524 Security Intern jobs in South Africa

Security Operations Manager

Randburg, Gauteng Vodafone

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Join Us

At MAST, we’re not just shaping the future of connectivity for our customers – we’re shaping the future for everyone who joins our team. When you work with us, you’re part of a global mission to connect people, solve complex challenges, and create a sustainable and more inclusive world. If you want to grow your career whilst finding the perfect balance between work and life, MAST offers opportunities to help you belong and make a real impact.

What you’ll do

Role purpose:

The Security Operations Manager will be responsible for coordinating, supervising, and managing all site security operations across MAST sites. This includes ensuring the safety and security of base station transmission infrastructure, assets protection, incident investigation and case management, development and implementation of security standards, policies, and procedures, and managing contracted security service providers and their service level agreements.

Who you are

Key accountabilities:

  • Align MAST Site Security Strategy with business operations and drive security performance to ensure satisfaction and meet objectives.
  • Champion a security culture within MAST sites and serve as the main contact to coordinate security operations, promote security methods, tools, and standards across the organization.
  • Plan, implement, and oversee security and safety initiatives, including joint policing operations, to address and mitigate security risks and improve regional security.
  • Develop a security threat, risk, and vulnerability assessment model to identify and address gaps and non-conformities within MAST sites.
  • Implement best practice security standards, processes, and procedures for effective risk mitigation and continuous improvement.
  • Enhance incident investigation and case management by conducting root cause analyses and implementing corrective security measures.
  • Develop the annual security operations plan (AOP) and prepare the necessary CAPEX and OPEX budgets for efficient security management.
  • Contribute to and improve integrated dashboard reporting to provide management with visibility for decision-making.

Core competencies, knowledge, and experience:

  • Experience in conducting security risk assessments and developing site security profiles.
  • Security project management skills.
  • Excellent communication, engagement, strategic, and analytical skills.
  • Strong interpersonal skills and experience in networking and stakeholder collaboration.
  • Experience managing performance and service level agreements with security service providers.
  • Knowledge of and ability to implement the Critical Infrastructure Protection Act (CIPA), Minimum Physical Security Standards (MPSS), and other relevant security regulations and policies.

Must-have technical/professional qualifications:

  • A three-year National Diploma or Degree in Security Risk Management or an equivalent qualification.
  • Minimum of 8+ years of experience in the security field, including at least 2 years in a supervisory or management role.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Engineer

Western Cape, Western Cape Canonical

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Canonical Cape Town, Western Cape, South Africa

We have opened several senior/staff Security Operations Engineer (SOC) positions, creating a new team reporting to the CISO. We are looking for a range of experience in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest an engagement in cyber attack and defence, and outstanding academic and career performance even if experience is limited.

Our goal is to build an entirely new level of assurance and observable rigour into the open source supply chain. We have our own estate to monitor, but more broadly our goal is to raise the robustness of the entire global Ubuntu estate through the work of this team.

The Security Operations (SecOps) team is responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.

The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.

What you will do in this role:

  • Implement and evolve Canonical's Security Operation Center
  • Analyse and improve Canonical's security architecture
  • Evaluate, select and implement new security tools and practices
  • Identify, contain and guide the remediation of security threats and cyber attacks
  • Grow the presence and thought leadership of Canonical SecOps practice
  • Contribute to open source threat intelligence initiatives
  • Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
  • Develop Canonical SecOps learning and development materials
  • Publish blog posts, whitepapers and conference presentations
  • Identify, implement and track SecOps KPIs
  • Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
  • Work with Security leadership to present information and influence change

What we are looking for

  • An exceptional academic track record
  • Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
  • Previous professional experience working or leading a Security Operation Center
  • Deep personal motivation to be at the forefront of technology security
  • Expertise in threat modelling and risk management frameworks
  • Knowledge of security architecture and market-leading security tools
  • Experience contributing to, and consuming, threat intelligence feeds
  • Experience in security risk management frameworks such as NIST CSF and ISO27001

Optional things we value

  • Experience in a security operations team or a security operations centre (SOC)
  • Experience in offensive or defensive security teams with hands-on ability
  • Experience with state-actor and other advanced persistent threats

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Cape Town, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 3 months ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 3 weeks ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Head of Security Operations

Cape Town, Western Cape Canonical

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Canonical Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Head of Security Operations role at Canonical

Canonical Cape Town, Western Cape, South Africa

Join to apply for the Head of Security Operations role at Canonical

This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.

As a leader on cyber security in the company, the SecOps team manager will collaborate with our Organisational Learning and Development team to develop playbooks and facilitate SecOps training across Canonical. They will operate in a wider security organisation, run a high performing security team and improve Canonical's security posture. They will lead initiatives to integrate the team's insights into Canonical's broader software development process.

While this is a management position, we expect managers to be expert practitioners, able to lead by example, contribute at the highest level, and assess work based on their own professional experience and skill. Candidates should have deep, hands-on expertise with a range of open source and proprietary security tooling and practices, which they can integrate into a holistic next generation security solution across the breadth of Canonical's interests.

The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.

This role reports to the CISO.

What you will do in this role:

  • Hire and mentor a team of outstanding technical security professionals
  • Define Canonical's SecOps security standards and playbooks
  • Own and drive the architecture and design of the SOC
  • Analyse and improve Canonical's security architecture
  • Evaluate, select and implement new security tools and practices
  • Identify, contain and guide the remediation of security threats and cyber attacks
  • Grow the presence and thought leadership of Canonical SecOps practice
  • Contribute to open source threat intelligence initiatives
  • Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
  • Develop Canonical SecOps learning and development materials
  • Publish blog posts, whitepapers and conference presentations
  • Identify, implement and track SecOps KPIs
  • Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
  • Work with Security leadership to present information and influence change

What we are looking for

  • Proven track record of mitigating with advanced threat actors and nation state threats
  • Expert technical understanding of SOCs from the ground up
  • In depth knowledge of SOC architecture and design including strategies for logging, firewalls, network segmentation, honeypots etc
  • Someone who understands how the SOC works not just how to use it
  • Expert in Linux security
  • Ability to define, implement, automate and measure effective incident response playbooks
  • Knowledge of security architecture and market-leading security tools
  • Experience contributing to, and consuming, threat intelligence feeds
  • Experience in security risk management frameworks such as NIST CSF
  • An exceptional academic track record from both high school and university
  • Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
  • Drive and a track record of going above-and-beyond expectations
  • Deep personal motivation to be at the forefront of technology security
  • Leadership and management ability
  • Excellent business English writing and presentation skills
  • Confidence to report security performance metrics with accountability for accuracy and completeness

Optional things we value

  • Experience in offensive or defensive security teams with hands-on ability
  • Experience with open source security tools
  • Experience with security standards such as ISO 27001
  • Experience with security posture management of corporate endpoitns

Seniority level
  • Seniority level Director
Employment type
  • Employment type Full-time
Job function
  • Job function Other, Information Technology, and Management
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Sign in to set job alerts for “Head of Security” roles.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Operations Center Analyst

Iqtalent

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Security Operations Center Analyst

Job Overview:

We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our dynamic cybersecurity team. The ideal candidate will have a strong background in information security, incident response, and threat detection. As a SOC Analyst, you will play a crucial role in monitoring, analyzing, and responding to security incidents to safeguard our organization’s assets and information.

Responsibilities:

Incident Monitoring and Response:

  • Monitor security alerts and events from various sources, including security information and event management (SIEM) systems.
  • Investigate and respond to security incidents promptly and effectively.
  • Conduct thorough analysis of security events and incidents to identify potential threats and vulnerabilities.

Threat Detection:

  • Utilize advanced threat intelligence to proactively identify and mitigate potential security risks.
  • Stay informed about the latest security threats, vulnerabilities, and industry best practices.
  • Develop and implement detection rules and signatures to enhance threat detection capabilities.

Security Operations:

  • Collaborate with other IT and security teams to ensure the timely resolution of security incidents.
  • Work closely with incident response teams to contain and eradicate security threats.
  • Document and maintain incident response procedures and guidelines.

Log Analysis and Reporting:

  • Analyze security logs to identify patterns, trends, and anomalies.
  • Generate regular reports on security incidents, trends, and analysis for management review.

Vulnerability Management:

  • Assist in vulnerability assessments and penetration testing activities.
  • Provide recommendations for remediation of identified vulnerabilities.

Continuous Improvement:

  • Participate in regular security awareness training and continuous professional development.
  • Contribute to the enhancement of SOC processes, procedures, and technologies.

Qualifications:

  • Bachelor’s degree in Information Security, Cybersecurity, Computer Science, or a related field.
  • Proven experience as a SOC Analyst or in a similar cybersecurity role.
  • In-depth knowledge of cybersecurity principles, technologies, and best practices.
  • Hands-on experience with SIEM tools, intrusion detection systems, and other security technologies.
  • Certifications such as CISSP, CompTIA Security+, or GIAC are highly desirable.
  • Strong analytical and problem-solving skills.

Benefits:

  • Competitive salary and benefits package.
  • Opportunities for professional development and training.
  • Collaborative and innovative work environment.

If you are a passionate and experienced SOC Analyst ready to contribute to the security posture of our organization, we encourage you to apply. Join us in defending against cyber threats and ensuring the resilience of our information assets.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security operations center analyst

Iqtalent

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Security Operations Center Analyst Job Overview: We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our dynamic cybersecurity team. The ideal candidate will have a strong background in information security, incident response, and threat detection. As a SOC Analyst, you will play a crucial role in monitoring, analyzing, and responding to security incidents to safeguard our organization’s assets and information. Responsibilities: Incident Monitoring and Response: Monitor security alerts and events from various sources, including security information and event management (SIEM) systems. Investigate and respond to security incidents promptly and effectively. Conduct thorough analysis of security events and incidents to identify potential threats and vulnerabilities. Threat Detection: Utilize advanced threat intelligence to proactively identify and mitigate potential security risks. Stay informed about the latest security threats, vulnerabilities, and industry best practices. Develop and implement detection rules and signatures to enhance threat detection capabilities. Security Operations: Collaborate with other IT and security teams to ensure the timely resolution of security incidents. Work closely with incident response teams to contain and eradicate security threats. Document and maintain incident response procedures and guidelines. Log Analysis and Reporting: Analyze security logs to identify patterns, trends, and anomalies. Generate regular reports on security incidents, trends, and analysis for management review. Vulnerability Management: Assist in vulnerability assessments and penetration testing activities. Provide recommendations for remediation of identified vulnerabilities. Continuous Improvement: Participate in regular security awareness training and continuous professional development. Contribute to the enhancement of SOC processes, procedures, and technologies. Qualifications: Bachelor’s degree in Information Security, Cybersecurity, Computer Science, or a related field. Proven experience as a SOC Analyst or in a similar cybersecurity role. In-depth knowledge of cybersecurity principles, technologies, and best practices. Hands-on experience with SIEM tools, intrusion detection systems, and other security technologies. Certifications such as CISSP, Comp TIA Security+, or GIAC are highly desirable. Strong analytical and problem-solving skills. Benefits: Competitive salary and benefits package. Opportunities for professional development and training. Collaborative and innovative work environment. If you are a passionate and experienced SOC Analyst ready to contribute to the security posture of our organization, we encourage you to apply. Join us in defending against cyber threats and ensuring the resilience of our information assets. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

DevSecOps / Security Operations Engineer

7780 Crawford, Western Cape Parvana

Posted today

Job Viewed

Tap Again To Close

Job Description

Permanent
About our client: Our client is a global investment advisory firm focusing on long-term value creation through investment strategies. They work with a diverse group of institutional partners and pride themselves on their collaborative, sustainable, inclusive culture and performance.What you will be doing: Manage day-to-day operations, including support tickets, tasks, and procedures, within the operational security team.Participate in daily information security operations, including incident investigation, security tool monitoring and investigation, and escalation management from the managed SOC and threat feed monitoring.Provide security posture inputs to ensure the correct application of control requirements and technologies and support and escalation for operational security issues.Configure and operate security tools, including endpoint detection and response tools, secure web gateway tooling, and user entity and behavioral analytics.Collaborate with technical teams to implement technical security standards that apply industry best practices while considering risk appetite and needs.Provide technical security advice for projects and changes, including designing technical controls, reviewing business process controls, and contributing to secure software development lifecycle standards.Research emerging threats and vulnerabilities to aid incident identification and support the creation of new architecture, policies, standards, and technologies to address them.What our client is looking for: Holds relevant Microsoft or SANS security certifications.Strong hands-on experience with security technologies, including monitoring, detection, prevention, and control systems.Skilled in secure software development lifecycles (DevSecOps) and data governance best practices.Strong involvement in securing CI/CD pipelines using DevSecOps principles.Proficient in Microsoft security tools (Azure, M365) and frameworks like OWASP Top 10, SANS Top 20, and MITRE ATT&CK.Working knowledge of ISO 27001:2022 and its practical business application.Well-versed in GDPR, cross-border regulations, and compliance demands in financial services.Committed to high ethical standards, regulatory alignment, and business integrity.Experienced in implementing and managing incident response plans.Comfortable in structured, service-oriented security environments.Works closely with technical teams to roll out and maintain effective security measures.Strong problem-solving and troubleshooting skills.Capable of both deep-dive analysis and high-level threat assessment.Continuously tracks and adapts to evolving threat actor tactics and mitigation strategies.Job ID: J107015For a more comprehensive list of opportunities that we have on offer, do visit our website - Security Operations, Incident Response, Azure, M365, EDR, SIEM, CI/CD, ISO 27001, OWASP, MITRE ATT&CK, Risk Management, Compliance, Financial Services
This advertiser has chosen not to accept applicants from your region.

Security Operations Centre Analyst II

Randburg, Gauteng FirstRand Bank Limited

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Description

Hello Future SOC Analyst II

Welcome to FNB, the home of the #changeables. We design for the shapeshifters and deliver products and services that make us incredibly proud of people that make it happen.

As part of our talent team, you will be surrounded by unique talents, diverse minds, and an adaptable environment that lives up to the promise of staying curious. Now’s the time to imagine your potential in a team where experts come together and ignite effective change.

Overview of the role and requirements :

  • To protect the organization by pro-actively monitoring for Cyber Security Events.This includes the Identification, Analysis, Triage and Response
  • Administer and Configure Policies on FNB’s Security Products.
  • Guidance of L1 SOC Analyst’s

What you will need :

  • Minimum 2 years’ experience in a SOC Analyst Role (SOC operations experience)
  • Security Product Knowledge
  • Cisco Products (AMP, Stealthwatch)
  • Microsoft Products (Azure, ATA and ATP, BitDefender)
  • Understanding of common network services (web, mail, DNS, authentication)
  • Knowledge of host-based firewalls, Anti-Malware
  • General Desktop OS and Server OS knowledge
  • TCP / IP, Internet Routing, UNIX / LINUX & Windows
  • Understanding of modern malware threats
  • SANS Knowledge
  • Familiarity with system log information and what it means
  • Threat Intelligence Research
  • You will be responsible for :

    Incident Monitoring and Response

  • Review and analyse all alerts and respond according to prescribed processes
  • Guidance of L1 SOC Analysts
  • Create incidents in our change management system for other teams to take remediation actions when required.
  • Remediation Recommendations

  • Provide mitigation recommendations for each identified security incident where applicable
  • Based on the types of alerts and actions being taken identify root causes and recommend ways to improve the protection capabilities of the organization (e.g. upload malicious URL to tools to security controls, and manage indicators of compromise)
  • Case Management

  • Update the alert / case information with closure information (All fields that are required to be updated when the alert / case is closed)
  • Reporting

  • Run, Analyse and Interpret reports on different platforms.
  • Manage and Administer Technical Controls

  • Create, configure and deploy policies and signatures on technical security controls
  • Perform Threat Hunts

  • Document the outcome of the hunt with recommendation if any IOC’s picked up.
  • Oversight of Level 1 SOC Analysts

  • Assisting L1’s during investigations and review the recommendations made
  • Guiding and Mentoring of Level 1 SOC Analysts
  • Participate in Cyber Security War Rooms (P1 and P2 Incidents)

    Responsible for logging changes to update the security products to pro-actively block potentially malicious actions (e.g. URL’s, phishing emails, etc)

    Playbooks

  • Feedback into the Detection Engineering team around tuning of playbooks or input into potential new playbooks
  • We can be a match if you have :

  • Bachelor's Degree in Technical Field (Computer Science / Computer Security / Computer Networking)
  • Enterprise Security Product Certification
  • Analysis and Attention to Detail
  • Problem Solving
  • Time and Self-Management
  • Knowledge Sharing
  • Drive and Results Orientated
  • Teamwork
  • Self-motivated with ability to work without supervision
  • Outcomes Driven (“Can Do” Attitude)
  • You will have access to :

  • Opportunities to network and collaborate.
  • Challenging Work.
  • Opportunities to innovate.
  • Post

    LI-NN2

    Are you interested to take the step? We look forward to engaging with you further. Apply now!

    Job Details

    Take note that applications will not be accepted on the below date and onwards, kindly submit applications ahead of the closing date indicated below.

    28 / 08 / 25

    All appointments will be made in line with FirstRand Group’s Employment Equity plan. The Bank supports the recruitment and advancement of individuals with disabilities. In order for us to fulfill this purpose, candidates can disclose their disability information on a voluntary basis. The Bank will keep this information confidential unless we are required by law to disclose this information to other parties.

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Security intern Jobs in South Africa !

    Cyber Security Consultant - Operations

    Cape Town, Western Cape Xcede Group

    Posted 19 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Cyber Security Specialist

    My client in the financial industry is looking for a Cyber Security Specialist.

    The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.

    What will you be responsible for?

    On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of:

    • Anti-Virus Infrastructure
    • Data Leakage Prevention system, rules, and reports
    • Privileged Account Management process
    • Network Access Control - process and exception handling
    • Vulnerability Scanning, reporting, proposing remediation actions, and tracking compliance
    • Security hardening baseline compliance scanning, reporting, and remediation

    On an ad hoc basis, the consultant will support businesses in:

    • Issuing, renewing, and revoking PKI digital certificates.
    • Assessing internet and email use on request of Forensics or HR departments.
    • Performing scheduled tasks like reviewing Firewall rule configuration and reporting.

    The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.

    The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.

    The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or interaction with experts.

    Qualifications

    • Matric
    • Information Technology diploma or degree
    • Information Security certification (preferable)

    Experience

    At least 3 - 5 years in hands-on technical experience which includes:

    • Network experience (TCP/IP, Firewalls, IPS, NAC)
    • Anti-Virus System management and Configuration
    • Data Leakage Prevention tool configuration
    • Logical Access Management (AD, PAM)
    • Information Security Operations (Security+, CISSP will be beneficial)
    • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)

    Required Skills

    • Security Auditing
    • Reporting and Administration
    • Security tools monitoring
    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Information Security Consultant: Operations

    Cape Town, Western Cape Recru-IT

    Posted 19 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Role:

    The role of the Cyber Security Consultant: Operations will form part of our client’s team which focuses on Cyber Security Operations services to businesses on our client’s Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes.

    What will make you successful in this role?
    • On a day-to-day basis the Consultant will be involved with the configuration, monitoring, and management of:
      • Anti-Virus Infrastructure
        • Data Leakage Prevention system, rules, and reports
        • Privileged Account Management process
        • Network Access Control process and exception handling.
        • Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance.
        • Security hardening baseline compliance scanning, reporting and remediation.
    • On an ad hoc basis the consultant will support businesses in:
      • Issuing, renewing, and revoking PKI digital certificates.
      • Assessing internet and email use on request of Forensics or HR departments.
    • The consultant will also be performing scheduled tasks like review Firewall rule configuration and report.
    • The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.
    • The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.
    • The consultant will contribute to Knowledge and Skills of the team, by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts.
    Qualifications:
    • Matric
    • Information Technology diploma or degree
    • Information Security certification (preferable)
    Experience:

    At least 3 – 5 years in hands-on technical experience which includes:

    • Network experience (TCP/IP, Firewalls, IPS, NAC)
    • Operating System management and Hardening (Windows, Linux, CIS hardening baselines)
    • Anti-Virus System management and Configuration
    • Data Leakage Prevention tool configuration
    • Logical Access Management (AD, PAM)
    • Information Security Operations (Security+, CISSP will be beneficial)
    • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)
    Knowledge and Skills:
    • Security Auditing.
    • Risk management.
    • Incident Investigation.
    • Reporting and Administration.
    • Security tools monitoring.
    Personal Attributes:
    • Interpersonal savvy - Contributing independently.
    • Decision quality - Contributing independently.
    • Plans and aligns - Contributing independently.
    • Optimises work processes - Contributing independently.
    Core Competencies:
    • Cultivates innovation - Contributing independently.
    • Customer focus - Contributing independently.
    • Drives results - Contributing independently.
    • Collaborates - Contributing independently.
    • Being resilient - Contributing independently.
    Package & Remuneration

    Market related - Monthly

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Information security consultant: operations

    Cape Town, Western Cape Recru-IT

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    permanent
    Role: The role of the Cyber Security Consultant: Operations will form part of our client’s team which focuses on Cyber Security Operations services to businesses on our client’s Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes. What will make you successful in this role? On a day-to-day basis the Consultant will be involved with the configuration, monitoring, and management of: Anti-Virus Infrastructure Data Leakage Prevention system, rules, and reports Privileged Account Management process Network Access Control process and exception handling. Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance. Security hardening baseline compliance scanning, reporting and remediation. On an ad hoc basis the consultant will support businesses in: Issuing, renewing, and revoking PKI digital certificates. Assessing internet and email use on request of Forensics or HR departments. The consultant will also be performing scheduled tasks like review Firewall rule configuration and report. The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis. The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls. The consultant will contribute to Knowledge and Skills of the team, by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts. Qualifications: Matric Information Technology diploma or degree Information Security certification (preferable) Experience: At least 3 – 5 years in hands-on technical experience which includes: Network experience (TCP/IP, Firewalls, IPS, NAC) Operating System management and Hardening (Windows, Linux, CIS hardening baselines) Anti-Virus System management and Configuration Data Leakage Prevention tool configuration Logical Access Management (AD, PAM) Information Security Operations (Security+, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores) Knowledge and Skills: Security Auditing. Risk management. Incident Investigation. Reporting and Administration. Security tools monitoring. Personal Attributes: Interpersonal savvy - Contributing independently. Decision quality - Contributing independently. Plans and aligns - Contributing independently. Optimises work processes - Contributing independently. Core Competencies: Cultivates innovation - Contributing independently. Customer focus - Contributing independently. Drives results - Contributing independently. Collaborates - Contributing independently. Being resilient - Contributing independently. Package & Remuneration Market related - Monthly #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Security Intern Jobs