210 Security Managers jobs in South Africa
Application and Security Management Analyst
Posted 17 days ago
Job Viewed
Job Description
Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to realize their financial goals and help them save time and money.
We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments.
We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at experianplc.com.
Responsibilities- Collaborate with technical and business teams to address security flaws and implement remediation plans.
- Oversee application security tasks, ensuring alignment with audit requirements and internal policies.
- Support change and incident management processes, with a focus on high-priority incidents (P1 & P2).
- Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance.
- Act as a liaison with internal stakeholders to ensure clear communication and quality engagements.
- Support governance and administrative functions, including audit preparation and policy development.
- Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics.
- Application Security & Vulnerability Management
- Familiarity with Common Vulnerability Scoring System (CVSS)
- Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM)
- Track and assist in the closure of identified vulnerabilities, working closely with IT and Development teams
- Review and maintain secure configurations for systems, applications, and network devices
- Security Fundamentals
- Working knowledge of encryption, authentication, and secure data transmission
- Knowledge of network security principles and firewall configurations
- Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory
- Experience with CyberArk PAM for privileged access management
- Security Information and Event Management (SIEM)
- Use of Splunk SIEM for real-time threat detection and log analysis
- Review and optimise SIEM use cases to enhance threat detection and response capabilities
- Monitoring & Endpoint Security
- Experience with Tanium and MS Defender for server and endpoint security management
- Familiarity with IBM Guardium for database activity monitoring
- Exposure to Cyera for data identification and classification
- Cloud & Infrastructure Security
- Experience with Wiz.IO for cloud security posture management (CSPM) and IaC scanning
- Understanding of secrets management using AWS Secrets Manager, Azure Key Vault, or GCP Secrets Manager
- Familiarity with Thales and AWS KMS/HSM for key management
- Other Tools & Platforms
- Knowledge of SailPoint for identity governance
- Experience with CyCognito for external attack surface management
- Familiarity with Imperva for WAF, DDoS, and botnet protection
- Exposure to ProofPoint and MS Office365 Message Security for email security
- Use of 1Password for credential management
- Awareness of Netwrix for password policy enforcement
- Degree or equivalent qualifications and experience in Computer Science, Information Technology, Data or a related field
- Technical & Security Experience
- Experience with automated and manual methods for evaluating security controls in both on-prem and cloud environments
- Experience in monitoring and reporting on security flaws and supporting related remediation activities
- Risk, Controls & Compliance
- Familiarity with change management processes in technology environments
- Contribute to accurate statistical reporting on the market’s IT security posture
- Ensure first line of defence (1LoD) ownership of non-compliance issues, exception justifications, mitigation controls, and risk documentation
- Ensure accuracy and timely completion of control testing and remediations
- Collaborate with Security Partners, RISOs and other governance functions to drive remediation of identified security deficiencies
- Communication & Collaboration
- Strong ability to communicate complex information clearly and effectively
- Good collaboration, relationship-building, and interpersonal skills
- Act as primary liaison with internal, local and regional stakeholders, ensuring quality engagements and clear progress updates
Additional Information
Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what matters; DEI, work/life balance, development, authenticity, collaboration, wellness, reward & recognition, volunteering.
Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity.
Experian Careers - Creating a better tomorrow together
Find out what its like to work for Experian by clicking here
#J-18808-LjbffrApplication and Security Management Analyst
Posted 19 days ago
Job Viewed
Job Description
Overview
Application and Security Management Analyst - Full-time, Hybrid work arrangement. Department: Customer Service. Regular employee status.
Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to realize their financial goals and help them save time and money.
We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments. We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at experianplc.com.
Responsibilities- Collaborate with technical and business teams to address security flaws and implement remediation plans.
- Oversee application security tasks, ensuring alignment with audit requirements and internal policies.
- Support change and incident management processes, with a focus on high-priority incidents (P1 & P2).
- Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance.
- Act as a liaison with internal stakeholders to ensure clear communication and quality engagements.
- Support governance and administrative functions, including audit preparation and policy development.
- Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics.
Application Security & Vulnerability Management
- Familiarity with Common Vulnerability Scoring System (CVSS)
- Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM)
- Track and assist in the closure of identified vulnerabilities, working closely with IT and Development teams
- Review and maintain secure configurations for systems, applications, and network devices
Security Fundamentals
- Working knowledge of encryption, authentication, and secure data transmission
- Knowledge of network security principles and firewall configurations
- Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory
- Experience with CyberArk PAM for privileged access management
Security Information and Event Management (SIEM)
- Use of Splunk SIEM for real-time threat detection and log analysis
- Review and optimise SIEM use cases to enhance threat detection and response capabilities
Monitoring & Endpoint Security
- Experience with Tanium and MS Defender for server and endpoint security management
- Familiarity with IBM Guardium for database activity monitoring
- Exposure to Cyera for data identification and classification
Cloud & Infrastructure Security
- Experience with Wiz.IO for cloud security posture management (CSPM) and IaC scanning
- Understanding of secrets management using AWS Secrets Manager, Azure Key Vault, or GCP Secrets Manager
- Familiarity with Thales and AWS KMS/HSM for key management
Other Tools & Platforms
- Knowledge of SailPoint for identity governance
- Experience with CyCognito for external attack surface management
- Familiarity with Imperva for WAF, DDoS, and botnet protection
- Exposure to ProofPoint and MS Office365 Message Security for email security
- Use of 1Password for credential management
- Awareness of Netwrix for password policy enforcement
- Degree or equivalent qualifications and experience in Computer Science, Information Technology, Data or a related field
- Experience with automated and manual methods for evaluating security controls in both on-prem and cloud environments
- Experience in monitoring and reporting on security flaws and supporting related remediation activities
- Familiarity with change management processes in technology environments
- Contribute to accurate statistical reporting on the market’s IT security posture
- Ensure first line of defence (1LoD) ownership of non-compliance issues, exception justifications, mitigation controls, and risk documentation
- Ensure accuracy and timely completion of control testing and remediations
- Collaborate with Security Partners, RISOs and other governance functions to drive remediation of identified security deficiencies
- Ability to compile management reports and presentations on technical risks, controls, and deficiencies
- Strong ability to communicate complex information clearly and effectively
- Good collaboration, relationship-building, and interpersonal skills
- Act as primary liaison with internal, local and regional stakeholders, ensuring quality engagements and clear progress updates
Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what matters; DEI, work/life balance, development, authenticity, collaboration, wellness, reward & recognition, volunteering. the list goes on. Experian's people first approach is award-winning; World's Best Workplaces 2024 (Fortune Top 25), Great Place To Work in 24 countries, and Glassdoor Best Places to Work 2024 to name a few. Check out Experian Life on social or our Careers Site to understand why.
Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity.
Experian Careers - Creating a better tomorrow together
#J-18808-LjbffrInformation Security and Risk Management Auditors
Posted today
Job Viewed
Job Description
Published : 06/09/2022
Location : South Africa
Career Level : Experienced
Entity : DQS South Africa
Type of employment : Associate
Reference number : ISMS0023
For almost four decades, the DQS group has been known internationally for the highest quality and reliability in the certification of processes or management systems. Above all, our success is based on a high level of customer and service orientation that goes far beyond verifying checklists, and of course, on our employees who give their best every day.
DQS is currently looking for qualified Information Security, Cyber Security and Risk Management specialists interested in pursuing a career in auditing.
Your primary role would be to carry out assessments of our customer's management systems to ensure they meet the requirements of International Standards such as
ISO 22301
,
ISO 27001
,
TISAX
and other related standards.
To apply you'll need at least:
- Professional education (academic or technical): Completed higher education with a university or trade school degree, master craftsman's diploma or equivalent.
- Professional experience: At least five years of professional experience, including management, personnel, or project responsibility, two of them relating to the respective management system (
ISO 27001
,
ISO 22301
,
TISAX
).
- Experience with information and cyber security technologies.
- It is important for us to assign experts and managers with practical experience in auditing.
Our success is based on our highly qualified and experienced auditors. They have completed professional training and/or a degree, have extensive experience with management techniques and management systems, and have proven practical experience in the various industries they audit.
Training and development will be provided to ensure your success as an auditor
Various trainings will be provided on an ongoing basis.
International working environment
Weiterbildungsmöglichkeiten
Exciting Projects
Open-minded team
DQS: Simply leveraging Quality.
Our success is based on our highly qualified and experienced auditors. They have completed professional training and/or a degree, have extensive experience with management techniques and management systems, and have proven practical experience in the various industries they audit.
Would you like to join a dynamic team of auditors and further expand the success of DQS? If you meet the above requirements and are interested in becoming a certified auditor with DQS, please send us your CV to
Apply Now
Job ads
Haven't found the right one for you yet? Feel free to take another look at our overview.
Back to the overview
Information Security Manager
Posted today
Job Viewed
Job Description
Designation:
Information Security Manager | Waterfall, Midrand, Gauteng | Permanent
Category:
Information Technology
Job Level:
Professionally qualified and experienced specialists and mid-management
Posted by:
PSG Financial Services
Posted on:
03 Oct 2025
Reference Number:
POS08450
Closing date:
30-Oct-2025
Position Type:
Permanent
Location:
Waterfall Magwa Crescent
Overview:
VACANCY | INFORMATION SECURITY MANAGER | WATERFALL, MIDRAND, GAUTENG | PERMANENT
PSGs commitment to transform and embrace diversity is what drives us to achieve a diverse workplace with employment equity as a key goal to create an inclusive workforce. In achieving our employment equity goals, we give preference to applicants from designated groups, and we encourage people with disability to apply.
Job description:The Information Security Manager will lead PSG's cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).
Responsibilities:Strategic Leadership & Governance
- Develop and maintain PSG's enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
- Establish and enforce security governance frameworks, policies, and standards.
- Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
- Lead the implementation of relevant security compliance initiatives.
- Collaborate with divisional CIOs and executive leadership to align security posture across business units.
- Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.
- Design secure solutions for hybrid environments (on-prem + Azure).
- Integrate security into infrastructure and application projects.
- Manage identity and access controls, including Azure AD, MFA, and privileged access management.
- Manage day-to-day security monitoring, incident handling, and threat intelligence.
- Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
- Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
- Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
- Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.
- Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
- Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
- Support procurement and vendor management for security solutions.
- Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
- Define SOC roles, workflows, and incident response playbooks.
- Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
- Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
- Coordinate with external threat intelligence providers and law enforcement when necessary.
- Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
- Ensure timely patching, configuration updates, and feature adoption.
- Maintain compatibility and integration of security tools with PSG's hybrid infrastructure.
- Document system configurations and update operational procedures regularly.
- Conduct regular risk assessments, vulnerability scans, and penetration tests.
- Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
- Maintain a risk register and track mitigation actions.
- Coordinate internal and external audits and ensure timely remediation of findings.
- Lead organization-wide cybersecurity awareness programs.
- Deliver targeted training for IT, business, and executive teams.
- Promote secure behaviour and incident reporting culture.
- Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
- Define clear roles, responsibilities, and performance expectations.
- Conduct regular coaching, performance reviews, and career development planning.
- Foster a culture of accountability, innovation, and continuous improvement.
- Promote cybersecurity awareness and ownership across all departments.
- Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.
- Bachelor's degree in Computer Science, Information Technology, or related field.
- 8+ years of IT Security experience, with 5+ years in a leadership role.
- CISSP, CISM, or equivalent
- Microsoft Certified: Cybersecurity Architect Expert
- GIAC Security Operations (GSOM) or equivalent SOC certification
- Familiarity with scripting (PowerShell, Bash) and automation tools.
- Microsoft 365 and SharePoint Online
- Proven experience in cybersecurity leadership within hybrid cloud environments.
- Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
- Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
- Experience managing BYOD environments and securing distributed branch networks.
- Familiarity with ISO/IEC 27001, ISO/IEC 2000, NIST, and CIS controls.
- Excellent communication, stakeholder engagement, and team leadership skills.
- Technical documentation
- Strong leadership and problem-solving skills.
- Attention to detail
- Decision making
- Leadership
- Attention to detail
- Resilience
- Good verbal and written communication skills
- Time management skills
- Deadline driven
Candidates interested must apply here by no later than 30 October 2025 OR browse available PSG Careers vacancies
By submitting your application, you are giving PSG Financial Services implicit consent to the storage and processing of your personal information. If you are not contacted within 4 weeks of your application, please accept that your application was not successful. For more information about careers at PSG, visit
Information Security Manager
Posted today
Job Viewed
Job Description
- Who we're looking for: An experienced Information Security Manager to lead the implementation and ongoing maturity of our Information Security Management System (ISMS), ensure alignment with ISO 27001:2022, and manage risk across the business.
- The challenge: To own the ISMS documentation and audit programme, coordinate internal and external audits, oversee the risk register, and support internal teams on policy compliance and security awareness.
- Where you'll work: This role will be based in Cape Town, you'll be part of our global team, collaborating with colleagues and serving customers across the UK, USA, Australia, South Africa, and beyond. Our hybrid approach offers flexibility with regular team connection in our Cape Town office.
The Tillo Difference
We're in the business of rewards and incentives, so we know a thing or two about the importance of giving back. We can't grow as a business without growing as individuals, so we are committed to providing a workplace where passionate, driven individuals can thrive. We value collaboration, trust, positivity, and a willingness to learn - only by working as a team will we reach our goals.
We're the market leader in the UK and are active in a number of other markets including USA, Europe, Australia and India.
This role will be responsible for:
ISMS Ownership & Audit Readiness
Maintain and evolve the ISMS documentation and controls in line with ISO 27001:2022.
- Coordinate and lead internal audits (quarterly for TZ) and external certification audits.
- Write up audit findings and risk reports for SLT and the Board.
- Monitor ISMS KPIs and compliance metrics .
Risk Management
Own the company-wide risk register and associated documentation (excluding the risk framework itself).
- Support teams in identifying, assessing, and documenting risks.
- Track and ensure timely implementation of Risk Treatment Plans.
- Monitor and report on key risk metrics.
Incident & Corrective Action Management
Maintain the incident log, ensuring proper documentation, root cause analysis and closure.
- Drive corrective actions and improvements from internal/external audits and incidents.
Security Policy & Training
Maintain and develop ISO 27001-compliant security policies (non-Engineering).
- Coordinate business-wide security awareness training (e.g., KnowBe4).
- Champion InfoSec awareness and lead monthly security meetings.
Client & Vendor Security Assurance
Complete InfoSec and risk sections of client due diligence questionnaires.
- Support the development of a Trust Centre to streamline security responses.
What we're looking for
- 3+ years in an Information Security or Risk Management role with experience in ISO 27001 implementation and audits.
- A strong understanding of risk frameworks, internal controls, and compliance management.
- Experience with audit coordination and ISMS documentation.
- The ability to translate technical and regulatory language into business-friendly advice.
- Working knowledge of privacy, AML, and business continuity requirements.
- Familiarity with InfoSec tooling (e.g., Drata, Vanta, KnowBe4).
- Exceptional communication, reporting and organisational skills.
Benefits
We offer all our employees trust and empower our team to work with flexibility and autonomy. We're a close-knit team and love working collaboratively, with our hybrid model, our team can come together at our fantastic offices, but also focus in their own space. The Tillo team are a motivated bunch and we all work hard to push Tillo forwards, always innovating. We completely understand the importance of work/life balance and offer a supportive and collaborative working environment with the following benefits:
- 21 days holiday per annum
- Retirement Fund (5%)
- Health insurance contribution
- Employee Incentive Scheme
- Hybrid Working
- Top spec equipment including laptop, mouse, keyboard, monitor
- Anniversary gifts
- Monthly breakfasts, drinks, snacks and events
- Team Learning & Development budget
Tillo makes gift cards, rewards, and incentives simple, efficient, and profitable. Operating in over 37 markets and 25 currencies, Tillo processes billions in gift card transactions through a single, plug-and-go API, powering rewards and incentives for the world's leading businesses.
Backed by Tenzing, Tillo is setting the global standard for digital gift card infrastructure.
Diversity, Equity, and Inclusion Statement
We are committed to fostering a diverse and inclusive workplace where everyone feels valued and respected. We welcome applications from individuals of all backgrounds, regardless of age, disability, gender identity, marital status, race, ethnicity, religion or belief, sex, or sexual orientation.
If you require any reasonable adjustments during the recruitment process, please let us know, and we will be happy to accommodate your needs.
Information Security Manager
Posted today
Job Viewed
Job Description
Designation: Information Security Manager | Waterfall, Midrand, Gauteng | Permanent
Category: Information Technology
Job Level: Professionally qualified and experienced specialists and mid-management
Posted by: PSG Financial Services
Posted on: 03 Oct 2025
Reference Number: POS08450
Closing date: 30-Oct-2025
Position Type: Permanent
Location: Waterfall Magwa Crescent
Overview
VACANCY | INFORMATION SECURITY MANAGER | WATERFALL, MIDRAND, GAUTENG | PERMANENT
PSGs commitment to transform and embrace diversity is what drives us to achieve a diverse workplace with employment equity as a key goal to create an inclusive workforce. In achieving our employment equity goals, we give preference to applicants from designated groups, and we encourage people with disability to apply.
Job Description
The Information Security Manager will lead PSG's cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).
*Responsibilities:
Strategic Leadership & Governance *
- Develop and maintain PSG's enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
- Establish and enforce security governance frameworks, policies, and standards.
- Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
- Lead the implementation of relevant security compliance initiatives.
- Collaborate with divisional CIOs and executive leadership to align security posture across business units.
- Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.
*Architecture & Identity Management *
- Design secure solutions for hybrid environments (on-prem + Azure).
- Integrate security into infrastructure and application projects.
- Manage identity and access controls, including Azure AD, MFA, and privileged access management.
*Security Operations *
- Manage day-to-day security monitoring, incident handling, and threat intelligence.
- Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
- Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
- Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
- Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.
*Financial Management *
- Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
- Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
- Support procurement and vendor management for security solutions.
*Cyber Security Operations Center (SOC) Oversight *
- Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
- Define SOC roles, workflows, and incident response playbooks.
- Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
- Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
- Coordinate with external threat intelligence providers and law enforcement when necessary.
*Security Technology Lifecycle Management *
- Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
- Ensure timely patching, configuration updates, and feature adoption.
- Maintain compatibility and integration of security tools with PSG's hybrid infrastructure.
- Document system configurations and update operational procedures regularly.
*Risk Management & Compliance *
- Conduct regular risk assessments, vulnerability scans, and penetration tests.
- Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
- Maintain a risk register and track mitigation actions.
- Coordinate internal and external audits and ensure timely remediation of findings.
*Awareness, Education & Training *
- Lead organization-wide cybersecurity awareness programs.
- Deliver targeted training for IT, business, and executive teams.
- Promote secure behaviour and incident reporting culture.
*Team Leadership & Culture *
- Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
- Define clear roles, responsibilities, and performance expectations.
- Conduct regular coaching, performance reviews, and career development planning.
- Foster a culture of accountability, innovation, and continuous improvement.
- Promote cybersecurity awareness and ownership across all departments.
*Reporting *
- Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.
*Minimum requirements: *
- Bachelor's degree in Computer Science, Information Technology, or related field.
- 8+ years of IT Security experience, with 5+ years in a leadership role.
- CISSP, CISM, or equivalent
- Microsoft Certified: Cybersecurity Architect Expert
- GIAC Security Operations (GSOM) or equivalent SOC certification
- Familiarity with scripting (PowerShell, Bash) and automation tools.
*Experience in the following technologies and concepts: *
- Microsoft 365 and SharePoint Online
- Proven experience in cybersecurity leadership within hybrid cloud environments.
- Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
- Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
- Experience managing BYOD environments and securing distributed branch networks.
- Familiarity with ISO/IEC 27001, ISO/IEC 2000, NIST, and CIS controls.
- Excellent communication, stakeholder engagement, and team leadership skills.
- Technical documentation
*Competencies required: *
- Strong leadership and problem-solving skills.
- Attention to detail
- Decision making
- Leadership
- Attention to detail
- Resilience
- Good verbal and written communication skills
- Time management skills
- Deadline driven
*How to apply: *
Candidates interested must apply here by no later than 30 October 2025 OR browse available PSG Careers vacancies .
By submitting your application, you are giving PSG Financial Services implicit consent to the storage and processing of your personal information. If you are not contacted within 4 weeks of your application, please accept that your application was not successful. For more information about careers at PSG, visit
AI Information Security Manager
Posted 17 days ago
Job Viewed
Job Description
Role Overview
As Manager – AI Information Security, you would be responsible for designing and implementing advanced information security frameworks focused on AI systems. The role ensures the protection of sensitive data, compliance with regulations, and integration of security into AI development workflows. You'll collaborate with AI/ML engineering and data science teams to embed security practices and manage incidents, vulnerabilities, and third-party risks.
Key Responsibilities- Develop AI-specific information security strategies, policies, and governance frameworks.
- Embed risk management best practices and update organisation’s security posture with emerging threat intelligence.
- Implement AI incident response frameworks in line with organisation's information security standards.
- Guide AI/ML engineers and data scientists on secure coding, threat modeling, and secure data workflows.
- Ensure compliance with global data privacy laws and evolving security regulations.
- Lead training initiatives to increase security awareness among AI teams.
- Oversee deployment and optimization of security monitoring tools for continuous AI ecosystem surveillance.
- Manage penetration testing, threat & vulnerability assessments, and drive resilience programs.
- Report security metrics, incidents, and compliance activities to senior leadership and AI Department.
- Align security processes with audit, ethics, and compliance standards.
- Coordinate third-party security assessments on AI tools and platforms.
- Education: Bachelor’s degree in Computer Science, IT, Cybersecurity, or related field. Information Security certifications are preferred.
- Experience:
- Minimum of 4+ years in information or cybersecurity roles.
- Demonstrated experience securing AI/ML-driven environments, ideally within telecom or similar sectors.
- Proficiency in managing security incidents, risk assessments, vulnerabilities, and compliance audits.
- Skills:
- Expertise in cybersecurity frameworks, AI/ML security, data privacy, and cloud platforms.
- Proficient in vulnerability scanning, penetration testing, and incident response methodologies.
- Strong stakeholder engagement and communication capabilities.
Be The First To Know
About the latest Security managers Jobs in South Africa !
AI Information Security Manager
Posted 26 days ago
Job Viewed
Job Description
Role Overview:
As Manager – AI Information Security, you would be responsible for designing and implementing advanced information security frameworks focused on AI systems. The role ensures the protection of sensitive data, compliance with regulations, and integration of security into AI development workflows. You'll collaborate with AI/ML engineering and data science teams to embed security practices and manage incidents, vulnerabilities, and third-party risks.
Key Responsibilities:
- Develop AI-specific information security strategies, policies, and governance frameworks.
- Embed risk management best practices and update organisation’s security posture with emerging threat intelligence.
- Implement AI incident response frameworks in line with organisation's information security standards.
- Guide AI/ML engineers and data scientists on secure coding, threat modeling, and secure data workflows.
- Ensure compliance with global data privacy laws and evolving security regulations.
- Lead training initiatives to increase security awareness among AI teams.
- Oversee deployment and optimization of security monitoring tools for continuous AI ecosystem surveillance.
- Manage penetration testing, threat & vulnerability assessments, and drive resilience programs.
- Report security metrics, incidents, and compliance activities to senior leadership and AI Department.
- Align security processes with audit, ethics, and compliance standards.
- Coordinate third-party security assessments on AI tools and platforms.
Qualifications & Experience:
- Education: Bachelor’s degree in Computer Science, IT, Cybersecurity, or related field. Information Security certifications are preferred.
- Experience:
- Minimum of 4+ years in information or cybersecurity roles.
- Demonstrated experience securing AI/ML-driven environments, ideally within telecom or similar sectors.
- Proficiency in managing security incidents, risk assessments, vulnerabilities, and compliance audits.
- Skills:
- Expertise in cybersecurity frameworks, AI/ML security, data privacy, and cloud platforms.
- Proficient in vulnerability scanning, penetration testing, and incident response methodologies.
- Strong stakeholder engagement and communication capabilities.
Director: Information Security (P5) (Information & Communication Systems: Management Informatio[...]
Posted 25 days ago
Job Viewed
Job Description
Advert reference: uj_
Advert status: Online
Apply by: 21 February 2025
Position SummaryJob category: Education and Training
Campus: Auckland Park Kingsway Campus
Contract: Permanent
Remuneration: Market Related
EE position: EE
IntroductionThe University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.
Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:
- Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses.
- Fulfil management, leadership, technical and administrative roles in the Department.
If you join the Department, you will:
- Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
- Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
- Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
- Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
- Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
- Lead the security documentation process to ensure progress and auditability.
- Lead the implementation of a secure system development life cycle.
- Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
- Conduct information assets security risk assessment.
- Lead the implementation and monitoring of information and data quality standards, policies and procedures.
- Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
- Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
- Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
- Integrate an Information and Cyber Security Risk Management Framework.
- Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
- Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
- Conduct security audits to identify gaps and implement controls to mitigate risks.
- Degree or any relevant qualification (NQF 8).
- 5 to 8 years' of management experience in an Information Security Management.
- Information security, project management and IT service management experience.
- Outsourced services and management of commercial partners.
- Managing strategic change in a dynamic operating environment.
- Translating broad business needs and understanding the key drivers of enterprise applications.
- Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP.
Skills:
- Good interpersonal and communication skills (verbal and written).
- Ability to maintain sound human relations and transfer skills and knowledge.
- Strong decision making and budget control skills.
- Strong Risk management and Cyber security awareness.
- IT Policies and Procedures.
- Collaborating with business managers to determine and deliver value adding IT solutions.
- Ability to manage a multi technology technical support team.
- Knowledge of the latest Information security technologies.
- Firewall standards and protocols.
- Project Management.
Enquiries regarding the job content: Ms Maletsema Phofu on Tel:
Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.
Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University.
For more information, please review the following link: Justice/Criminal/NRSO .
Candidates may be subjected to appropriate psychometric testing and other selection instruments.
In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.
#J-18808-LjbffrDirector: Information Security (P5) (Information & Communication Systems: Management Informatio[...]
Posted today
Job Viewed
Job Description
Advert reference: uj_
Advert status: Online
Apply by: 21 February 2025
Position SummaryJob category: Education and Training
Campus: Auckland Park Kingsway Campus
Contract: Permanent
Remuneration: Market Related
EE position: EE
IntroductionThe University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.
Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:
- Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses.
- Fulfil management, leadership, technical and administrative roles in the Department.
If you join the Department, you will:
- Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
- Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
- Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
- Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
- Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
- Lead the security documentation process to ensure progress and auditability.
- Lead the implementation of a secure system development life cycle.
- Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
- Conduct information assets security risk assessment.
- Lead the implementation and monitoring of information and data quality standards, policies and procedures.
- Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
- Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
- Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
- Integrate an Information and Cyber Security Risk Management Framework.
- Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
- Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
- Conduct security audits to identify gaps and implement controls to mitigate risks.
- Degree or any relevant qualification (NQF 8).
- 5 to 8 years' of management experience in an Information Security Management.
- Information security, project management and IT service management experience.
- Outsourced services and management of commercial partners.
- Managing strategic change in a dynamic operating environment.
- Translating broad business needs and understanding the key drivers of enterprise applications.
- Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP.
Skills:
- Good interpersonal and communication skills (verbal and written).
- Ability to maintain sound human relations and transfer skills and knowledge.
- Strong decision making and budget control skills.
- Strong Risk management and Cyber security awareness.
- IT Policies and Procedures.
- Collaborating with business managers to determine and deliver value adding IT solutions.
- Ability to manage a multi technology technical support team.
- Knowledge of the latest Information security technologies.
- Firewall standards and protocols.
- Project Management.
Enquiries regarding the job content: Ms Maletsema Phofu on Tel:
Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.
Please note that the University is obligated, in terms of recent amendments to the Criminal Law (Sexual Offences and Related Matters) Amendment Act 2021 (Act 13 of 2021) , to assess all prospective employees (including applicants) against the National Register for Sex Offenders (NRSO) . The outcome of such an assessment may have an impact upon possible employment with the University.
For more information, please review the following link: Justice/Criminal/NRSO .
Candidates may be subjected to appropriate psychometric testing and other selection instruments.
In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.
#J-18808-Ljbffr