71 Security Director jobs in Johannesburg
Director: Information Security (P5) (Information & Communication Systems: Management Informatio[...]
Posted 5 days ago
Job Viewed
Job Description
Advert reference: uj_
Advert status: Online
Apply by: 21 February 2025
Position SummaryJob category: Education and Training
Campus: Auckland Park Kingsway Campus
Contract: Permanent
Remuneration: Market Related
EE position: EE
IntroductionThe University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.
Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:
- Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses.
- Fulfil management, leadership, technical and administrative roles in the Department.
If you join the Department, you will:
- Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
- Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
- Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
- Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
- Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
- Lead the security documentation process to ensure progress and auditability.
- Lead the implementation of a secure system development life cycle.
- Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
- Conduct information assets security risk assessment.
- Lead the implementation and monitoring of information and data quality standards, policies and procedures.
- Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
- Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
- Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
- Integrate an Information and Cyber Security Risk Management Framework.
- Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
- Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
- Conduct security audits to identify gaps and implement controls to mitigate risks.
- Degree or any relevant qualification (NQF 8).
- 5 to 8 years' of management experience in an Information Security Management.
- Information security, project management and IT service management experience.
- Outsourced services and management of commercial partners.
- Managing strategic change in a dynamic operating environment.
- Translating broad business needs and understanding the key drivers of enterprise applications.
- Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP.
Skills:
- Good interpersonal and communication skills (verbal and written).
- Ability to maintain sound human relations and transfer skills and knowledge.
- Strong decision making and budget control skills.
- Strong Risk management and Cyber security awareness.
- IT Policies and Procedures.
- Collaborating with business managers to determine and deliver value adding IT solutions.
- Ability to manage a multi technology technical support team.
- Knowledge of the latest Information security technologies.
- Firewall standards and protocols.
- Project Management.
Enquiries regarding the job content: Ms Maletsema Phofu on Tel:
Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.
Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University.
For more information, please review the following link: Justice/Criminal/NRSO .
Candidates may be subjected to appropriate psychometric testing and other selection instruments.
In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.
#J-18808-LjbffrDirector: information security (p5) (information & communication systems: management informatio[...]
Posted today
Job Viewed
Job Description
Director: information security (p5) (information & communication systems: management informatio[...]
Posted today
Job Viewed
Job Description
Information Security Lead
Posted 1 day ago
Job Viewed
Job Description
Join Interfile—South Africa’s leading Electronic Bill Presentment & Payment (EBPP) fintech—where we design, build, and run large-scale digital services used by millions, partnering with top banks, major corporates, and government. You’ll work on modern architectures across both new builds and enhancements in a culture that prizes innovation, seamless integration, and exceptional delivery. We’re customer-obsessed and known for helping organizations modernise. Our Fourways office—right across from Montecasino—offers a modern workspace with a Vitality-certified gym, canteen, and great chill areas.
Purpose of the role:
Lead and continuously improve our information security posture across on-prem and cloud—covering platforms, hardware, networks, and data centres. You’ll drive vulnerability remediation through both automation and hands-on work, ensure compliance with POPIA, and design, implement, and uplift security standards and frameworks (e.g., ISO 27001/27002, NIST CSF 2.0). You’ll also own risk management and incident response while championing a security-first culture across the business.
Responsibilities:
- Security Assessment & Management
- Conduct regular security assessments across infrastructure, applications, and data environments.
- Implement and manage SAST and DAST tools and processes.
- Track, report, and drive remediation of vulnerabilities and security issues.
- Security Posture & Reporting
- Develop and maintain dashboards and reports that clearly communicate the organization’s security posture.
- Define and track KPIs for security posture, remediation velocity, and compliance.
- Collaborate with internal teams to ensure visibility and accountability for remediation efforts.
- Automation & Remediation
- Design and implement automated security controls and remediation workflows.
- Work with DevOps and IT teams to integrate security into CI/CD pipelines.
- Compliance & Regulatory Alignment
- Ensure alignment with POPIA and other applicable data protection regulations.
- Support audits and compliance reporting requirements.
- Work with legal and compliance teams to ensure data handling aligns with privacy laws.
- Standards & Frameworks
- Contribute to the design and rollout of security standards such as ISO 20027.
- Align security practices with NIST CSF 2.0 and other relevant frameworks.
- Risk Management
- Conduct risk assessments and maintain a security risk register.
- Collaborate with business units to understand and mitigate security risks tied to operations and products.
- Incident Response & Forensics
- Develop and maintain incident response plans.
- Lead investigations into security breaches and coordinate post-incident reviews.
- Security Awareness & Training
- Design and deliver security awareness programs for staff.
- Promote a security-first culture across technical and non-technical teams.
- Third-Party & Vendor Security
- Assess and manage security risks related to vendors, partners, and third-party services.
- Ensure contracts and SLAs include appropriate security clauses.
- Secure Architecture & Design
- Participate in solution architecture reviews to ensure security is embedded from the start.
- Advise on secure design patterns and threat modeling.
Requirements (Essential):
- Bachelor’s degree in Information Security, Computer Science, or related field.
- At least one security certification: CISSP, CISM, CEH, CompTIA Security+, ISO 27001 Lead Implementer (or similar).
- 5+ years in an information security role (or similar).
- Proven security experience across infrastructure, applications, and data environments.
- Hands-on with SAST/DAST tools (e.g., SonarQube, OWASP ZAP, Burp Suite).
- Strong vulnerability management and remediation workflow expertise.
- Familiarity with automation/scripting (e.g., Python, PowerShell) and CI/CD tooling.
- Working knowledge of POPIA and other data-protection regulations.
- Experience with security frameworks (e.g., NIST CSF, ISO 27001/27002).
- Ability to communicate technical risks and remediation plans to non-technical stakeholders.
Nice to Have (Desirable)
- Proactive, detail-oriented, strong sense of ownership.
- Comfortable collaborating across multiple teams and disciplines.
- Passion for security, compliance, and continuous improvement.
- Multiple or advanced security certifications.
Information Security Architect
Posted 3 days ago
Job Viewed
Job Description
Job title: Information Security Architect
Contract duration: Start with 6 months
First preference: EEE candidates
Location: JHB
The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.
Key Responsibilities:
- Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
- Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
- Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
- Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
- Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
- Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
- Define portfolio vision and reusable security patterns aligned with the EA strategy.
- Lead architecture reviews for high-risk projects, driving recommendations to resolution.
- Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
- Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
- Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
- Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
- Manage security architects and mentor engineers, developers, and vendors.
What will you bring?
- Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
- Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
- Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
- Teamwork and Energy – work across different functional and business teams with effective collaboration.
- Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
- Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
- Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).
Requirements / Skills and Competence
- Tertiary qualification in Computer Science, Engineering, or related field (preferred)
- Minimum of 5-10 years of experience in Security Architecture.
- CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
- Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
- Experience in identifying gaps in existing architectures.
- Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
- Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
- Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
- Good experience in security architecture design in Cloud and on-prem.
- Design and implementation of IOT, endpoint protection, and secure IAM.
- Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
- Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
- Knowledge of web application architectures and threat modelling.
Information Security Specialist
Posted 3 days ago
Job Viewed
Job Description
ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.
TASK AND RESPONSIBILITIES:
- Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
- Perform research, testing, evaluating, and deployment of security technology and procedures.
- Run diagnostics on any changes to data to verify any undetected breaches.
- Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
- Develop and implement information security standards, guidelines, and procedures.
- Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
- Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
- Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.
FUNCTIONAL KNOWLEDGE:
Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.
MINIMUM REQUIREMENTS• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.
EXPERIENCE• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.
#J-18808-LjbffrInformation Security Manager
Posted today
Job Viewed
Job Description
Designation:
Information Security Manager | Waterfall, Midrand, Gauteng | Permanent
Category:
Information Technology
Job Level:
Professionally qualified and experienced specialists and mid-management
Posted by:
PSG Financial Services
Posted on:
03 Oct 2025
Reference Number:
POS08450
Closing date:
30-Oct-2025
Position Type:
Permanent
Location:
Waterfall Magwa Crescent
Overview:
VACANCY | INFORMATION SECURITY MANAGER | WATERFALL, MIDRAND, GAUTENG | PERMANENT
PSGs commitment to transform and embrace diversity is what drives us to achieve a diverse workplace with employment equity as a key goal to create an inclusive workforce. In achieving our employment equity goals, we give preference to applicants from designated groups, and we encourage people with disability to apply.
Job description:The Information Security Manager will lead PSG's cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).
Responsibilities:Strategic Leadership & Governance
- Develop and maintain PSG's enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
- Establish and enforce security governance frameworks, policies, and standards.
- Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
- Lead the implementation of relevant security compliance initiatives.
- Collaborate with divisional CIOs and executive leadership to align security posture across business units.
- Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.
- Design secure solutions for hybrid environments (on-prem + Azure).
- Integrate security into infrastructure and application projects.
- Manage identity and access controls, including Azure AD, MFA, and privileged access management.
- Manage day-to-day security monitoring, incident handling, and threat intelligence.
- Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
- Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
- Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
- Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.
- Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
- Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
- Support procurement and vendor management for security solutions.
- Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
- Define SOC roles, workflows, and incident response playbooks.
- Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
- Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
- Coordinate with external threat intelligence providers and law enforcement when necessary.
- Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
- Ensure timely patching, configuration updates, and feature adoption.
- Maintain compatibility and integration of security tools with PSG's hybrid infrastructure.
- Document system configurations and update operational procedures regularly.
- Conduct regular risk assessments, vulnerability scans, and penetration tests.
- Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
- Maintain a risk register and track mitigation actions.
- Coordinate internal and external audits and ensure timely remediation of findings.
- Lead organization-wide cybersecurity awareness programs.
- Deliver targeted training for IT, business, and executive teams.
- Promote secure behaviour and incident reporting culture.
- Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
- Define clear roles, responsibilities, and performance expectations.
- Conduct regular coaching, performance reviews, and career development planning.
- Foster a culture of accountability, innovation, and continuous improvement.
- Promote cybersecurity awareness and ownership across all departments.
- Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.
- Bachelor's degree in Computer Science, Information Technology, or related field.
- 8+ years of IT Security experience, with 5+ years in a leadership role.
- CISSP, CISM, or equivalent
- Microsoft Certified: Cybersecurity Architect Expert
- GIAC Security Operations (GSOM) or equivalent SOC certification
- Familiarity with scripting (PowerShell, Bash) and automation tools.
- Microsoft 365 and SharePoint Online
- Proven experience in cybersecurity leadership within hybrid cloud environments.
- Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
- Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
- Experience managing BYOD environments and securing distributed branch networks.
- Familiarity with ISO/IEC 27001, ISO/IEC 2000, NIST, and CIS controls.
- Excellent communication, stakeholder engagement, and team leadership skills.
- Technical documentation
- Strong leadership and problem-solving skills.
- Attention to detail
- Decision making
- Leadership
- Attention to detail
- Resilience
- Good verbal and written communication skills
- Time management skills
- Deadline driven
Candidates interested must apply here by no later than 30 October 2025 OR browse available PSG Careers vacancies
By submitting your application, you are giving PSG Financial Services implicit consent to the storage and processing of your personal information. If you are not contacted within 4 weeks of your application, please accept that your application was not successful. For more information about careers at PSG, visit
Be The First To Know
About the latest Security director Jobs in Johannesburg !
Information security specialist
Posted today
Job Viewed
Job Description
Information security lead
Posted today
Job Viewed
Job Description
Information security specialist
Posted today
Job Viewed