Information & Communication Systems: Management Information Systems) Advert reference: uj_ Advert status: Online Apply by: 21 February 2025 Position Summary Job category: Education and Training Campus: Auckland Park Kingsway Campus Contract: Permanent Remuneration: Market Related EE position: EE Introduction The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4 IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”. Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will: Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses. Fulfil management, leadership, technical and administrative roles in the Department. Responsibilities: If you join the Department, you will: Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme. Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan. Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders. Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme. Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies. Lead the security documentation process to ensure progress and auditability. Lead the implementation of a secure system development life cycle. Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations. Conduct information assets security risk assessment. Lead the implementation and monitoring of information and data quality standards, policies and procedures. Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met. Ensure that information security threats are identified, detected, responded to, recovered from and followed up on. Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings. Integrate an Information and Cyber Security Risk Management Framework. Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation. Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required. Conduct security audits to identify gaps and implement controls to mitigate risks. Minimum Qualifications: Degree or any relevant qualification (NQF 8). 5 to 8 years' of management experience in an Information Security Management. Information security, project management and IT service management experience. Outsourced services and management of commercial partners. Managing strategic change in a dynamic operating environment. Translating broad business needs and understanding the key drivers of enterprise applications. Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP. Competencies and Behavioural Attributes: Skills: Good interpersonal and communication skills (verbal and written). Ability to maintain sound human relations and transfer skills and knowledge. Strong decision making and budget control skills. Strong Risk management and Cyber security awareness. IT Policies and Procedures. Collaborating with business managers to determine and deliver value adding IT solutions. Ability to manage a multi technology technical support team. Knowledge of the latest Information security technologies. Firewall standards and protocols. Project Management. Enquiries: Enquiries regarding the job content: Ms Maletsema Phofu on Tel: Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output. Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University. For more information, please review the following link: Justice/Criminal/NRSO . Candidates may be subjected to appropriate psychometric testing and other selection instruments. In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security and Risk Management Auditors

R900000 - R1200000 Y DQS GmbH

Posted today

Job Viewed

Tap Again To Close

Job Description

Published : 06/09/2022

Location : South Africa

Career Level : Experienced

Entity : DQS South Africa

Type of employment : Associate

Reference number : ISMS0023

For almost four decades, the DQS group has been known internationally for the highest quality and reliability in the certification of processes or management systems. Above all, our success is based on a high level of customer and service orientation that goes far beyond verifying checklists, and of course, on our employees who give their best every day.

DQS is currently looking for qualified Information Security, Cyber Security and Risk Management specialists interested in pursuing a career in auditing.

Your primary role would be to carry out assessments of our customer's management systems to ensure they meet the requirements of International Standards such as

ISO 22301

,

ISO 27001

,

TISAX

and other related standards.

To apply you'll need at least:

  • Professional education (academic or technical): Completed higher education with a university or trade school degree, master craftsman's diploma or equivalent.
  • Professional experience: At least five years of professional experience, including management, personnel, or project responsibility, two of them relating to the respective management system (

ISO 27001

,

ISO 22301

,

TISAX

).
- Experience with information and cyber security technologies.
- It is important for us to assign experts and managers with practical experience in auditing.

Our success is based on our highly qualified and experienced auditors. They have completed professional training and/or a degree, have extensive experience with management techniques and management systems, and have proven practical experience in the various industries they audit.

Training and development will be provided to ensure your success as an auditor

Various trainings will be provided on an ongoing basis.

International working environment

Weiterbildungsmöglichkeiten

Exciting Projects

Open-minded team

DQS: Simply leveraging Quality.

Our success is based on our highly qualified and experienced auditors. They have completed professional training and/or a degree, have extensive experience with management techniques and management systems, and have proven practical experience in the various industries they audit.

Would you like to join a dynamic team of auditors and further expand the success of DQS? If you meet the above requirements and are interested in becoming a certified auditor with DQS, please send us your CV to

Apply Now

Job ads

Haven't found the right one for you yet? Feel free to take another look at our overview.

Back to the overview

This advertiser has chosen not to accept applicants from your region.

Information Security Lead

Johannesburg, Gauteng Harris Computer

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join Interfile—South Africa’s leading Electronic Bill Presentment & Payment (EBPP) fintech—where we design, build, and run large-scale digital services used by millions, partnering with top banks, major corporates, and government. You’ll work on modern architectures across both new builds and enhancements in a culture that prizes innovation, seamless integration, and exceptional delivery. We’re customer-obsessed and known for helping organizations modernise. Our Fourways office—right across from Montecasino—offers a modern workspace with a Vitality-certified gym, canteen, and great chill areas.

Purpose of the role:

Lead and continuously improve our information security posture across on-prem and cloud—covering platforms, hardware, networks, and data centres. You’ll drive vulnerability remediation through both automation and hands-on work, ensure compliance with POPIA, and design, implement, and uplift security standards and frameworks (e.g., ISO 27001/27002, NIST CSF 2.0). You’ll also own risk management and incident response while championing a security-first culture across the business.

Responsibilities:

  • Security Assessment & Management
    • Conduct regular security assessments across infrastructure, applications, and data environments.
    • Implement and manage SAST and DAST tools and processes.
    • Track, report, and drive remediation of vulnerabilities and security issues.
  • Security Posture & Reporting
    • Develop and maintain dashboards and reports that clearly communicate the organization’s security posture.
    • Define and track KPIs for security posture, remediation velocity, and compliance.
    • Collaborate with internal teams to ensure visibility and accountability for remediation efforts.
  • Automation & Remediation
    • Design and implement automated security controls and remediation workflows.
    • Work with DevOps and IT teams to integrate security into CI/CD pipelines.
  • Compliance & Regulatory Alignment
    • Ensure alignment with POPIA and other applicable data protection regulations.
    • Support audits and compliance reporting requirements.
    • Work with legal and compliance teams to ensure data handling aligns with privacy laws.
  • Standards & Frameworks
    • Contribute to the design and rollout of security standards such as ISO 20027.
    • Align security practices with NIST CSF 2.0 and other relevant frameworks.
  • Risk Management
    • Conduct risk assessments and maintain a security risk register.
    • Collaborate with business units to understand and mitigate security risks tied to operations and products.
  • Incident Response & Forensics
    • Develop and maintain incident response plans.
    • Lead investigations into security breaches and coordinate post-incident reviews.
  • Security Awareness & Training
    • Design and deliver security awareness programs for staff.
    • Promote a security-first culture across technical and non-technical teams.
  • Third-Party & Vendor Security
    • Assess and manage security risks related to vendors, partners, and third-party services.
    • Ensure contracts and SLAs include appropriate security clauses.
  • Secure Architecture & Design
    • Participate in solution architecture reviews to ensure security is embedded from the start.
  • Advise on secure design patterns and threat modeling.

Requirements (Essential):

  • Bachelor’s degree in Information Security, Computer Science, or related field.
  • At least one security certification: CISSP, CISM, CEH, CompTIA Security+, ISO 27001 Lead Implementer (or similar).
  • 5+ years in an information security role (or similar).
  • Proven security experience across infrastructure, applications, and data environments.
  • Hands-on with SAST/DAST tools (e.g., SonarQube, OWASP ZAP, Burp Suite).
  • Strong vulnerability management and remediation workflow expertise.
  • Familiarity with automation/scripting (e.g., Python, PowerShell) and CI/CD tooling.
  • Working knowledge of POPIA and other data-protection regulations.
  • Experience with security frameworks (e.g., NIST CSF, ISO 27001/27002).
  • Ability to communicate technical risks and remediation plans to non-technical stakeholders.

Nice to Have (Desirable)

  • Proactive, detail-oriented, strong sense of ownership.
  • Comfortable collaborating across multiple teams and disciplines.
  • Passion for security, compliance, and continuous improvement.
  • Multiple or advanced security certifications.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Architect

Johannesburg, Gauteng InfyStrat

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities:

  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
  • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
  • Define portfolio vision and reusable security patterns aligned with the EA strategy.
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
  • Manage security architects and mentor engineers, developers, and vendors.

What will you bring?

  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
  • Teamwork and Energy – work across different functional and business teams with effective collaboration.
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

Requirements / Skills and Competence

  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture.
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures.
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
  • Good experience in security architecture design in Cloud and on-prem.
  • Design and implementation of IOT, endpoint protection, and secure IAM.
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Johannesburg, Gauteng Kalagadi

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.

TASK AND RESPONSIBILITIES:

  1. Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
  2. Perform research, testing, evaluating, and deployment of security technology and procedures.
  3. Run diagnostics on any changes to data to verify any undetected breaches.
  4. Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
  5. Develop and implement information security standards, guidelines, and procedures.
  6. Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
  7. Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
  8. Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.

FUNCTIONAL KNOWLEDGE:

Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.

MINIMUM REQUIREMENTS

• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.

EXPERIENCE

• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security director Jobs in South Africa !

Information Security Consultant

Cape Town, Western Cape iLaunch (Pty) Ltd

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis.

Responsibilities
  • Security Auditing
  • Responsible for Security tools monitoring
  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Operating System management and Hardening
  • Anti-Virus System management and Configuration
  • Logical Access Management
  • Vulnerability Management
Minimum Requirements
  • Matric and an Information Technology diploma or degree qualification
  • 4+ years experience in the field
Package & Remuneration

Salary: Market Related

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Manager

Midrand, Gauteng R1200000 - R3600000 Y PSG Konsult

Posted today

Job Viewed

Tap Again To Close

Job Description

Designation:

Information Security Manager | Waterfall, Midrand, Gauteng | Permanent

Category:

Information Technology

Job Level:

Professionally qualified and experienced specialists and mid-management

Posted by:

PSG Financial Services

Posted on:

03 Oct 2025

Reference Number:

POS08450

Closing date:

30-Oct-2025

Position Type:

Permanent

Location:

Waterfall Magwa Crescent

Overview:

VACANCY | INFORMATION SECURITY MANAGER | WATERFALL, MIDRAND, GAUTENG | PERMANENT

PSGs commitment to transform and embrace diversity is what drives us to achieve a diverse workplace with employment equity as a key goal to create an inclusive workforce. In achieving our employment equity goals, we give preference to applicants from designated groups, and we encourage people with disability to apply.

Job description:

The Information Security Manager will lead PSG's cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).

Responsibilities:
Strategic Leadership & Governance
  • Develop and maintain PSG's enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
  • Establish and enforce security governance frameworks, policies, and standards.
  • Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
  • Lead the implementation of relevant security compliance initiatives.
  • Collaborate with divisional CIOs and executive leadership to align security posture across business units.
  • Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.
Architecture & Identity Management
  • Design secure solutions for hybrid environments (on-prem + Azure).
  • Integrate security into infrastructure and application projects.
  • Manage identity and access controls, including Azure AD, MFA, and privileged access management.
Security Operations
  • Manage day-to-day security monitoring, incident handling, and threat intelligence.
  • Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
  • Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
  • Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
  • Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.
Financial Management
  • Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
  • Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
  • Support procurement and vendor management for security solutions.
Cyber Security Operations Center (SOC) Oversight
  • Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
  • Define SOC roles, workflows, and incident response playbooks.
  • Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
  • Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
  • Coordinate with external threat intelligence providers and law enforcement when necessary.
Security Technology Lifecycle Management
  • Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
  • Ensure timely patching, configuration updates, and feature adoption.
  • Maintain compatibility and integration of security tools with PSG's hybrid infrastructure.
  • Document system configurations and update operational procedures regularly.
Risk Management & Compliance
  • Conduct regular risk assessments, vulnerability scans, and penetration tests.
  • Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
  • Maintain a risk register and track mitigation actions.
  • Coordinate internal and external audits and ensure timely remediation of findings.
Awareness, Education & Training
  • Lead organization-wide cybersecurity awareness programs.
  • Deliver targeted training for IT, business, and executive teams.
  • Promote secure behaviour and incident reporting culture.
Team Leadership & Culture
  • Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
  • Define clear roles, responsibilities, and performance expectations.
  • Conduct regular coaching, performance reviews, and career development planning.
  • Foster a culture of accountability, innovation, and continuous improvement.
  • Promote cybersecurity awareness and ownership across all departments.
Reporting
  • Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.
Minimum requirements:
  • Bachelor's degree in Computer Science, Information Technology, or related field.
  • 8+ years of IT Security experience, with 5+ years in a leadership role.
  • CISSP, CISM, or equivalent
  • Microsoft Certified: Cybersecurity Architect Expert
  • GIAC Security Operations (GSOM) or equivalent SOC certification
  • Familiarity with scripting (PowerShell, Bash) and automation tools.
Experience in the following technologies and concepts:
  • Microsoft 365 and SharePoint Online
  • Proven experience in cybersecurity leadership within hybrid cloud environments.
  • Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
  • Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
  • Experience managing BYOD environments and securing distributed branch networks.
  • Familiarity with ISO/IEC 27001, ISO/IEC 2000, NIST, and CIS controls.
  • Excellent communication, stakeholder engagement, and team leadership skills.
  • Technical documentation
Competencies required:
  • Strong leadership and problem-solving skills.
  • Attention to detail
  • Decision making
  • Leadership
  • Attention to detail
  • Resilience
  • Good verbal and written communication skills
  • Time management skills
  • Deadline driven
How to apply:

Candidates interested must apply here by no later than 30 October 2025 OR browse available PSG Careers vacancies

By submitting your application, you are giving PSG Financial Services implicit consent to the storage and processing of your personal information. If you are not contacted within 4 weeks of your application, please accept that your application was not successful. For more information about careers at PSG, visit

This advertiser has chosen not to accept applicants from your region.

Information Security Administrator

R180000 - R208000 Y FirstRand

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Hello Future Information Security Administrator

Welcome to FNB, the home of the #changeables. We design for the shapeshifters and deliver products and services that make us incredibly proud of people that make it happen.

As part of our talented team, you will be surrounded by unique talents, diverse minds, and an adaptable environment that lives up to the promise of staying curious. Now's the time to imagine your potential in a team where experts come together and ignite effective change. .

To assist in identifying, defining and maintaining the information security policy and baseline standards

Are you someone who can:

  • Deliver exceptional service that exceeds customers' expectations through proactive, innovative and appropriate solutions.
  • Cultivate and manage objective working relationships with a variety of stakeholders, including end-users, SME's, project managers and senior staff members by providing expert advice and consulting on all aspects of IT security.
  • Support IT Security leaders to participate in the FirstRand Bank Information Risk awareness program and to ensure that staff is aware of information security risks.
  • Ensure that operating objectives and standards of performance are not only understood but owned by management and employees and to ensure that appropriate standards of conduct are established and complied with.
  • Comply, understand and implement all steps for the IT Information Security Processes and Procedures and meet governance in terms of legislative and audit requirements.
  • Assist in identifying, defining and maintaining the information security policy and base line standards.
  • Assist and administer the implementation of control mechanisms, which enables Information Security Services to have a view of the status of information security.
  • Ensure all Information Security analysis and research are captured, recorded and reported on to ensure correct actions are implementation are executed.
  • Ensure that operating objectives and standards of performance are not only understood but owned by management and employees and to ensure that appropriate standards of conduct are established and complied with.
  • Manage own development to increase own competencies.
  • Maintain current knowledge of the Information Systems security industry's emerging technologies.

Dare to imagine the change with us if you are:

  • An adaptable problem solver who does not fear change but thrives from it.
  • A disruptor in your field of IT expertise
  • An initiative taker who identifies opportunity and improves
  • Known for your delivery track record.
  • Wanting to be in a career that makes meaningful contribution to your and other people's lives.

We'll make a good match if you're:

  • Curious - you're driven by always wanting to know more and learn more.
  • Obsessed with mastery - you know what it takes to become good at what you do and are constantly pushing yourself to do it.
  • Courageous - you're brave enough to think and do things differently and are always ready to put your hand up and take ownership.
  • A team player - you believe in the power of teams so you're always part of one, building and leveraging your networks.
  • Emotionally intelligent - you have a high EQ that enables you to truly connect with people, no matter how technical or specialist your role is.

You'll benefit from our changeable benefits like:

  • Opportunities to network and collaborate.
  • Inspiring work environment
  • Work that is challenging
  • Space to make a difference.
  • Opportunities to innovate.
  • Conditions that are flexible
  • Focus on health and wellbeing (onsite wellness center, gym and crèche at our main campus to innovative employee wellbeing and financial fitness programmes)
  • Resources to help you with your professional development.
  • Generous leave policy
  • Preferential employee banking rates
  • When it comes to learning and development, we encourage our changeable to expand their knowledge, on their own, with others, in person or online.
  • As for our workspace, it is immersive, collaborative, and energetic because at FNB, innovation is our lifeblood and change in our DNA.

Are you interested to take the step? We look forward to engaging with you further. Apply now

POST
FNB
FAIRLANDS
LI-DG2

Job Details

Take note that applications will not be accepted on the below date and onwards, kindly submit applications ahead of the closing date indicated below.

06/09/25

All appointments will be made in line with FirstRand Group's Employment Equity plan. The Bank supports the recruitment and advancement of individuals with disabilities. In order for us to fulfill this purpose, candidates can disclose their disability information on a voluntary basis. The Bank will keep this information confidential unless we are required by law to disclose this information to other parties.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Director Jobs