165 Security Expert jobs in South Africa
Compliance and Data Security Expert (Contractor)
Posted 13 days ago
Job Viewed
Job Description
Kempton Park, South Africa | Posted on 03/20/2025
MUSE is a consulting company, specialising in resourcing, recruitment and outsourcing of software development teams.
MUSE was founded and is run by experienced developers who are passionate about technology and innovation. We have a vision to be the best in the industry and to provide software development skills that are cutting-edge and high-quality.
We work with some of the leading companies in South Africa and we help them build software products and solutions that are game-changing and future-oriented. We are also at the forefront of applying AI, AR and Machine-Learning concepts to real-world problems.
Our main goal is to help our clients get the most value from their technology investments. We do this by understanding their needs and providing them with the best talent available. We aim to be a vital part of the SDLC.
Job DescriptionThe Compliance and Data Security Expert will be responsible for developing, implementing, and maintaining a robust compliance and data security program. This role requires a deep understanding of relevant regulations, industry best practices, and security technologies. The ideal candidate will be a proactive problem solver with excellent communication skills and a passion for ensuring the confidentiality, integrity, and availability of our data.
Responsibilities:
- Develop and maintain policies and procedures to ensure compliance with relevant regulations (e.g., POPIA, GDPR, ISO 27001, industry-specific regulations).
- Conduct regular compliance audits and risk assessments.
- Monitor and report on compliance status.
- Stay up-to-date with changes in regulations and industry standards.
- Provide guidance and training to employees on compliance requirements.
- Develop and implement data security policies and procedures.
- Conduct security risk assessments and vulnerability scans.
- Implement and manage security controls (e.g., access control, encryption, intrusion detection).
- Monitor and respond to security incidents.
- Manage data loss prevention and data backup/recovery processes.
- Implement and maintain data governance frameworks.
- Identify and assess potential compliance and security risks.
- Develop and implement risk mitigation strategies.
- Maintain a risk register.
- Conduct business impact analysis.
- Develop and maintain an incident response plan.
- Lead incident response activities.
- Communicate effectively with stakeholders on compliance and security matters.
- Provide regular reports to management.
- Liaise with external auditors and regulatory bodies.
Qualifications and Skills:
- Bachelor's degree in Computer Science, Information Security, Law, or a related field (or equivalent experience).
- Relevant certifications (e.g., CISSP, CISM, CISA, CDPO/DPO).
- Proven experience in compliance and data security management.
- Deep understanding of relevant regulations (POPIA, GDPR, ISO 27001, etc.).
- Experience with security risk assessments and vulnerability scanning.
- Knowledge of security technologies and best practices.
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Experience with data governance frameworks.
- Experience with cloud security.
Desired Attributes:
- Proactive and detail-oriented.
- Strong ethical principles.
- Ability to manage multiple priorities.
Compliance and data security expert (contractor)
Posted today
Job Viewed
Job Description
Data Manager & Security Expert – Azure SQL & API Infrastructure
Posted 25 days ago
Job Viewed
Job Description
Location: Remote or Hybrid
Employment Type: Full-Time
Industry: Cloud Infrastructure | Data Security | SaaS
WatersEdge Solutions is seeking a technically skilled and security-focused Data Manager & Security Expert with deep expertise in Azure SQL database management and API development. This role is ideal for someone with a strong foundation in data governance, access control, and system integration, who thrives in a high-ownership environment where data accuracy and protection are paramount.
About the Role
You’ll oversee the full lifecycle of Azure-hosted SQL databases—ensuring high availability, integrity, performance, and security. This includes API design and management, robust access control policies, and implementation of proactive monitoring and disaster recovery protocols. You'll be instrumental in both backend infrastructure and cross-functional collaboration to uphold the organization’s data strategy.
Key Responsibilities
Design, configure, and manage Azure SQL databases for optimal performance and availability
Enforce data accuracy and governance across all environments
Implement encryption, auditing, and threat detection for comprehensive data security
Configure and maintain Azure IAM and RBAC access policies
Develop and manage secure RESTful APIs for seamless data integration
Optimize database performance and resolve bottlenecks through query tuning and indexing
Execute robust backup and recovery plans for critical data assets
Set up real-time monitoring and alerting for performance and security events
Troubleshoot complex technical issues involving data pipelines, security, or APIs
Maintain detailed documentation for architecture, security standards, and operational procedures
What You’ll Bring
Minimum 2 years of experience with Microsoft SQL Server, including Azure SQL Database
Hands-on expertise in Azure access controls (IAM, RBAC) and platform management
Strong command of data security protocols including encryption, auditing, and risk mitigation
Proven experience with data governance and quality assurance processes
Solid track record in developing and managing secure APIs (OAuth, API keys)
Proficiency in T-SQL for scripting, automation, and management
Experience using PowerShell or Azure CLI for infrastructure tasks
Strong problem-solving skills and attention to detail
Effective verbal and written communication skills
Nice to Have
Azure Database Administrator Associate (DP-300) certification
Experience with Azure Data Factory, Azure Synapse Analytics, or other Azure data services
Knowledge of Infrastructure as Code tools (ARM templates, Terraform)
Familiarity with CI/CD pipelines for database and API deployments
What’s On Offer
A high-impact role with responsibility for mission-critical data systems
Remote-friendly environment with flexible collaboration
Career growth within a technically advanced, cloud-first team
Competitive compensation and professional development support
Company Culture
At WatersEdge Solutions, we bring together data integrity, innovation, and secure design. We believe in building resilient infrastructure and empowering our team to solve meaningful problems with autonomy and purpose.
If you have not been contacted within 10 working days, please consider your application unsuccessful.
Information Security Management System (ISMS) Specialist
Posted 13 days ago
Job Viewed
Job Description
Join to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Information Security Management System (ISMS) SpecialistJoin to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist is responsible for the end-to-end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO/IEC 27001 standards. The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development And Implementation
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls into third-party contracts and SLAs.
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuring the organization’s security posture is robust and aligned with its strategic objectives.
Qualifications, Skills and Experience Required for the Job
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer Preferrable: ISO27001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding the highest ethical standards in all security practices
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Transportation, Logistics, Supply Chain and Storage
Referrals increase your chances of interviewing at Vector Logistics by 2x
Sign in to set job alerts for “Information Security Specialist” roles.Johannesburg, Gauteng, South Africa 2 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 3 days ago
Johannesburg, Gauteng, South Africa 1 month ago
Randburg, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Randburg, Gauteng, South Africa 5 days ago
Senior Manager: Information Systems Audit (Cyber Security)Pretoria, Gauteng, South Africa 2 weeks ago
Johannesburg Metropolitan Area 3 days ago
Centurion, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 day ago
Johannesburg, Gauteng, South Africa 6 days ago
Johannesburg, Gauteng, South Africa 5 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Management System (ISMS) Specialist
Posted 13 days ago
Job Viewed
Job Description
Information Security Management System (ISMS) Specialist
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development and Implementation:
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
Risk Assessment and Management:
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
Compliance and Audits:
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
Training and Awareness:
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
Incident Response and Management:
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
Continuous Improvement:
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
Vendor and Third-Party Risk Management:
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls intothird-party contracts and SLAs.
Key Relationships
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.
Qualifications, Skills and Experience Required for the Job
Qualifications and Experience
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer
Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
Skills and Competencies
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices
We look forward to hearing from you!
#J-18808-LjbffrInformation security management system (isms) specialist
Posted today
Job Viewed
Job Description
Information security management system (isms) specialist
Posted today
Job Viewed
Job Description
Be The First To Know
About the latest Security expert Jobs in South Africa !
Application and Security Management Analyst
Posted 4 days ago
Job Viewed
Job Description
Principal Responsibilities
• Collaborate with technical and business teams to address security flaws and implement remediation plans.
• Oversee application security tasks, ensuring alignment with audit requirements and internal policies.
• Support change and incident management processes, with a focus on high-priority incidents (P1 & P2).
• Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance.
• Act as a liaison with internal stakeholders to ensure clear communication and quality engagements.
• Support governance and administrative functions, including audit preparation and policy development.
• Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics.
Required Key Skills (Functional/Technical)
Application Security & Vulnerability Management
• Familiarity with Common Vulnerability Scoring System (CVSS)
• Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM)
• Track and assist in the closure of identified vulnerabilities, working closely with IT and Development teams
• Review and maintain secure configurations for systems, applications, and network devices
Security Fundamentals
• Working knowledge of encryption, authentication, and secure data transmission
• Knowledge of network security principles and firewall configurations
• Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory
• Experience with CyberArk PAM for privileged access management
Security Information and Event Management (SIEM)
• Use of Splunk SIEM for real-time threat detection and log analysis
• Review and optimise SIEM use cases to enhance threat detection and response capabilities
Monitoring & Endpoint Security
• Experience with Tanium and MS Defender for server and endpoint security management
• Familiarity with IBM Guardium for database activity monitoring
• Exposure to Cyera for data identification and classification
Cloud & Infrastructure Security
• Experience with Wiz.IO for cloud security posture management (CSPM) and IaC scanning
• Understanding of secrets management using AWS Secrets Manager, Azure Key Vault, or GCP Secrets Manager
• Familiarity with Thales and AWS KMS/HSM for key management
Other Tools & Platforms
• Knowledge of SailPoint for identity governance
• Experience with CyCognito for external attack surface management
• Familiarity with Imperva for WAF, DDoS, and botnet protection
• Exposure to ProofPoint and MS Office365 Message Security for email security
• Use of 1Password for credential management
• Awareness of Netwrix for password policy enforcement
About Experian
Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to realize their financial goals and help them save time and money.
We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments.
We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at experianplc.com.
Experience and Skills
- Degree or equivalent qualifications and experience in Computer Science, Information Technology, Data or a related field Technical & Security Experience
- Experience with automated and manual methods for evaluating security controls in both on-prem and cloud environments
- Experience in monitoring and reporting on security flaws and supporting related remediation activities
- Familiarity with change management processes in technology environments Risk, Controls & Compliance
- Contribute to accurate statistical reporting on the market’s IT security posture
- Ensure first line of defence (1LoD) ownership of non-compliance issues, exception justifications, mitigation controls, and risk documentation
- Ensure accuracy and timely completion of control testing and remediations
- Collaborate with Security Partners, RISOs and other governance functions to drive remediation of identified security deficiencies
- Ability to compile management reports and presentations on technical risks, controls, and deficiencies Communication & Collaboration
- Strong ability to communicate complex information clearly and effectively
- Good collaboration, relationship-building, and interpersonal skills
- Act as primary liaison with internal, local and regional stakeholders, ensuring quality engagements and clear progress updates
Additional Information
Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what matters; DEI, work/life balance, development, authenticity, collaboration, wellness, reward & recognition, volunteering. the list goes on. Experian's people first approach is award-winning; World's Best Workplaces 2024 (Fortune Top 25), Great Place To Work in 24 countries, and Glassdoor Best Places to Work 2024 to name a few. Check out Experian Life on social or our Careers Site to understand why.
Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity.
Experian Careers - Creating a better tomorrow together
Find out what its like to work for Experian by clicking here
#J-18808-LjbffrInformation Security Consultant
Posted 19 days ago
Job Viewed
Job Description
Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis.
Responsibilities- Security Auditing
- Responsible for Security tools monitoring
- Network experience (TCP/IP, Firewalls, IPS, NAC)
- Operating System management and Hardening
- Anti-Virus System management and Configuration
- Logical Access Management
- Vulnerability Management
- Matric and an Information Technology diploma or degree qualification
- 4+ years experience in the field
Salary: Market Related
#J-18808-LjbffrInformation security consultant
Posted today
Job Viewed