Security Specialist

Johannesburg, Gauteng All jobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Why choose Logicalis? It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.

Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation.

We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow.

Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider! We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.

ROLE PURPOSE

The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team.

ROLE AND DELIVERY RESPONSIBILITIES:
  • Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure.
  • Acts as an incident “hunter,” not waiting for escalated incidents.
  • Closely involved in developing, tuning, and implementing threat detection analytics.
  • Acts as the escalation for Tier 1 and 2 SOC Analysts.
  • Responds to and oversees the remediation of a declared security incident.
  • Completes the Root Cause Analysis Report for P1 to P4.
  • Provides guidance to Tier 1 and 2 SOC Analysts.
  • Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack.
  • Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager.
  • Make recommendations to the SOC Manager.
  • Oversees the analysis on running processes and configs on affected systems.
  • Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted.
  • Oversees the containment and recovery.
  • Oversees the deep-dive incident analysis by correlating data from various sources.
  • Validates if a critical system or data set has been impacted.
  • Provides support for analytic methods for detecting threats.
  • Conducts advanced triage based on defined run books of alerts.
  • Undertakes threat intelligence research if need be.
  • Validates false positives, policy violations, intrusion attempts, security threats and potential compromises.
  • Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary.
  • Further analyses alarms by method e.g. credentials compromised and by asset class.
  • Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework.
  • Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time.
  • Closes tickets in the SIEM platform – this would be automatically created into Service Now.
  • Manages security incidents using the SIEM platform and defined operational procedures.
  • Performs a further investigation of potential incidents, and escalate or close events as applicable.
  • Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis.
  • Closes out deeper analysis and review activities.
  • Assist senior SOC staff with operational responsibilities.
PERSON REQUIREMENTS: EXPERIENCE:
  • Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel.
  • Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
  • Strong knowledge and experience working with Linux Operating systems.
  • Good experience working with Nessus or Qualys.
  • Good understanding of the MITRE ATT&CK framework.
  • Good understanding of the ITIL Framework.
  • Brilliant with a support ticketing system and experience in meeting SLA targets.
  • Familiarity with risk management and quality assurance control.
  • Excellent interpersonal skills and professional demeanor.
  • Excellent verbal and written communication skills.
  • Candidate must be eligible to obtain National Security Clearance.
QUALIFICATIONS:
  • Grade 12.
  • SIEM Technology certification.
  • AZ500, SC100.
  • ITIL Foundation qualification.
  • Degree or Diploma in Computer Technology.
  • CompTIA A+, N+ S+.
  • CompTIA CySa, CISSP and CASP+ advantageous.
ADDITIONAL SKILLS/ATTRIBUTES:
  • Advanced Microsoft Excel experience, specifically data interpretation.
  • Good understanding of IT infrastructure.
  • A high command of the English language both written and verbal is essential.
  • Self-motivated with the ability to work unsupervised.
  • Attention to detail.
  • Punctuality.
  • Excellent verbal and written communication skills.
  • Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease.
  • Possess proficient analytical and decision-making skills.
  • Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns.
  • Proficient relationship building skills – predict customer behavior and respond accordingly.
  • A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations.
  • Good communicator with the customer environment.
  • Dynamic but aware of the views and feelings of others.
  • Able to operate as a good team player.
  • Drive and Energy.
  • Demonstrate clear purpose, enthusiasm, and commitment.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Specialist

Johannesburg, Gauteng Logicalis Group (DE)

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Security Specialist in Johannesburg at Logicalis

It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.

Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow

Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!

We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.

Join us and become a part of something epic!

ROLE PURPOSE

The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events

quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.

ROLE AND DELIVERY RESPONSIBILITIES:

The job role includes actively participating in the incident detection process as follows:

  • Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure
  • Acts as an incident “hunter,” not waiting for escalated incidents
  • Closely involved in developing, tuning, and implementing threat detection analytics
  • Acts as the escalation for Tier 1 and 2 SOC Analysts
  • Responds to and oversees the remediation of a declared security incident
  • Completes the Root Cause Analysis Report for P1 to P4
  • Provides guidance to Tier 1 and 2 SOC Analysts
  • Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
  • Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
  • Make recommendations to the SOC Manager
  • Oversees the analysis on running processes and configs on affected systems.
  • Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
  • Oversees the containment and recovery
  • Oversees the deep-dive incident analysis by correlating data from various sources
  • Validates if a critical system or data set has been impacted
  • Provides support for analytic methods for detecting threats
  • Conducts advanced triage based on defined run books of alerts
  • Undertakes threat intelligence research if need be
  • Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
  • Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
  • Further analyses alarms by method e.g. credentials compromised and by asset class
  • Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework
  • Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time
  • Closes tickets in the SIEM platform – this would be automatically created into Service Now
  • Manages security incidents using the SIEM platform and defined operational procedures
  • Performs a further investigation of potential incidents, and escalate or close events as applicable
  • Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
  • Closes out deeper analysis and review activities
  • Assist senior SOC staff with operational responsibilities

PERSON REQUIREMENTS:

EXPERIENCE:

  • Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
  • Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
  • Strong knowledge and experience working with Linux Operating systems
  • Good experience working with Nessus or Qualys
  • Good understanding of the MITRE ATT&CK framework
  • Good understanding of the ITIL Framework.
  • Brilliant with a support ticketing system and experience in meeting SLA targets.
  • Familiarity with risk management and quality assurance control.
  • Excellent interpersonal skills and professional demeanor
  • Excellent verbal and written communication skills
  • Candidate must be eligible to obtain National Security Clearance

QUALIFICATIONS:

  • Grade 12
  • AZ500,SC100
  • Degree or Diploma in Computer Technology
  • CompTIA A+, N+ S+
  • CompTIA CySa, CISSP and CASP+ advantageous

ADDITIONAL SKILLS/ATTRIBUTES:

  • Advanced Microsoft Excel experience, specifically data interpretation
  • Good understanding of IT infrastructure
  • A high command of the English language both written and verbal is essential.
  • Self-motivated with the ability to work unsupervised.
  • Punctuality
  • Excellent verbal and written communication skills
  • Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
  • Possess proficient analytical and decision-making skills
  • Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
  • Proficient relationship building skills – predict customer behavior and respond accordingly
  • A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations
  • Good communicator with the customer environment
  • Dynamic but aware of the views and feelings of others
  • Able to operate as a good team player
  • Drive and Energy
  • Demonstrate clear purpose, enthusiasm, and commitment

If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security specialist

Johannesburg, Gauteng Logicalis Group

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Security Specialist in Johannesburg at Logicalis It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes. Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, Net App, Microsoft, Oracle, VMware and Service Now Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider! We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity. Join us and become a part of something epic! ROLE PURPOSE The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident. ROLE AND DELIVERY RESPONSIBILITIES: The job role includes actively participating in the incident detection process as follows: Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure Acts as an incident “hunter,” not waiting for escalated incidents Closely involved in developing, tuning, and implementing threat detection analytics Acts as the escalation for Tier 1 and 2 SOC Analysts Responds to and oversees the remediation of a declared security incident Completes the Root Cause Analysis Report for P1 to P4 Provides guidance to Tier 1 and 2 SOC Analysts Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager Make recommendations to the SOC Manager Oversees the analysis on running processes and configs on affected systems. Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted Oversees the containment and recovery Oversees the deep-dive incident analysis by correlating data from various sources Validates if a critical system or data set has been impacted Provides support for analytic methods for detecting threats Conducts advanced triage based on defined run books of alerts Undertakes threat intelligence research if need be Validates false positives, policy violations, intrusion attempts, security threats and potential compromises Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary Further analyses alarms by method e.g. credentials compromised and by asset class Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time Closes tickets in the SIEM platform – this would be automatically created into Service Now Manages security incidents using the SIEM platform and defined operational procedures Performs a further investigation of potential incidents, and escalate or close events as applicable Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis Closes out deeper analysis and review activities Assist senior SOC staff with operational responsibilities PERSON REQUIREMENTS: EXPERIENCE: Strong knowledge and experience working with SIEM Solutions, QRadar, Mc Afee ESM, Azure Sentinel Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange. Strong knowledge and experience working with Linux Operating systems Good experience working with Nessus or Qualys Good understanding of the MITRE ATT&CK framework Good understanding of the ITIL Framework. Brilliant with a support ticketing system and experience in meeting SLA targets. Familiarity with risk management and quality assurance control. Excellent interpersonal skills and professional demeanor Excellent verbal and written communication skills Candidate must be eligible to obtain National Security Clearance QUALIFICATIONS: Grade 12 AZ500, SC100 Degree or Diploma in Computer Technology Comp TIA A+, N+ S+ Comp TIA Cy Sa, CISSP and CASP+ advantageous ADDITIONAL SKILLS/ATTRIBUTES: Advanced Microsoft Excel experience, specifically data interpretation Good understanding of IT infrastructure A high command of the English language both written and verbal is essential. Self-motivated with the ability to work unsupervised. Punctuality Excellent verbal and written communication skills Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease Possess proficient analytical and decision-making skills Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns Proficient relationship building skills – predict customer behavior and respond accordingly A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations Good communicator with the customer environment Dynamic but aware of the views and feelings of others Able to operate as a good team player Drive and Energy Demonstrate clear purpose, enthusiasm, and commitment If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security specialist

Johannesburg, Gauteng Logicalis Group

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Security Specialist in Johannesburg at Logicalis It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes. Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, Net App, Microsoft, Oracle, VMware and Service Now Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider! We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity. Join us and become a part of something epic! ROLE PURPOSE The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident. ROLE AND DELIVERY RESPONSIBILITIES: The job role includes actively participating in the incident detection process as follows: Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure Acts as an incident “hunter,” not waiting for escalated incidents Closely involved in developing, tuning, and implementing threat detection analytics Acts as the escalation for Tier 1 and 2 SOC Analysts Responds to and oversees the remediation of a declared security incident Completes the Root Cause Analysis Report for P1 to P4 Provides guidance to Tier 1 and 2 SOC Analysts Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager Make recommendations to the SOC Manager Oversees the analysis on running processes and configs on affected systems. Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted Oversees the containment and recovery Oversees the deep-dive incident analysis by correlating data from various sources Validates if a critical system or data set has been impacted Provides support for analytic methods for detecting threats Conducts advanced triage based on defined run books of alerts Undertakes threat intelligence research if need be Validates false positives, policy violations, intrusion attempts, security threats and potential compromises Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary Further analyses alarms by method e.g. credentials compromised and by asset class Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time Closes tickets in the SIEM platform – this would be automatically created into Service Now Manages security incidents using the SIEM platform and defined operational procedures Performs a further investigation of potential incidents, and escalate or close events as applicable Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis Closes out deeper analysis and review activities Assist senior SOC staff with operational responsibilities PERSON REQUIREMENTS: EXPERIENCE: Strong knowledge and experience working with SIEM Solutions, QRadar, Mc Afee ESM, Azure Sentinel Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange. Strong knowledge and experience working with Linux Operating systems Good experience working with Nessus or Qualys Good understanding of the MITRE ATT&CK framework Good understanding of the ITIL Framework. Brilliant with a support ticketing system and experience in meeting SLA targets. Familiarity with risk management and quality assurance control. Excellent interpersonal skills and professional demeanor Excellent verbal and written communication skills Candidate must be eligible to obtain National Security Clearance QUALIFICATIONS: Grade 12 AZ500, SC100 Degree or Diploma in Computer Technology Comp TIA A+, N+ S+ Comp TIA Cy Sa, CISSP and CASP+ advantageous ADDITIONAL SKILLS/ATTRIBUTES: Advanced Microsoft Excel experience, specifically data interpretation Good understanding of IT infrastructure A high command of the English language both written and verbal is essential. Self-motivated with the ability to work unsupervised. Punctuality Excellent verbal and written communication skills Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease Possess proficient analytical and decision-making skills Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns Proficient relationship building skills – predict customer behavior and respond accordingly A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations Good communicator with the customer environment Dynamic but aware of the views and feelings of others Able to operate as a good team player Drive and Energy Demonstrate clear purpose, enthusiasm, and commitment If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Specialist

Midrand, Gauteng ExecutivePlacements.com - The JOB Portal

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Cyber Security Specialist role at ExecutivePlacements.com - The JOB Portal

1 week ago Be among the first 25 applicants

Join to apply for the Cyber Security Specialist role at ExecutivePlacements.com - The JOB Portal

Get AI-powered advice on this job and more exclusive features.

SUMMARY:

Psybergate is an IT company that builds bespoke software solutions and provides highly skilled resources to its clients.

Cyber Security Specialist

Recruiter:

Penny The Recruiter

Job Ref:

PR /RN

Date posted:

Tuesday, June 24, 2025

Location:

Midrand, South Africa

Salary:

Monthly

SUMMARY:

Psybergate is an IT company that builds bespoke software solutions and provides highly skilled resources to its clients.

We are looking for a Cybersecurity Engineer to join our client based in JHB North.

An established AWS-driven technology solutions company is looking for a Cybersecurity Engineer who thrives in both technical execution and client-facing engagement. If you’re passionate about cloud security and enjoy designing and deploying secure environments for real clients, this role is for you. This is a 6-month Contract with the view to go perm.

POSITION INFO:

What you will be doing:

  • Collaborate with the sales team as the technical security expert during pre-sales engagements.
  • Conduct client workshops, requirements gathering, and security assessments.
  • Design, present, and implement cloud-based security architectures on AWS.
  • Configure and deploy AWS security services.
  • Stay updated with AWS security trends and contribute to continuous improvement of offerings.

What we are looking for :

Technical Expertise

  • 6+ years in IT security, with recent experience in cloud (AWS) security.
  • Strong experience with AWS-native tools
  • Familiarity with security benchmarks and frameworks (CIS, NIST, ISO 27001, etc.).

Consulting/Pre-Sales Skills

  • Prior experience supporting pre-sales or working in a client-facing tech role.
  • Excellent ability to explain technical solutions to both technical and non-technical audiences.
  • Skilled in preparing diagrams, proposals, or solution documentation.

Certifications

  • AWS Security Specialty certification is a strong advantage.
  • Other relevant certs like Security+, CEH, CISSP, etc. will be considered.

Please note that if you do not hear from us within 3 weeks, consider your application unsuccessful.



Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Engineering and Information Technology
  • Industries Advertising Services

Referrals increase your chances of interviewing at ExecutivePlacements.com - The JOB Portal by 2x

Sign in to set job alerts for “Cyber Security Specialist” roles.

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg Metropolitan Area 2 days ago

Talent Pool: Information Security Administrator

Johannesburg Metropolitan Area 2 days ago

Johannesburg, Gauteng, South Africa 8 hours ago

Johannesburg, Gauteng, South Africa 3 days ago

Illovo, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg Metropolitan Area 5 days ago

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 2 months ago

IT, Network and Cybersecurity Support Technician

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

Woodmead, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 month ago

Messaging Security Analyst I (Threat Protection)

Johannesburg, Gauteng, South Africa 5 days ago

Johannesburg, Gauteng, South Africa 7 months ago

Johannesburg, Gauteng, South Africa 4 days ago

Associate Messaging Security Analyst - Threat Protection

Johannesburg, Gauteng, South Africa 5 days ago

Johannesburg, Gauteng, South Africa 1 week ago

Customer Success Engineer - Cyber Security Security Analyst - Penetration Testing & Red Teaming

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

Randburg, Gauteng, South Africa 8 hours ago

Randburg, Gauteng, South Africa 8 hours ago

Illovo, Gauteng, South Africa 8 months ago

Associate Messaging Security Analyst - Threat Protection

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Specialist

Johannesburg, Gauteng HCLTech

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Minimum of 3 years tertiary qualification in Information Technology/Engineering

CISSP / CISM / CGEIT certification (one of)

SABSA, Cloud Security and/or TOGAF qualification will be an advantage

Business analysis/architecture qualifications

Other qualifications (CompTIA Security+, ITIL, COBIT) are an advantage

Experience

  • Minimum of 3+ years of relevant work experience in Information Security
  • Experience in designing and implementing cybersecurity systems architectures
  • Experience in managing and implementing large-scale security projects
  • Advanced working understanding of the information technology environment of a telecom company
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions
  • Other security experience such as NAC, Cisco ISE, CASB Solution Netskope, Web security technologies, architecture, operations, GRC, OWASP, etc.
  • Able to provide the Project and existing Security teams the necessary guidance to build policies, standards, risks, and controls frameworks that meet MTN Group and operational requirements of the business
  • Good experience in security architecture design in Cloud and on-prem
  • Design and implementation of NGFW PA/Fortinet/IoT/Endpoint protection/multi-factor authentication
  • Understanding of authentication and authorization technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, AD security products
  • Knowledge of web application architectures

CV should have keywords :

  • Threat assessment
  • IAM tools
  • Evaluate and oversee the security of outsourced / third-party technologies and hosting environments to ensure they provide adequate protection for the processing, transmission, and storage of MTN’s information: − Implement reference architecture for integrating with third parties and partners − Implement mechanisms for vetting and implementing integration with cloud providers − Develop and implement architectural and development standards for third party technologies

Experience in designing and implementing cybersecurity systems architectures.

Seniority level
  • Mid-Senior level
Employment type
  • Contract
Job function
  • Consulting, Information Technology, and Human Resources
  • Industries: Software Development and Industrial Machinery Manufacturing

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Johannesburg, Gauteng Kalagadi

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.

TASK AND RESPONSIBILITIES:

  1. Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
  2. Perform research, testing, evaluating, and deployment of security technology and procedures.
  3. Run diagnostics on any changes to data to verify any undetected breaches.
  4. Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
  5. Develop and implement information security standards, guidelines, and procedures.
  6. Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
  7. Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
  8. Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.

FUNCTIONAL KNOWLEDGE:

Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.

MINIMUM REQUIREMENTS

• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.

EXPERIENCE

• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security officers Jobs in Johannesburg !

Aviation Security Specialist

Kempton Park, Gauteng SAA Technical (SOC) Ltd

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

To oversee the maintenance of physical security, access control policy, standards and procedures for SAAT.

Provide expertise and advice and deliver effective and efficient security Aviation Security (AVSEC) services to ensure security operational excellence, protection of SAAT as a national key point and integrity of the SAAT operations.

Ensure the protection and safeguarding of SAAT personnel and customers, aircraft and facilities, against acts of unlawful interference perpetrated on the ground or aircraft.

Key Details
  • Seniority level: Entry level
  • Employment type: Full-time
  • Job function: Other, Information Technology, and Management
  • Industries: Airlines and Aviation

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Aviation Security Specialist

Kempton Park, Gauteng R80000 - R120000 Y SAA Technical (SOC) Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

To oversee the maintenance of physical security, access control policy, standards and procedures for SAAT.

Provide expertise and advice and deliver effective and efficient security Aviation Security (AVSEC) services to ensure security operational excellence, protection of SAAT as a national key point and integrity of the SAAT operations.

Ensure the protection and safeguarding of SAAT personnel and customers, aircraft and facilities, against acts of unlawful interference perpetrated on the ground or aircraft.

This advertiser has chosen not to accept applicants from your region.

Cyber Security Specialist

New
Midrand, Gauteng R900000 - R1200000 Y Optimal Growth Technologies

Posted today

Job Viewed

Tap Again To Close

Job Description

Principal Specialist Cyber Security Networks
Location: Midrand
Duration: 6 months
Role purpose
:

  • Lead the development and implementation of advanced cyber security capabilities and controls across companies mobile, fixed, satellite, cloud, and IoT networks to protect against evolving threats.
  • Oversee risk assessments, stakeholder engagement, and project delivery in alignment with regulatory requirements.
  • Provide leadership and mentorship to junior team members, fostering innovation and ensuring effective execution of security controls.

Key Accountabilities

  • Lead Security Implementation
  • Drive the design and execution of cyber security implementations for mobile, fixed, satellite, cloud, and IoT networks, ensuring resilience against sophisticated threats.
  • Direct Workstream Delivery
  • Manage the end-to-end delivery of key security initiatives for Enterprise domains
  • Enterprise CPE, Core Network, Network Management Systems, Office Connectivity,
  • Cyber Security Controls - Monitoring & Analytics, and Measurement & Assurance
  • covering scope definition, design, deployment, and performance review to prevent lateral attack movement.
  • Cyber Risk and Compliance Management
  • Conduct targeted risk assessments and apply security controls to address vulnerabilities across network infrastructure, maintaining compliance with ISO 27001, NIST, and applicable regulatory frameworks.

Core competencies, knowledge, and experience:

  • Matric / Grade 12 essential
  • 3 year DegreeRelevant tertiary qualification in Information technology
  • 8+ years of experience in Cyber Security role where you meet business deliverables for Enterprise/IP Networks
  • Strong understanding of cyber risk management and security frameworks, such as NIST, ISO 27001, and CIS Controls.
  • Strong knowledge of Enterprise/Fixed networks
  • Excellent problem-solving skills, with the ability to identify and analyse complex issues
  • Strong communication skills, both written and verbal
  • Ability to work collaboratively with cross functional teams and stakeholders
  • Strong leadership skills, with the ability to lead and manage teams effectively
  • Strong organizational skills, with the ability to manage multiple tasks and priorities
  • Monitoring and Assurance Enhancement
  • Implement sustainable processes for near real-time threat detection and continuous security posture assessment, integrating monitoring tools such as SIEM and NetFlow, and ensuring second-line assurance to validate control effectiveness.
  • Leadership and Capability Development
  • Provide guidance and mentorship to junior cyber security professionals, fostering a culture of innovation, collaboration, and excellence to ensure effective security control execution in line with strategic and operational goals.

Desired

  • An industry certification e.g. ISO 27001 Lead practitioner, CCIE(Security), CCSP CGEIT, CRISC, CISA, CISM and CISSP/CSSP is strongly preferred
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Officers Jobs View All Jobs in Johannesburg