107 Security Engineer jobs in South Africa

Job No Longer Available

This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.

However, we have similar jobs available for you below.

Security Engineer

Pretoria, Gauteng wePlace

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Job Purpose :

Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

As the IT Security Engineer, you'll support the company by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect their systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

Minimum education (essential) :

Engineering degree (Computer, Software, Mechanical or Electronic

Minimum education (desirable) :

  • OSCP (Offensive Security Certified Professional)
  • PNPT (Practical Network Penetration Tester)
  • CISSP (Certified Information Systems Security Professional)
  • CCSP (Certified Cloud Security Practitioner)

Minimum applicable experience (years) :

AWS' ecosystem :

  • AWS Well Architected Framework
  • Trusted Advisor
  • GuardDuty / SCP / SSM / IAM / WAF
  • Container services such as ECS / EKS
  • Incident detection and response management.
  • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
  • Drafting and implementing security policies, security procedures, security design and implementation.
  • The following would be advantageous :

  • ISO 14971 (risk management) compliance
  • ISO 27032 (cybersecurity) compliance
  • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)
  • Skills and Knowledge (essential) :

  • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
  • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
  • Understanding of the following : Linux / Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
  • Solid knowledge of IT security (firewalls, EDR, IDS / IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
  • Understanding of AWS ECS & Kubernetes and Containerisation (Docker / Podman / Containerd) with implementation, support, and design.
  • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
  • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.
  • Cybersecurity Management 40%

  • Drive development standards and processes related to cybersecurity compliance.
  • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
  • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
  • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
  • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
  • Identify, implement and maintain all security tools and technology.
  • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
  • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
  • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.
  • Infrastructure Management 30%

  • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
  • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
  • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
  • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
  • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
  • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that the IT team follows the requirements set in line with cybersecurity standards.
  • Implement cybersecurity continuous improvement programs.
  • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
  • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.
  • Risk Management and Compliance 20%

  • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
  • Improve the automation of security controls.
  • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
  • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
  • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
  • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
  • Manage internal and external audits as required with relation to cybersecurity.
  • Maintain documentation for cybersecurity-related risks, processes and findings.
  • QMS and Documentation 10%

  • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
  • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
  • Proactively keep stakeholders updated on status, progress, risks and problems.
  • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
  • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
  • Maintain cybersecurity documents and records in line with certification requirements.
  • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.
  • 2 days work-from-home in line with Company Policy (only applicable after probation is successfully passed).

    Should you not receive a response from us within one week of your application, your application has unfortunately not been successful.

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Security Engineer

    Iqtalent

    Posted 1 day ago

    Job Viewed

    Tap Again To Close

    Job Description

    Restream is looking for a talented Security Engineer to join us to solve complex challenges and build world-class products. In this role, you will conduct architecture security reviews, application testing, penetration testing, and work with the engineering team, security researchers, and third-party vendors to ensure the security of our systems as we rapidly scale our product and organization. You understand the importance of simplicity and reliability, and you calculate the impact of every decision on each. We believe in small teams where each member contributes significant value.

    What You’ll Do

    • Perform application and penetration testing.
    • Work with engineers to analyze systems, threat model new features, and create responsive controls to ensure end-to-end customer protection.
    • Work with third-party vendors to perform annual application and penetration testing reports.
    • Maintain, and grow our private bug bounty program; lead the transition to a public bug bounty program.
    • Give and receive code review feedback from the team.
    • Maintain a pulse on emerging technologies and discover hidden opportunities in our environment.
    • Ensure security and resilience of Restream production infrastructure.

    What We Look For

    • A scrappy, entrepreneurial attitude that gets high-quality projects done quickly.
    • Solid knowledge of web applications vulnerabilities and attack vectors.
    • Experience manually testing web applications, performing penetration testing, and using automated tools for reconnaissance and discovery.
    • Experience with scripting languages and at least one general-purpose programming language. Node.JS (TypeScript) or Rust would be a plus but are not a requirement.
    • Strong written and verbal communication skills.
    • Self-directed, analytical, and work well in a team environment.
    • Passionate about keeping Restream customers and employees safe online.

    Restream is the #1 solution for creating professional live videos and streaming them to all social networks at once. Millions of people around the world use Restream to reach, engage, and monetize their audiences. We’re a small and diverse group of dreamers who make technology work for the world. We believe that a small but highly driven and focused team can make a lasting impact in any area.

    What We Offer

    • Startup environment and a flat company structure.
    • Work closely with founders and team to build and grow the product.
    • Direct influence and impact on the direction of the product and development.
    • The ability to create something that influences people’s lives.
    • Competitive pay and equity packages for you to truly be a part of the Restream journey.
    • Flexible paid time off.
    • The tech you need to get your job done.

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Security Engineer

    Pretoria, Gauteng hearX

    Posted 10 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Pretoria - 2 days work-from-home in line with Company Policy (only applicable after probation is successfully passed).

    Job Purpose

    Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

    As our IT Security Engineer, you'll support us by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect our systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

    Minimum Education (essential)

    Engineering degree (Computer, Software, Mechanical or Electronic

    Minimum Education (desirable)

    • OSCP (Offensive Security Certified Professional)
    • PNPT (Practical Network Penetration Tester)
    • CISSP (Certified Information Systems Security Professional)
    • CCSP (Certified Cloud Security Practitioner)

    Minimum applicable experience (years):

    AWS' Ecosystem

    • AWS Well Architected Framework
    • Trusted Advisor
    • GuardDuty / SCP / SSM / IAM / WAF
    • Container services such as ECS/EKS
    • Incident detection and response management.
    • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
    • Drafting and implementing security policies, security procedures, security design and implementation.

    The Following Would Be Advantageous

    • ISO 14971 (risk management) compliance
    • ISO 27032 (cybersecurity) compliance
    • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)

    Skills And Knowledge (essential)

    • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
    • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
    • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
    • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
    • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
    • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
    • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.

    Cybersecurity Management 40%

    • Drive development standards and processes related to cybersecurity compliance.
    • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
    • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
    • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
    • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
    • Identify, implement and maintain all security tools and technology.
    • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
    • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
    • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.

    Infrastructure Management 30%

    • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
    • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
    • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
    • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
    • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
    • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that
    • the IT team follows the requirements set in line with cybersecurity standards.
    • Implement cybersecurity continuous improvement programs.
    • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
    • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.

    Risk Management and Compliance 20%

    • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
    • Improve the automation of security controls.
    • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
    • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
    • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
    • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
    • Manage internal and external audits as required with relation to cybersecurity.
    • Maintain documentation for cybersecurity-related risks, processes and findings.

    QMS and Documentation 10%

    • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
    • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
    • Proactively keep stakeholders updated on status, progress, risks and problems.
    • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
    • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
    • Maintain cybersecurity documents and records in line with certification requirements.
    • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.

    This job description is not a definitive or exhaustive list of responsibilities and is subject to change depending on changing business requirements. Employees will be consulted on any changes. Employee’s performance will be reviewed based on the agreed upon objectives . #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Security Engineer

    Gauteng, Gauteng hearX

    Posted 15 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Pretoria - 2 days work-from-home in line with Company Policy (only applicable after probation is successfully passed).

    Job Purpose:

    Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

    As our IT Security Engineer, you'll support us by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect our systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

    Minimum education (essential):
    Engineering degree (Computer, Software, Mechanical or Electronic

    Minimum education (desirable):
    • OSCP (Offensive Security Certified Professional)
    • PNPT (Practical Network Penetration Tester)
    • CISSP (Certified Information Systems Security Professional)
    • CCSP (Certified Cloud Security Practitioner)
    Minimum applicable experience (years):
    AWS' ecosystem:
    • AWS Well Architected Framework
    • Trusted Advisor
    • GuardDuty / SCP / SSM / IAM / WAF
    • Container services such as ECS/EKS
    • Incident detection and response management.
    • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
    • Drafting and implementing security policies, security procedures, security design and implementation.

    The following would be advantageous:

    • ISO 14971 (risk management) compliance
    • ISO 27032 (cybersecurity) compliance
    • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)

    Skills and Knowledge (essential):

    • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
    • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
    • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
    • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
    • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
    • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
    • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.
    Cybersecurity Management 40%
    • Drive development standards and processes related to cybersecurity compliance.
    • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
    • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
    • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
    • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
    • Identify, implement and maintain all security tools and technology.
    • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
    • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
    • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.
    Infrastructure Management 30%
    • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
    • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
    • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
    • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
    • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
    • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that
    • the IT team follows the requirements set in line with cybersecurity standards.
    • Implement cybersecurity continuous improvement programs.
    • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
    • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.
    Risk Management and Compliance 20%
    • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
    • Improve the automation of security controls.
    • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
    • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
    • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
    • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
    • Manage internal and external audits as required with relation to cybersecurity.
    • Maintain documentation for cybersecurity-related risks, processes and findings.
    QMS and Documentation 10%
    • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
    • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
    • Proactively keep stakeholders updated on status, progress, risks and problems.
    • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
    • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
    • Maintain cybersecurity documents and records in line with certification requirements.
    • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referencedfrom a single central source from which to direct the readers to the appropriate resources.
    This job description is not a definitive or exhaustive list of responsibilities and is subject to change depending on changing business requirements. Employees will be consulted on any changes. Employee’s performance will be reviewed based on the agreed upon objectives .
    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Security Engineer

    Pretoria, Gauteng wePlace

    Posted 7 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Job Purpose:

    Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company.

    As the IT Security Engineer, you'll support the company by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect their systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

    Minimum education (essential):
    Engineering degree (Computer, Software, Mechanical or Electronic

    Minimum education (desirable):

    • OSCP (Offensive Security Certified Professional)
    • PNPT (Practical Network Penetration Tester)
    • CISSP (Certified Information Systems Security Professional)
    • CCSP (Certified Cloud Security Practitioner)
    Minimum applicable experience (years):
    AWS' ecosystem:

    • AWS Well Architected Framework
    • Trusted Advisor
    • GuardDuty / SCP / SSM / IAM / WAF
    • Container services such as ECS/EKS
    • Incident detection and response management.
    • Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments.
    • Drafting and implementing security policies, security procedures, security design and implementation.
    The following would be advantageous:

    • ISO 14971 (risk management) compliance
    • ISO 27032 (cybersecurity) compliance
    • SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)
    Skills and Knowledge (essential):

    • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
    • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
    • Understanding of the following: Linux/Windows server and application administration and configuration, networking, scripting and automation, large scale distributed computing architecture.
    • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic and Threat Hunting).
    • Understanding of AWS ECS & Kubernetes and Containerisation (Docker/Podman/Containerd) with implementation, support, and design.
    • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
    • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.
    Cybersecurity Management 40%

    • Drive development standards and processes related to cybersecurity compliance.
    • Monitor all cybersecurity processes, operations and infrastructure, monitoring internal and external policy and regulatory compliance.
    • Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation.
    • Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust).
    • Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective.
    • Identify, implement and maintain all security tools and technology.
    • Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements.
    • Schedule annual Penetration Tests with external supplier(s) and ensure implementation of items identified in remediation plans.
    • Complete required cybersecurity applications and records for large customers and audits, including reporting as required.
    Infrastructure Management 30%

    • Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required.
    • Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs.
    • Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration.
    • Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement.
    • Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure.
    • Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that the IT team follows the requirements set in line with cybersecurity standards.
    • Implement cybersecurity continuous improvement programs.
    • Crisis management - keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures.
    • Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.
    Risk Management and Compliance 20%

    • Collaborate with divisional the RAQA team and Senior ManagersManagerst to define and centralize risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective.
    • Improve the automation of security controls.
    • Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning.
    • Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice.
    • Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times.
    • Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future.
    • Manage internal and external audits as required with relation to cybersecurity.
    • Maintain documentation for cybersecurity-related risks, processes and findings.
    QMS and Documentation 10%

    • Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar.
    • Work closely with the Compliance team to gather and submit evidence for all security and IT audits.
    • Proactively keep stakeholders updated on status, progress, risks and problems.
    • Review and approve documented outcomes of Penetration Tests, Remediation Plans and required activities.
    • Review and approve documented outcomes of Vulnerability Scans, Remediation Plans and required activities.
    • Maintain cybersecurity documents and records in line with certification requirements.
    • Maintain document bank and matrix for the cybersecurity setup and external customer-audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.
    2 days work-from-home in line with Company Policy (only applicable after probation is successfully passed).


    Should you not receive a response from us within one week of your application, your application has unfortunately not been successful.

    This advertiser has chosen not to accept applicants from your region.

    Security Engineer

    Goldman Tech Resourcing

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Join a dynamic digital experience agency that blends storytelling, strategy, and technology to create meaningful brand journeys. This forward-thinking company partners with leading organizations to craft engaging digital products and experiences combining creative insight with user-centric design and innovative development. Our client is currently looking for a S ecurity Engineer to join their team. Requirements: · Experience: 37 years · Proficient in cybersecurity frameworks (NIST, ISO 27001) and security best practices for remote workforces · Experience with endpoint protection solutions, anti-virus management, and device security · Strong understanding of email security, phishing detection, and threat analysis · Knowledge of secure software development lifecycle (SSDLC) and DevSecOps practices · Familiarity with static application security testing (SAST) and dynamic application security testing (DAST) · Experience with log analysis, SIEM tools, and security monitoring platforms · Understanding of data protection regulations (POPIA, GDPR) and compliance frameworks · Strong knowledge of encryption standards, access controls, and identity management · Excellent communication skills and ability to deliver security training to diverse audiences Preferred Skills: · Professional certifications such as CISSP, CISM, CEH, or Security · Experience with Google Workspace security administration and controls · Familiarity with cloud security platforms and tools (Google, AWS, Azure & GitHub) · Knowledge of business continuity planning and disaster recovery procedures · Experience with vulnerability assessment and penetration testing Should you meet the requirements for this position, please email your CV to . You can also contact the team on XXX-XXX or alternatively you can visit our website Should you not hear from us within 3 days, please consider your application unsuccessful.
    This advertiser has chosen not to accept applicants from your region.

    Security Engineer

    Western Cape, Western Cape Goldman Tech Resourcing

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Join a dynamic digital experience agency that blends storytelling, strategy, and technology to create meaningful brand journeys. This forward-thinking company partners with leading organizations to craft engaging digital products and experiences combining creative insight with user-centric design and innovative development. Our client is currently looking for a S ecurity Engineer to join their team. Requirements: · Experience: 37 years · Proficient in cybersecurity frameworks (NIST, ISO 27001) and security best practices for remote workforces · Experience with endpoint protection solutions, anti-virus management, and device security · Strong understanding of email security, phishing detection, and threat analysis · Knowledge of secure software development lifecycle (SSDLC) and DevSecOps practices · Familiarity with static application security testing (SAST) and dynamic application security testing (DAST) · Experience with log analysis, SIEM tools, and security monitoring platforms · Understanding of data protection regulations (POPIA, GDPR) and compliance frameworks · Strong knowledge of encryption standards, access controls, and identity management · Excellent communication skills and ability to deliver security training to diverse audiences Preferred Skills: · Professional certifications such as CISSP, CISM, CEH, or Security · Experience with Google Workspace security administration and controls · Familiarity with cloud security platforms and tools (Google, AWS, Azure & GitHub) · Knowledge of business continuity planning and disaster recovery procedures · Experience with vulnerability assessment and penetration testing Should you meet the requirements for this position, please email your CV to . You can also contact the team on XXX-XXX or alternatively you can visit our website Should you not hear from us within 3 days, please consider your application unsuccessful.
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Security engineer Jobs in South Africa !

    Security Engineer

    Iqtalent

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Restream is looking for a talented Security Engineer to join us to solve complex challenges and build world-class products. In this role, you will conduct architecture security reviews, application testing, penetration testing, and work with the engineering team, security researchers, and third-party vendors to ensure the security of our systems as we rapidly scale our product and organization. You understand the importance of simplicity and reliability, and you calculate the impact of every decision on each. We believe in small teams where each member contributes significant value.

    What You’ll Do

    • Perform application and penetration testing.
    • Work with engineers to analyze systems, threat model new features, and create responsive controls to ensure end-to-end customer protection.
    • Work with third-party vendors to perform annual application and penetration testing reports.
    • Maintain, and grow our private bug bounty program; lead the transition to a public bug bounty program.
    • Give and receive code review feedback from the team.
    • Maintain a pulse on emerging technologies and discover hidden opportunities in our environment.
    • Ensure security and resilience of Restream production infrastructure.

    What We Look For

    • A scrappy, entrepreneurial attitude that gets high-quality projects done quickly.
    • Solid knowledge of web applications vulnerabilities and attack vectors.
    • Experience manually testing web applications, performing penetration testing, and using automated tools for reconnaissance and discovery.
    • Experience with scripting languages and at least one general-purpose programming language. Node.JS (TypeScript) or Rust would be a plus but are not a requirement.
    • Strong written and verbal communication skills.
    • Self-directed, analytical, and work well in a team environment.
    • Passionate about keeping Restream customers and employees safe online.

    Restream is the #1 solution for creating professional live videos and streaming them to all social networks at once. Millions of people around the world use Restream to reach, engage, and monetize their audiences. We’re a small and diverse group of dreamers who make technology work for the world. We believe that a small but highly driven and focused team can make a lasting impact in any area.

    What We Offer

    • Startup environment and a flat company structure.
    • Work closely with founders and team to build and grow the product.
    • Direct influence and impact on the direction of the product and development.
    • The ability to create something that influences people’s lives.
    • Competitive pay and equity packages for you to truly be a part of the Restream journey.
    • Flexible paid time off.
    • The tech you need to get your job done.
    #J-18808-Ljbffr

    This advertiser has chosen not to accept applicants from your region.

    Network Security Engineer

    Gauteng, Gauteng GMI Tech (ZA)

    Posted 5 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Bachelors degree /Diploma or equivalent experience

    3+ years of IT experience

    1+ years of hands-on web application penetration testing / ethical hacking experience

    The Purpose of Your Role

    Lead testing efforts on web and mobile applications and supporting systems.

    Replicate the actual techniques and tools used by malicious attackers in an effort to model potential external threats.

    Upon completion of the assessment, you will prepare reports and present the results to application owners, developers, and business unit information security teams.

    Analyse test results, draw conclusions from results, and develop targeted exploit examples.

    Consult with operations and software - development teams to ensure potential weaknesses are addressed.

    Contribute to the research or development of tools to assist in the vulnerability discovery process.

    Identify threats to improve the overall security of applications and infrastructure.

    Recommend solutions to help migitate risks and protect entire network i.e. Architect security solution


    Skills:

    Ability to demonstrate manual testing experience including all of OWASP

    Working knowledge of application security mechanisms such as authentication and authorization techniques, data validation, and the proper use of encryption

    Technical knowledge of, and the ability to recognize, various types of application security vulnerabilities

    Demonstrated experience with common penetration testing and vulnerability assessment tools such as nmap, Wireshark, Nessus, NeXpose, Kali, Metasploit, AppScan, WebInspect, Burp Suite Professional, Acunetix, Arachni, w3af, NTOSpider

    Knowledge of a programming or scripting language such a C, C#, Python, Objective C, Java, Javascript, SQL,

    Knowledge of Web Services technologies such as XML, JSON, SOAP, REST, and AJAX

    Knowledge of web frameworks, including XML, SOAP, J2EE, JSON and Ajax

    Experience with Enterprise Java or .NET web application frameworks, including Struts and Spring

    Proven analytical and problem solving skills, as well as the desire to assist others in solving issues

    Excellent interpersonal skills with a strong interest in the application security domain

    Excellent communication and presentation skills and a proven ability to communicate threats and facilitate progress towards long-term remediation

    Highly motivated with the willingness to take ownership / responsibility for their work and the ability to work alone or as part of a team.

    Ability to produce high level reports

    Preferred Skills and competencies:
    A+, N+, S+, CCNA
    Vulnerability Scanning

    Vulnerability Assessment

    Valid Certified Ethical Hacker Certificate

    Certified Penetration Testing Professional/ OR CISA/CISM/SISSP AND CISSP certification.

    NB! CV FORMAT MUST BE PDF

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Network Security Engineer

    Johannesburg, Gauteng Impronics Technologies

    Posted 8 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Main responsibility.

    • Network Security Design & Implementation:

    Design, implement, and maintain network security architectures, ensuring the protection of bank's systems, data, and assets against unauthorized access, cyber threats, and attacks.

    • Firewall & Intrusion Detection:

    Configure and manage firewalls, VPNs, and other security appliances (IDS/IPS) to detect and prevent potential security breaches.

    • Threat Monitoring & Incident Response:

    Continuously monitor network traffic for suspicious activity, security breaches, and vulnerabilities. Lead incident response efforts to mitigate risks and minimize damage in case of a breach.

    • Security Audits & Risk Assessments:

    Conduct regular security audits, vulnerability assessments, and penetration testing to identify weaknesses in the network and ensure compliance with internal and regulatory standards.

    • Security Tools & Automation:

    Utilize security tools (SIEM, firewall management systems, vulnerability scanners, etc.) and automation techniques to enhance security posture and streamline incident response processes.

    Job Requirements Academic Knowledge

    Bachelor's degree in Computer Science, Information Security, or related field. Relevant certifications (e.g., CISSP, CISM, CCNP Security) are preferred.

    Work Experience

    Minimum of 3-5 years of experience in network security or IT security, ideally in a banking or financial services environment.

    Skills / Specialized Know How

    • Strong understanding of network protocols, including TCP/IP, DNS, DHCP, and HTTP.
    • Hands-on experience with firewalls (Palo Alto, Cisco ASA, Fortinet, etc.), VPN technologies, and IDS/IPS.
    • Experience with network security tools such as SIEM, vulnerability scanners (Nessus, Qualys), and penetration testing tools.
    • Familiarity with cloud security architectures and hybrid environments (AWS, Azure).
    • Knowledge of industry standards and best practices (NIST, ISO 27001, PCI DSS).
    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Security Engineer Jobs