52 Security Officers jobs in Johannesburg
Security Specialist
Posted 3 days ago
Job Viewed
Job Description
Why choose Logicalis? It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.
Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation.
We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow.
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider! We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
ROLE PURPOSEThe Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team.
ROLE AND DELIVERY RESPONSIBILITIES:- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure.
- Acts as an incident “hunter,” not waiting for escalated incidents.
- Closely involved in developing, tuning, and implementing threat detection analytics.
- Acts as the escalation for Tier 1 and 2 SOC Analysts.
- Responds to and oversees the remediation of a declared security incident.
- Completes the Root Cause Analysis Report for P1 to P4.
- Provides guidance to Tier 1 and 2 SOC Analysts.
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack.
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager.
- Make recommendations to the SOC Manager.
- Oversees the analysis on running processes and configs on affected systems.
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted.
- Oversees the containment and recovery.
- Oversees the deep-dive incident analysis by correlating data from various sources.
- Validates if a critical system or data set has been impacted.
- Provides support for analytic methods for detecting threats.
- Conducts advanced triage based on defined run books of alerts.
- Undertakes threat intelligence research if need be.
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises.
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary.
- Further analyses alarms by method e.g. credentials compromised and by asset class.
- Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework.
- Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time.
- Closes tickets in the SIEM platform – this would be automatically created into Service Now.
- Manages security incidents using the SIEM platform and defined operational procedures.
- Performs a further investigation of potential incidents, and escalate or close events as applicable.
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis.
- Closes out deeper analysis and review activities.
- Assist senior SOC staff with operational responsibilities.
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel.
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
- Strong knowledge and experience working with Linux Operating systems.
- Good experience working with Nessus or Qualys.
- Good understanding of the MITRE ATT&CK framework.
- Good understanding of the ITIL Framework.
- Brilliant with a support ticketing system and experience in meeting SLA targets.
- Familiarity with risk management and quality assurance control.
- Excellent interpersonal skills and professional demeanor.
- Excellent verbal and written communication skills.
- Candidate must be eligible to obtain National Security Clearance.
- Grade 12.
- SIEM Technology certification.
- AZ500, SC100.
- ITIL Foundation qualification.
- Degree or Diploma in Computer Technology.
- CompTIA A+, N+ S+.
- CompTIA CySa, CISSP and CASP+ advantageous.
- Advanced Microsoft Excel experience, specifically data interpretation.
- Good understanding of IT infrastructure.
- A high command of the English language both written and verbal is essential.
- Self-motivated with the ability to work unsupervised.
- Attention to detail.
- Punctuality.
- Excellent verbal and written communication skills.
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease.
- Possess proficient analytical and decision-making skills.
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns.
- Proficient relationship building skills – predict customer behavior and respond accordingly.
- A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations.
- Good communicator with the customer environment.
- Dynamic but aware of the views and feelings of others.
- Able to operate as a good team player.
- Drive and Energy.
- Demonstrate clear purpose, enthusiasm, and commitment.
Security Specialist
Posted 3 days ago
Job Viewed
Job Description
It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.
Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!
We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
Join us and become a part of something epic!
ROLE PURPOSE
The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events
quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.
ROLE AND DELIVERY RESPONSIBILITIES:
The job role includes actively participating in the incident detection process as follows:
- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure
- Acts as an incident “hunter,” not waiting for escalated incidents
- Closely involved in developing, tuning, and implementing threat detection analytics
- Acts as the escalation for Tier 1 and 2 SOC Analysts
- Responds to and oversees the remediation of a declared security incident
- Completes the Root Cause Analysis Report for P1 to P4
- Provides guidance to Tier 1 and 2 SOC Analysts
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
- Make recommendations to the SOC Manager
- Oversees the analysis on running processes and configs on affected systems.
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
- Oversees the containment and recovery
- Oversees the deep-dive incident analysis by correlating data from various sources
- Validates if a critical system or data set has been impacted
- Provides support for analytic methods for detecting threats
- Conducts advanced triage based on defined run books of alerts
- Undertakes threat intelligence research if need be
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
- Further analyses alarms by method e.g. credentials compromised and by asset class
- Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework
- Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time
- Closes tickets in the SIEM platform – this would be automatically created into Service Now
- Manages security incidents using the SIEM platform and defined operational procedures
- Performs a further investigation of potential incidents, and escalate or close events as applicable
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
- Closes out deeper analysis and review activities
- Assist senior SOC staff with operational responsibilities
PERSON REQUIREMENTS:
EXPERIENCE:
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
- Strong knowledge and experience working with Linux Operating systems
- Good experience working with Nessus or Qualys
- Good understanding of the MITRE ATT&CK framework
- Good understanding of the ITIL Framework.
- Brilliant with a support ticketing system and experience in meeting SLA targets.
- Familiarity with risk management and quality assurance control.
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
- Candidate must be eligible to obtain National Security Clearance
QUALIFICATIONS:
- Grade 12
- AZ500,SC100
- Degree or Diploma in Computer Technology
- CompTIA A+, N+ S+
- CompTIA CySa, CISSP and CASP+ advantageous
ADDITIONAL SKILLS/ATTRIBUTES:
- Advanced Microsoft Excel experience, specifically data interpretation
- Good understanding of IT infrastructure
- A high command of the English language both written and verbal is essential.
- Self-motivated with the ability to work unsupervised.
- Punctuality
- Excellent verbal and written communication skills
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
- Possess proficient analytical and decision-making skills
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
- Proficient relationship building skills – predict customer behavior and respond accordingly
- A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations
- Good communicator with the customer environment
- Dynamic but aware of the views and feelings of others
- Able to operate as a good team player
- Drive and Energy
- Demonstrate clear purpose, enthusiasm, and commitment
If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.
#J-18808-LjbffrSecurity specialist
Posted today
Job Viewed
Job Description
Security specialist
Posted today
Job Viewed
Job Description
Cyber Security Specialist
Posted 3 days ago
Job Viewed
Job Description
Join to apply for the Cyber Security Specialist role at ExecutivePlacements.com - The JOB Portal
1 week ago Be among the first 25 applicants
Join to apply for the Cyber Security Specialist role at ExecutivePlacements.com - The JOB Portal
Get AI-powered advice on this job and more exclusive features.
SUMMARY:
Psybergate is an IT company that builds bespoke software solutions and provides highly skilled resources to its clients.
Cyber Security Specialist
Recruiter:
Penny The Recruiter
Job Ref:
PR /RN
Date posted:
Tuesday, June 24, 2025
Location:
Midrand, South Africa
Salary:
Monthly
SUMMARY:
Psybergate is an IT company that builds bespoke software solutions and provides highly skilled resources to its clients.
We are looking for a Cybersecurity Engineer to join our client based in JHB North.
An established AWS-driven technology solutions company is looking for a Cybersecurity Engineer who thrives in both technical execution and client-facing engagement. If you’re passionate about cloud security and enjoy designing and deploying secure environments for real clients, this role is for you. This is a 6-month Contract with the view to go perm.
POSITION INFO:
What you will be doing:
- Collaborate with the sales team as the technical security expert during pre-sales engagements.
- Conduct client workshops, requirements gathering, and security assessments.
- Design, present, and implement cloud-based security architectures on AWS.
- Configure and deploy AWS security services.
- Stay updated with AWS security trends and contribute to continuous improvement of offerings.
Technical Expertise
- 6+ years in IT security, with recent experience in cloud (AWS) security.
- Strong experience with AWS-native tools
- Familiarity with security benchmarks and frameworks (CIS, NIST, ISO 27001, etc.).
- Prior experience supporting pre-sales or working in a client-facing tech role.
- Excellent ability to explain technical solutions to both technical and non-technical audiences.
- Skilled in preparing diagrams, proposals, or solution documentation.
- AWS Security Specialty certification is a strong advantage.
- Other relevant certs like Security+, CEH, CISSP, etc. will be considered.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Engineering and Information Technology
- Industries Advertising Services
Referrals increase your chances of interviewing at ExecutivePlacements.com - The JOB Portal by 2x
Sign in to set job alerts for “Cyber Security Specialist” roles.Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 2 days ago
Talent Pool: Information Security AdministratorJohannesburg Metropolitan Area 2 days ago
Johannesburg, Gauteng, South Africa 8 hours ago
Johannesburg, Gauteng, South Africa 3 days ago
Illovo, Gauteng, South Africa 1 month ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 5 days ago
Johannesburg Metropolitan Area 1 week ago
Johannesburg, Gauteng, South Africa 2 months ago
IT, Network and Cybersecurity Support TechnicianJohannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
Woodmead, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 month ago
Messaging Security Analyst I (Threat Protection)Johannesburg, Gauteng, South Africa 5 days ago
Johannesburg, Gauteng, South Africa 7 months ago
Johannesburg, Gauteng, South Africa 4 days ago
Associate Messaging Security Analyst - Threat ProtectionJohannesburg, Gauteng, South Africa 5 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Customer Success Engineer - Cyber Security Security Analyst - Penetration Testing & Red TeamingJohannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
Randburg, Gauteng, South Africa 8 hours ago
Randburg, Gauteng, South Africa 8 hours ago
Illovo, Gauteng, South Africa 8 months ago
Associate Messaging Security Analyst - Threat ProtectionJohannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCyber Security Specialist
Posted 3 days ago
Job Viewed
Job Description
Minimum of 3 years tertiary qualification in Information Technology/Engineering
CISSP / CISM / CGEIT certification (one of)
SABSA, Cloud Security and/or TOGAF qualification will be an advantage
Business analysis/architecture qualifications
Other qualifications (CompTIA Security+, ITIL, COBIT) are an advantage
Experience
- Minimum of 3+ years of relevant work experience in Information Security
- Experience in designing and implementing cybersecurity systems architectures
- Experience in managing and implementing large-scale security projects
- Advanced working understanding of the information technology environment of a telecom company
- Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions
- Other security experience such as NAC, Cisco ISE, CASB Solution Netskope, Web security technologies, architecture, operations, GRC, OWASP, etc.
- Able to provide the Project and existing Security teams the necessary guidance to build policies, standards, risks, and controls frameworks that meet MTN Group and operational requirements of the business
- Good experience in security architecture design in Cloud and on-prem
- Design and implementation of NGFW PA/Fortinet/IoT/Endpoint protection/multi-factor authentication
- Understanding of authentication and authorization technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
- Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, AD security products
- Knowledge of web application architectures
CV should have keywords :
- Threat assessment
- IAM tools
- Evaluate and oversee the security of outsourced / third-party technologies and hosting environments to ensure they provide adequate protection for the processing, transmission, and storage of MTN’s information: − Implement reference architecture for integrating with third parties and partners − Implement mechanisms for vetting and implementing integration with cloud providers − Develop and implement architectural and development standards for third party technologies
Experience in designing and implementing cybersecurity systems architectures.
Seniority level- Mid-Senior level
- Contract
- Consulting, Information Technology, and Human Resources
- Industries: Software Development and Industrial Machinery Manufacturing
Information Security Specialist
Posted 3 days ago
Job Viewed
Job Description
ROLE DESCRIPTION: Information security specialists focus on keeping an organisation’s data and IT infrastructure secure, which requires a diverse set of skills and responsibilities.
TASK AND RESPONSIBILITIES:
- Conduct threat and risk analysis and analyse the business impact of new and existing systems and technologies to eliminate risk, performance, and capacity issues. Implement vulnerability assessments and configure audits of operating systems, web servers, databases, and detect patterns, insecure features, and malicious activities in the infrastructure.
- Perform research, testing, evaluating, and deployment of security technology and procedures.
- Run diagnostics on any changes to data to verify any undetected breaches.
- Develop custom systems for specialized security features and procedures for software systems, networks, data centres, and hardware.
- Develop and implement information security standards, guidelines, and procedures.
- Keep current with new intrusion methods and develop protection plans. Have an in-depth understanding of vulnerabilities, management systems, and common security applications.
- Conduct counteractive protocols and report incidents. Offer customized risk ratings for vulnerabilities based on company policies and maintain IT security controls documentation.
- Provide customized security assessments, implement security policies, design security training materials, organize training sessions, provide technical support, and communicate security policies and procedures.
FUNCTIONAL KNOWLEDGE:
Contribute to strategy formulation & execution; business requirement analysis; Incident Management and Response; Business Threat Identification and Communication; Information Risk Assessment and Management; Regulatory and Legal Frameworks; Change Management and Change Risk; GRC and Security Standards, Policies and Practices; Information Risks within Systems and IT Architecture; Information Risks within people and processes; Infrastructure Risks to business delivery; Enterprise and Security Architecture; Operational Security Practices and Management; Information Security Awareness.
MINIMUM REQUIREMENTS• NQF 7 Bachelor's degree in Cybersecurity or a related area, such as computer science or related fields.
EXPERIENCE• 5 - 6 years or more practical experience in IT and Information Security Governance, of which must include at least 3 years in an active Information Risk management role.
#J-18808-LjbffrBe The First To Know
About the latest Security officers Jobs in Johannesburg !
Aviation Security Specialist
Posted 3 days ago
Job Viewed
Job Description
To oversee the maintenance of physical security, access control policy, standards and procedures for SAAT.
Provide expertise and advice and deliver effective and efficient security Aviation Security (AVSEC) services to ensure security operational excellence, protection of SAAT as a national key point and integrity of the SAAT operations.
Ensure the protection and safeguarding of SAAT personnel and customers, aircraft and facilities, against acts of unlawful interference perpetrated on the ground or aircraft.
Key Details- Seniority level: Entry level
- Employment type: Full-time
- Job function: Other, Information Technology, and Management
- Industries: Airlines and Aviation
Aviation Security Specialist
Posted today
Job Viewed
Job Description
To oversee the maintenance of physical security, access control policy, standards and procedures for SAAT.
Provide expertise and advice and deliver effective and efficient security Aviation Security (AVSEC) services to ensure security operational excellence, protection of SAAT as a national key point and integrity of the SAAT operations.
Ensure the protection and safeguarding of SAAT personnel and customers, aircraft and facilities, against acts of unlawful interference perpetrated on the ground or aircraft.
Cyber Security Specialist
Posted today
Job Viewed
Job Description
Principal Specialist Cyber Security Networks
Location: Midrand
Duration: 6 months
Role purpose
:
- Lead the development and implementation of advanced cyber security capabilities and controls across companies mobile, fixed, satellite, cloud, and IoT networks to protect against evolving threats.
- Oversee risk assessments, stakeholder engagement, and project delivery in alignment with regulatory requirements.
- Provide leadership and mentorship to junior team members, fostering innovation and ensuring effective execution of security controls.
Key Accountabilities
- Lead Security Implementation
- Drive the design and execution of cyber security implementations for mobile, fixed, satellite, cloud, and IoT networks, ensuring resilience against sophisticated threats.
- Direct Workstream Delivery
- Manage the end-to-end delivery of key security initiatives for Enterprise domains
- Enterprise CPE, Core Network, Network Management Systems, Office Connectivity,
- Cyber Security Controls - Monitoring & Analytics, and Measurement & Assurance
- covering scope definition, design, deployment, and performance review to prevent lateral attack movement.
- Cyber Risk and Compliance Management
- Conduct targeted risk assessments and apply security controls to address vulnerabilities across network infrastructure, maintaining compliance with ISO 27001, NIST, and applicable regulatory frameworks.
Core competencies, knowledge, and experience:
- Matric / Grade 12 essential
- 3 year DegreeRelevant tertiary qualification in Information technology
- 8+ years of experience in Cyber Security role where you meet business deliverables for Enterprise/IP Networks
- Strong understanding of cyber risk management and security frameworks, such as NIST, ISO 27001, and CIS Controls.
- Strong knowledge of Enterprise/Fixed networks
- Excellent problem-solving skills, with the ability to identify and analyse complex issues
- Strong communication skills, both written and verbal
- Ability to work collaboratively with cross functional teams and stakeholders
- Strong leadership skills, with the ability to lead and manage teams effectively
- Strong organizational skills, with the ability to manage multiple tasks and priorities
- Monitoring and Assurance Enhancement
- Implement sustainable processes for near real-time threat detection and continuous security posture assessment, integrating monitoring tools such as SIEM and NetFlow, and ensuring second-line assurance to validate control effectiveness.
- Leadership and Capability Development
- Provide guidance and mentorship to junior cyber security professionals, fostering a culture of innovation, collaboration, and excellence to ensure effective security control execution in line with strategic and operational goals.
Desired
- An industry certification e.g. ISO 27001 Lead practitioner, CCIE(Security), CCSP CGEIT, CRISC, CISA, CISM and CISSP/CSSP is strongly preferred