110 Security Management jobs in South Africa
Information Security Management System (ISMS) Specialist
Posted 2 days ago
Job Viewed
Job Description
Join to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Information Security Management System (ISMS) SpecialistJoin to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist is responsible for the end-to-end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO/IEC 27001 standards. The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development And Implementation
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls into third-party contracts and SLAs.
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuring the organization’s security posture is robust and aligned with its strategic objectives.
Qualifications, Skills and Experience Required for the Job
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer Preferrable: ISO27001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding the highest ethical standards in all security practices
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Transportation, Logistics, Supply Chain and Storage
Referrals increase your chances of interviewing at Vector Logistics by 2x
Sign in to set job alerts for “Information Security Specialist” roles.Johannesburg, Gauteng, South Africa 2 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 3 days ago
Johannesburg, Gauteng, South Africa 1 month ago
Randburg, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Randburg, Gauteng, South Africa 5 days ago
Senior Manager: Information Systems Audit (Cyber Security)Pretoria, Gauteng, South Africa 2 weeks ago
Johannesburg Metropolitan Area 3 days ago
Centurion, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 day ago
Johannesburg, Gauteng, South Africa 6 days ago
Johannesburg, Gauteng, South Africa 5 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Management System (ISMS) Specialist
Posted 2 days ago
Job Viewed
Job Description
Information Security Management System (ISMS) Specialist
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development and Implementation:
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
Risk Assessment and Management:
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
Compliance and Audits:
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
Training and Awareness:
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
Incident Response and Management:
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
Continuous Improvement:
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
Vendor and Third-Party Risk Management:
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls intothird-party contracts and SLAs.
Key Relationships
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.
Qualifications, Skills and Experience Required for the Job
Qualifications and Experience
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer
Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
Skills and Competencies
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices
We look forward to hearing from you!
#J-18808-LjbffrInformation Security Management System (ISMS) Specialist
Posted today
Job Viewed
Job Description
Information Security Management System (ISMS) Specialist
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development and Implementation:
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
Risk Assessment and Management:
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
Compliance and Audits:
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
Training and Awareness:
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
Incident Response and Management:
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
Continuous Improvement:
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
Vendor and Third-Party Risk Management:
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls intothird-party contracts and SLAs.
Key Relationships
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.
Qualifications, Skills and Experience Required for the Job
Qualifications and Experience
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer
Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
Skills and Competencies
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices
We look forward to hearing from you!
#J-18808-LjbffrManager: Security Integrity Management
Posted 2 days ago
Job Viewed
Job Description
Brief description
The main purpose of this position is to manage the provision of Security Integrity Management services for the SARB Group. This includes the provision of Security Investigations, Project Security, Due Diligence and Integrity Management services
Detailed description
The successful candidate will be responsible for the following key performance areas:
- Oversee the functions of the unit i.e. Security Investigations, Project Security Office, Due Diligence and Integrity Management services
- Provide input into the Divisional strategy and policy aligned to the SARB strategy and communicate and clarify the vision and strategic goals of the Division to the team.
- Develop and implement policies for the Security Integrity Management Unit in line with the Departmental strategy.
- Develop and implement the unit operational plan to ensure the achievement of strategic and operational objectives.
- Ensure compliance to policy, procedures and audit findings to mitigate risk in the unit.
- Oversee the management of all personnel and resources allocated to the unit.
- Create a performance culture in the unit, define performance expectations and conduct effective performance management of direct reports and to oversee prioritisation of work and resource utilisation.
- Oversee the unit's budget and service providers ensuring alignment with related functions and the organisational value chain.
- Manage and authorise the provision of management information for the purpose of decision-making.
- Collaborate with cross-functional teams to develop and enforce security policies and manage personnel risk.
- Provide expert guidance on security matters to project teams and stakeholders, ensuring that security considerations are integrated into project planning and execution.
- Develop and provide reports on due diligence and personnel risk to senior stakeholders and relevant committees.
- Manage Personnel Security Incident Response Teams including but not limited to the scheduling, chairing and managing of information and processes related to the team.
- Ensure the secure management of information aligned with the Bank's policies and legislation.
- Build relationships with relevant stakeholders, facilitate collaboration, communicate effectively and address stakeholder concerns.
Security Risk Management Mobile Implementation Officer
Posted 2 days ago
Job Viewed
Job Description
Location: Homebased, but mainly carried out in our projects
Contract type: Fixed term contract – Full time – 12 months (extendable)
Deadline for application: 15th of May 2024
CONTEXT
The Security Risk Management Unit (SRMU) is based within the Operations Department of MSF Belgium (OCB – Operational Centre Brussels). Our unit aims to strengthen MSF OCB’s skills and experience in security and crisis management, in particular, the adjustment of mindset, decision-making and tools in response to the volatility of a security context.
As Security Risk Management (SRM) Mobile Implementation Officer (MIO) , you contribute to the security and safety support of MSF-OCB projects in terms of training, assessment, and advice.
MAIN RESPONSIBILITIES
Capacity Building and Training
- Conduct SRM trainings at the headquarter and projects level for logistics teams, Field Coordinators, and Heads of Mission (HoMs).
- Identify needs for new trainings.
- Design and elaborate the training’s offer in the risk management area of expertise.
Security assessment, Risk Analysis & Risk reduction
- Conduct SRM assessments and contribute to the Risk Analysis and Risk Reduction process for the benefit of the projects.
- Design and elaborate operational tools concerning SRM for MSF-OCB projects.
- Engage in SRMU operational research projects.
Security support to our projects
- Provide operational support for the design and implementation of SRM procedures in MSF countries of intervention.
- Promote an embedded SRM culture among MSF-OCB projects.
- Provide SRM “Individualized support” to identified HoMs, Field Coordinators, or Logistic Coordinators.
Crisis Management Preparation
- Reinforce Field Incident Management Team (FIMT) capacity at project level through trainings and E-learning modules.
- Assist in the preparation of the Central Incident Management Team (CIMT).
- Collaborate with SFP at MSF Partner Section CIMT trainings and/or Regional OCB Hub.
Administration and support
- Support the SFP on request.
- Assist in the daily administration of the MSF-OCB incident reporting system.
- Conduct research in the SRM area of interest.
REQUIREMENTS
Education & Experience
- Humanitarian experience with an IO/INGO is mandatory.
- 5 years’ international experience with an IO/ INGO.
- 2 years in a volatile context, preferably in an operations position.
- Experience in security risk management with MSF or other IO/ INGO is mandatory.
- 2 years’ experience in a coordination position (Field Coordinator, Head of Mission, Emergency Coordinator) with MSF or other IO/ INGO.
- Experience in coaching and training of staff is an asset.
- Experience in crisis management is an asset.
Competencies
- Capacity to work under pressure.
- Resistance.
- Knowledge of INGO security management mechanisms.
- Knowledge of MSF OCB security management approaches is a plus.
- Written and oral communication skills.
- Ability to set priorities and organize work effectively.
- Ability to work independently.
- Ability to plan and organize in a stressful environment.
- Adherence to confidentiality.
- A sense of humor is highly appreciated.
- Motivation to work with MSF.
Languages
- Proficiency in English (written and spoken).
- Knowledge of Arabic is an asset.
Other
An important availability is required to answer requests for support that can happen during working days, nights, or weekends. In case of a Crisis Cell at OCB, the RMU is highly impacted requiring important flexibility. Willingness and capacity to travel on short notice to any context, sometimes under difficult conditions, is expected.
CONDITIONS
- Starting date: June 2024.
- Homebased, but mainly carried out in our projects.
- Up to 70% mobility in our projects (3 to 4 visits of 2 to 3 weeks per year) and in Brussels HQ (3 visits of 1 to 3 weeks per year).
- Type: Fixed-term contract – Full time.
- Length of contract: 12 months (extendable).
- Salary according to MSF field salary grid.
The contractual terms, conditions, and salary will be established according to the official residence of the selected candidate and in compliance with the standard MSF function and salary grids; in agreement with the MSF contracting office in charge based on the residence of the candidate.
Medical Insurance 100% covered as per international package; 45 paid leaves.
- Adhere to the MSF principles and to our managerial values: Respect, Transparency, Integrity, Accountability, Trust, and Empowerment.
- Adhere to the MSF Behavioral Commitments.
Deadline for applications: 15th of May 2024.
How to apply?
Please send your CV and cover letter to and mention “Security Risk Management MIO” in the subject of your email.
Female candidates are strongly encouraged to apply.
Only shortlisted candidates will be contacted.
MSF values diversity and is committed to creating an inclusive working environment. We welcome applications from all qualified candidates regardless of disability, gender identity, marital or civil partnership status, race, color or ethnic and national origins, religion or belief, or sexual orientation.
The protection of your personal data is important to MSF. By submitting your application, you consent to MSF using your personal data. For more information, consult our privacy notice to job applicants.
#J-18808-LjbffrSecurity Risk Management Mobile Implementation Officer
Posted today
Job Viewed
Job Description
Location: Homebased, but mainly carried out in our projects
Contract type: Fixed term contract – Full time – 12 months (extendable)
Deadline for application: 15th of May 2024
CONTEXT
The Security Risk Management Unit (SRMU) is based within the Operations Department of MSF Belgium (OCB – Operational Centre Brussels). Our unit aims to strengthen MSF OCB’s skills and experience in security and crisis management, in particular, the adjustment of mindset, decision-making and tools in response to the volatility of a security context.
As Security Risk Management (SRM) Mobile Implementation Officer (MIO) , you contribute to the security and safety support of MSF-OCB projects in terms of training, assessment, and advice.
MAIN RESPONSIBILITIES
Capacity Building and Training
- Conduct SRM trainings at the headquarter and projects level for logistics teams, Field Coordinators, and Heads of Mission (HoMs).
- Identify needs for new trainings.
- Design and elaborate the training’s offer in the risk management area of expertise.
Security assessment, Risk Analysis & Risk reduction
- Conduct SRM assessments and contribute to the Risk Analysis and Risk Reduction process for the benefit of the projects.
- Design and elaborate operational tools concerning SRM for MSF-OCB projects.
- Engage in SRMU operational research projects.
Security support to our projects
- Provide operational support for the design and implementation of SRM procedures in MSF countries of intervention.
- Promote an embedded SRM culture among MSF-OCB projects.
- Provide SRM “Individualized support” to identified HoMs, Field Coordinators, or Logistic Coordinators.
Crisis Management Preparation
- Reinforce Field Incident Management Team (FIMT) capacity at project level through trainings and E-learning modules.
- Assist in the preparation of the Central Incident Management Team (CIMT).
- Collaborate with SFP at MSF Partner Section CIMT trainings and/or Regional OCB Hub.
Administration and support
- Support the SFP on request.
- Assist in the daily administration of the MSF-OCB incident reporting system.
- Conduct research in the SRM area of interest.
REQUIREMENTS
Education & Experience
- Humanitarian experience with an IO/INGO is mandatory.
- 5 years’ international experience with an IO/ INGO.
- 2 years in a volatile context, preferably in an operations position.
- Experience in security risk management with MSF or other IO/ INGO is mandatory.
- 2 years’ experience in a coordination position (Field Coordinator, Head of Mission, Emergency Coordinator) with MSF or other IO/ INGO.
- Experience in coaching and training of staff is an asset.
- Experience in crisis management is an asset.
Competencies
- Capacity to work under pressure.
- Resistance.
- Knowledge of INGO security management mechanisms.
- Knowledge of MSF OCB security management approaches is a plus.
- Written and oral communication skills.
- Ability to set priorities and organize work effectively.
- Ability to work independently.
- Ability to plan and organize in a stressful environment.
- Adherence to confidentiality.
- A sense of humor is highly appreciated.
- Motivation to work with MSF.
Languages
- Proficiency in English (written and spoken).
- Knowledge of Arabic is an asset.
Other
An important availability is required to answer requests for support that can happen during working days, nights, or weekends. In case of a Crisis Cell at OCB, the RMU is highly impacted requiring important flexibility. Willingness and capacity to travel on short notice to any context, sometimes under difficult conditions, is expected.
CONDITIONS
- Starting date: June 2024.
- Homebased, but mainly carried out in our projects.
- Up to 70% mobility in our projects (3 to 4 visits of 2 to 3 weeks per year) and in Brussels HQ (3 visits of 1 to 3 weeks per year).
- Type: Fixed-term contract – Full time.
- Length of contract: 12 months (extendable).
- Salary according to MSF field salary grid.
The contractual terms, conditions, and salary will be established according to the official residence of the selected candidate and in compliance with the standard MSF function and salary grids; in agreement with the MSF contracting office in charge based on the residence of the candidate.
Medical Insurance 100% covered as per international package; 45 paid leaves.
- Adhere to the MSF principles and to our managerial values: Respect, Transparency, Integrity, Accountability, Trust, and Empowerment.
- Adhere to the MSF Behavioral Commitments.
Deadline for applications: 15th of May 2024.
How to apply?
Please send your CV and cover letter to and mention “ Security Risk Management MIO” in the subject of your email.
Female candidates are strongly encouraged to apply.
Only shortlisted candidates will be contacted.
MSF values diversity and is committed to creating an inclusive working environment. We welcome applications from all qualified candidates regardless of disability, gender identity, marital or civil partnership status, race, color or ethnic and national origins, religion or belief, or sexual orientation.
The protection of your personal data is important to MSF. By submitting your application, you consent to MSF using your personal data. For more information, consult our privacy notice to job applicants.
#J-18808-LjbffrDivisional Head: Security Integrity Management/Pretoria
Posted 14 days ago
Job Viewed
Job Description
Description
The main purpose of this position is to provide leadership and strategic direction as well as manage the provision of security integrity management services within the SARB Group. This includes the provision and oversight of security investigations, security personnel vetting, project security, due diligence and integrity management.
- Oversee the functions of the division (i.e. security investigations, security personnel vetting, project security, due diligence and integrity management) to ensure effective delivery.
- Provide input into the departmental strategy and policy in line with the South African Reserve Banks (SARB) strategy, and communicate and clarify the vision and strategic goals of the department to own team.
- Develop and implement policies for the division in line with the departmental strategy.
- Develop and implement the divisional operational plan to ensure strategic and operational objectives are achieved.
- Ensure compliance with policy, procedures and audit findings to mitigate risk in the division.
- Oversee the management of all personnel and resources allocated to the division.
- Create a performance culture in the division, define performance expectations and conduct effective performance management of direct reports.
- Oversee the prioritisation of work and resource utilisation.
- Oversee the divisional costs, ensuring alignment with related functions and the organisational value chain.
- Oversee and authorise the provision of management information for the decision-making purposes.
- Collaborate with senior leadership to develop and enforce security policies and procedures that align with organisational goals and industry best practices.
- Provide expert guidance on security matters to project teams and stakeholders, ensuring that security considerations are integrated into project planning and execution.
- Develop and provide reports on due diligence and personnel risk to senior management and relevant committees.
Requirements
an Honours degree/Postgraduate Diploma (NQF8) in Internal Audit, Risk Management, Social Science (Psychology/Sociology/Criminology) or an equivalent qualification;
a minimum of 10 years experience in security and/or security risk management with at least five years in a senior management position; and sound knowledge and experience in areas such as security investigations, personnel security vetting, project security, due diligence and integrity management, and stakeholder engagement.
The following would be an added advantage:
- Successfully completed a Senior Management Development Programme
- leading change
- strategic thinking
- Building and maintaining trust
- Developing and empowering others
- Fostering diversity and inclusion
- Leading teams through effective communication and collaboration
- Managing complexity and ambiguity
- Building and maintaining relationships
- Drive for results; and sound judgement and decision-making skills.
Be The First To Know
About the latest Security management Jobs in South Africa !
Senior Security Operations Engineer
Posted 2 days ago
Job Viewed
Job Description
Canonical Cape Town, Western Cape, South Africa
We have opened several senior/staff Security Operations Engineer (SOC) positions, creating a new team reporting to the CISO. We are looking for a range of experience in these positions - at the high end we are looking for deep experience defending highly contested critical assets and high-value cyber targets against advanced persistent threats and state-level actors. We have more junior roles for exceptional individuals with a proven personal interest an engagement in cyber attack and defence, and outstanding academic and career performance even if experience is limited.
Our goal is to build an entirely new level of assurance and observable rigour into the open source supply chain. We have our own estate to monitor, but more broadly our goal is to raise the robustness of the entire global Ubuntu estate through the work of this team.
The Security Operations (SecOps) team is responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.
The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
What you will do in this role:
- Implement and evolve Canonical's Security Operation Center
- Analyse and improve Canonical's security architecture
- Evaluate, select and implement new security tools and practices
- Identify, contain and guide the remediation of security threats and cyber attacks
- Grow the presence and thought leadership of Canonical SecOps practice
- Contribute to open source threat intelligence initiatives
- Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
- Develop Canonical SecOps learning and development materials
- Publish blog posts, whitepapers and conference presentations
- Identify, implement and track SecOps KPIs
- Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
- Work with Security leadership to present information and influence change
- An exceptional academic track record
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Previous professional experience working or leading a Security Operation Center
- Deep personal motivation to be at the forefront of technology security
- Expertise in threat modelling and risk management frameworks
- Knowledge of security architecture and market-leading security tools
- Experience contributing to, and consuming, threat intelligence feeds
- Experience in security risk management frameworks such as NIST CSF and ISO27001
- Experience in a security operations team or a security operations centre (SOC)
- Experience in offensive or defensive security teams with hands-on ability
- Experience with state-actor and other advanced persistent threats
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Cape Town, Western Cape, South Africa 1 day ago
Cape Town, Western Cape, South Africa 3 months ago
Linux Cryptography and Security EngineerCape Town, Western Cape, South Africa 3 weeks ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrHead of Security Operations
Posted 2 days ago
Job Viewed
Job Description
Canonical Cape Town, Western Cape, South Africa
Join or sign in to find your next jobJoin to apply for the Head of Security Operations role at Canonical
Canonical Cape Town, Western Cape, South Africa
Join to apply for the Head of Security Operations role at Canonical
This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure and build processes. They are responsible for assuring the security and integrity of our own infrastructure and product deployments. They design and implement technical security controls that ensure security threats are automatically identified, contained and remediated. The team will also contribute ideas and requirements for Canonical product security, improving the resilience and robustness of all Ubuntu customers and users subject to cyber attack.
As a leader on cyber security in the company, the SecOps team manager will collaborate with our Organisational Learning and Development team to develop playbooks and facilitate SecOps training across Canonical. They will operate in a wider security organisation, run a high performing security team and improve Canonical's security posture. They will lead initiatives to integrate the team's insights into Canonical's broader software development process.
While this is a management position, we expect managers to be expert practitioners, able to lead by example, contribute at the highest level, and assess work based on their own professional experience and skill. Candidates should have deep, hands-on expertise with a range of open source and proprietary security tooling and practices, which they can integrate into a holistic next generation security solution across the breadth of Canonical's interests.
The SecOps team's mission is not only to secure Canonical, but also to contribute to the security of the wider open source ecosystem. They might share knowledge through public presentations and industry events, and share threat intelligence with the wider community or represent Canonical in sector-specific governance bodies.
This role reports to the CISO.
What you will do in this role:
- Hire and mentor a team of outstanding technical security professionals
- Define Canonical's SecOps security standards and playbooks
- Own and drive the architecture and design of the SOC
- Analyse and improve Canonical's security architecture
- Evaluate, select and implement new security tools and practices
- Identify, contain and guide the remediation of security threats and cyber attacks
- Grow the presence and thought leadership of Canonical SecOps practice
- Contribute to open source threat intelligence initiatives
- Drive threat modelling, table top exercises and other SecOps practices across Engineering, IS and Canonical
- Develop Canonical SecOps learning and development materials
- Publish blog posts, whitepapers and conference presentations
- Identify, implement and track SecOps KPIs
- Plan and deliver SecOps work in the framework of Canonical's agile engineering practice
- Work with Security leadership to present information and influence change
- Proven track record of mitigating with advanced threat actors and nation state threats
- Expert technical understanding of SOCs from the ground up
- In depth knowledge of SOC architecture and design including strategies for logging, firewalls, network segmentation, honeypots etc
- Someone who understands how the SOC works not just how to use it
- Expert in Linux security
- Ability to define, implement, automate and measure effective incident response playbooks
- Knowledge of security architecture and market-leading security tools
- Experience contributing to, and consuming, threat intelligence feeds
- Experience in security risk management frameworks such as NIST CSF
- An exceptional academic track record from both high school and university
- Undergraduate degree in Computer Science or STEM, or a compelling narrative about your alternative path
- Drive and a track record of going above-and-beyond expectations
- Deep personal motivation to be at the forefront of technology security
- Leadership and management ability
- Excellent business English writing and presentation skills
- Confidence to report security performance metrics with accountability for accuracy and completeness
- Experience in offensive or defensive security teams with hands-on ability
- Experience with open source security tools
- Experience with security standards such as ISO 27001
- Experience with security posture management of corporate endpoitns
- Seniority level Director
- Employment type Full-time
- Job function Other, Information Technology, and Management
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Sign in to set job alerts for “Head of Security” roles.We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSecurity Operations Center Analyst
Posted 2 days ago
Job Viewed
Job Description
Security Operations Center Analyst
Job Overview:
We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our dynamic cybersecurity team. The ideal candidate will have a strong background in information security, incident response, and threat detection. As a SOC Analyst, you will play a crucial role in monitoring, analyzing, and responding to security incidents to safeguard our organization’s assets and information.
Responsibilities:
Incident Monitoring and Response:
- Monitor security alerts and events from various sources, including security information and event management (SIEM) systems.
- Investigate and respond to security incidents promptly and effectively.
- Conduct thorough analysis of security events and incidents to identify potential threats and vulnerabilities.
Threat Detection:
- Utilize advanced threat intelligence to proactively identify and mitigate potential security risks.
- Stay informed about the latest security threats, vulnerabilities, and industry best practices.
- Develop and implement detection rules and signatures to enhance threat detection capabilities.
Security Operations:
- Collaborate with other IT and security teams to ensure the timely resolution of security incidents.
- Work closely with incident response teams to contain and eradicate security threats.
- Document and maintain incident response procedures and guidelines.
Log Analysis and Reporting:
- Analyze security logs to identify patterns, trends, and anomalies.
- Generate regular reports on security incidents, trends, and analysis for management review.
Vulnerability Management:
- Assist in vulnerability assessments and penetration testing activities.
- Provide recommendations for remediation of identified vulnerabilities.
Continuous Improvement:
- Participate in regular security awareness training and continuous professional development.
- Contribute to the enhancement of SOC processes, procedures, and technologies.
Qualifications:
- Bachelor’s degree in Information Security, Cybersecurity, Computer Science, or a related field.
- Proven experience as a SOC Analyst or in a similar cybersecurity role.
- In-depth knowledge of cybersecurity principles, technologies, and best practices.
- Hands-on experience with SIEM tools, intrusion detection systems, and other security technologies.
- Certifications such as CISSP, CompTIA Security+, or GIAC are highly desirable.
- Strong analytical and problem-solving skills.
Benefits:
- Competitive salary and benefits package.
- Opportunities for professional development and training.
- Collaborative and innovative work environment.
If you are a passionate and experienced SOC Analyst ready to contribute to the security posture of our organization, we encourage you to apply. Join us in defending against cyber threats and ensuring the resilience of our information assets.
#J-18808-Ljbffr