96 Security System jobs in South Africa
SASOLBURG RECRUITMENT - CCTV Security System Technician (Petrochemical) - 7 months'
Posted today
Job Viewed
Job Description
SUMMARY : POSITION INFO :
One of the leaders in the Energy and Chemical sector is seeking an experienced and qualified CCTV Security System Technician to join the team on a 7-month contract in Sasolburg. Only LOCAL recruitment. Must be able to start immediately, subject to a clear criminal record, medical fitness assessment, and SHE Induction.
Working hours :
Monday - Thursday: 07:00 - 16:15
Friday: 07:00 - 12:00
Key experience and qualifications :
Matric
Diploma in Electrical Engineering Light Current (NQF Level 6), PSIRA Grade 6 (if not in place, will have to complete it within the timeframe provided by the client)
Experience in electronic/security systems
Key skills : Time management, excellent English communication, technical skills, attention to detail
Key responsibilities :
- Maintenance of access control, CCTV, intruder alarms, and electric fences
- Support for security system projects
- System application support - XTIME, Gallagher, Milestone, IndigoVision
SASOLBURG RECRUITMENT - CCTV Security System Technician (Petrochemical) - 7 months'
Posted 11 days ago
Job Viewed
Job Description
One of the leaders in the Energy and chemical sector is seeking an experienced and qualified CCTV Security System Technician to join the team on a 7 month contract in Sasolburg. Only LOCAL recruitment. Must be able to start immediately, subject to clear criminal record, medical fit assessment and SHE Induction.
Working hours:
Monday - Thursday - 7:00 - 16:15
Friday - 7:00 - 12:00
Key experience and qualifications:
Matric
Diploma - Electrical Engineering Light current (NQF Level 6), PSIRA Grade 6 (if not in place, will have to complete it within the timeframe provided by the client)
Experience in electronic / security systems
Key skills:
Time management
Excellent English communication
Technical
Attention to detail
Key performance:
Maintenance of access control, CCTV, intruder alarms and electric fences
Offer security system project support
System application support - XTIME, Gallagher, Milestone, IndigoVision
Information Security Management System (ISMS) Specialist
Posted today
Job Viewed
Job Description
Join to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Information Security Management System (ISMS) SpecialistJoin to apply for the Information Security Management System (ISMS) Specialist role at Vector Logistics
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist is responsible for the end-to-end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO/IEC 27001 standards. The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development And Implementation
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls into third-party contracts and SLAs.
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuring the organization’s security posture is robust and aligned with its strategic objectives.
Qualifications, Skills and Experience Required for the Job
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer Preferrable: ISO27001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding the highest ethical standards in all security practices
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Transportation, Logistics, Supply Chain and Storage
Referrals increase your chances of interviewing at Vector Logistics by 2x
Sign in to set job alerts for “Information Security Specialist” roles.Johannesburg, Gauteng, South Africa 2 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 3 days ago
Johannesburg, Gauteng, South Africa 1 month ago
Randburg, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Randburg, Gauteng, South Africa 5 days ago
Senior Manager: Information Systems Audit (Cyber Security)Pretoria, Gauteng, South Africa 2 weeks ago
Johannesburg Metropolitan Area 3 days ago
Centurion, Gauteng, South Africa 4 days ago
Johannesburg, Gauteng, South Africa 1 day ago
Johannesburg, Gauteng, South Africa 6 days ago
Johannesburg, Gauteng, South Africa 5 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Management System (ISMS) Specialist
Posted today
Job Viewed
Job Description
Information Security Management System (ISMS) Specialist
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development and Implementation:
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
Risk Assessment and Management:
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
Compliance and Audits:
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
Training and Awareness:
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
Incident Response and Management:
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
Continuous Improvement:
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
Vendor and Third-Party Risk Management:
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls intothird-party contracts and SLAs.
Key Relationships
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.
Qualifications, Skills and Experience Required for the Job
Qualifications and Experience
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer
Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
Skills and Competencies
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices
We look forward to hearing from you!
#J-18808-LjbffrInformation Security Management System (ISMS) Specialist
Posted today
Job Viewed
Job Description
Information Security Management System (ISMS) Specialist
Permanent
Midrand
Overview
We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.
But we are also more than that. We are people serving people. While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.
Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.
Job Purpose
Information Security Management System (ISMS) Specialist isresponsible for the end-to-end implementation, maintenance, and continuousimprovement of the Information Security Management System (ISMS) in accordancewith ISO/IEC 27001 standards. The incumbent will play a pivotal role inensuring the confidentiality, integrity, and availability of our informationassets, while also ensuring compliance with legal and regulatory requirements.
Key Responsibilities
ISMS Development and Implementation:
- Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
- Develop, implement, and maintain information security policies, procedures, and guidelines.
- Assess existing information security practices and recommend improvements.
- Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
Risk Assessment and Management:
- Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO 31000.
- Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
- Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.
Compliance and Audits:
- Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.
- Prepare the organization for certification audits and support the audit process.
- Coordinate with auditors and certification bodies.
- Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
Training and Awareness:
- Provide training to staff and management on information security best practices, policies, and compliance requirements.
- Promote a culture of information security awareness across the organization.
- Support the creation of an internal security awareness program.
Incident Response and Management:
- Assist in the development and testing of incident response plans.
- Provide guidance and support in handling information security incidents.
- Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post-incident analysis to determine the cause and recommend preventive actions.
Continuous Improvement:
- Define and monitor ISMS-related KPIs and metrics.
- Monitor and report on the performance of the ISMS, identifying areas for improvement.
- Monitor compliance with security policies and procedures.
- Lead regular internal audits to assess the effectiveness of the ISMS.
- Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
- Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.
Vendor and Third-Party Risk Management:
- Assess and monitor third-party vendors and service providers for information security compliance.
- Assist in the integration of ISMS controls intothird-party contracts and SLAs.
Key Relationships
Key Relationship 1
- This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.
- These interactions are essential for ensuringthe organization’s security posture is robust and aligned with its strategicobjectives.
Qualifications, Skills and Experience Required for the Job
Qualifications and Experience
- Bachelor’s Degree: A bachelor’s degree in information security, Computer Science, Information Technology, or a related field is required.
- Mandatory Requirement: ISO27001 Lead Implementer
Preferrable:ISO27001 Lead Auditor, Certified Information Security Manager (CISM), CertifiedInformation Systems Auditor (CISA)
- The ISMS Specialist role demands a robust combination of technical expertise, specialized knowledge, and strong leadership abilities. The ideal candidate must have an intrinsic understanding of the ISMS statement of applicability.
- The ideal candidate should possess in-depth knowledge of information security frameworks such as ISO/IEC 27001, NIST, and CIS Controls. Familiarity with IT governance frameworks (e.g., COBIT, ITIL)., and have extensive experience in risk management, incident response, and compliance, particularly with South African regulations like POPIA and the Cybercrimes Act.
- Soft skills such as excellent communication, adaptability, attention to detail, and ethical judgment are also vital, enabling the Information Security Compliance Specialist to convey complex security concepts, adapt to evolving threats, and uphold the highest standards of security and privacy within the organization. Experience in BIA, BCM, DR.Include experience in vulnerability management, patching, JML.
- Minimum of 7-10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1-3 years in a managerial or leadership capacity. This experience should include hands-on management of security frameworks such as ISO/IEC 27001 and NIST, as well as significant exposure to risk management, incident response, and compliance with industry regulations.
- Proven experience of leading ISO/IEC 27001 certification projects and certification maintenance.
- Experience in working with ISO27001 certification bodies.
- Development of audit and ISMS remediation plans.
- Familiarity with data protection laws and industry regulations.
- Relevant professional certifications such as CISM, CRISC, or CISA, which validate their expertise in key areas of information security. Knowledge of security tools, including Microsoft Sentinel, CyberReason, and Microsoft Defender, is essential for managing the organization’s security posture effectively.
Skills and Competencies
- Strategic Thinking: Ability to align security strategies with business objectives and anticipate future challenges.
- Technical Expertise: Knowledge of security frameworks, technologies, and tools, with strong proficiency in threat analysis and mitigation.
- People Management: Strong leadership skills to build, manage, and effectively leverage external resources.
- Decision-Making and Judgment: High discretion in making critical security decisions, balancing immediate needs with long-term goals.
- Collaboration and Communication: Excellent interpersonal skills for engaging with both technical and non-technical stakeholders and building strong relationships.
- Problem-Solving and Analytical Skills: Strong analytical abilities to assess and resolve complex security issues across organizational boundaries.
- Compliance and Regulatory Knowledge: In-depth understanding of relevant regulations and standards, ensuring ongoing compliance.
- Adaptability and Resilience: Ability to adapt to changing security landscapes and manage high-pressure situations.
- Ethical Integrity: Commitment to upholding thehighest ethical standards in all security practices
We look forward to hearing from you!
#J-18808-LjbffrTechnical Support
Posted 11 days ago
Job Viewed
Job Description
- The ideal candidate will either have completed some form of IT qualification, or will have experience working in an IT / hardware support role.
- Must have a valid drivers license.
Consultant: Angela Heydenreich - Dante Personnel East Rand
Consultant Information System Security X2
Posted today
Job Viewed
Job Description
Job title : Consultant Information System Security X2
Job Location : KwaZulu-Natal, Pietermaritzburg Deadline : August 24, 2025 Quick Recommended Links
- Jobs by Location
- Job by industries
Key Responsibility Areas
- Design and implement security standards and procedures in systems and security policies and guidelines for all system security processes.
- Secures assets in the information system by defining and addressing possible and real security problems.
- Conduct, monitor and maintain threat and vulnerability assessments on a regular basis to minimize associated risk and improve the security capabilities within operational implementation, such as ICT infrastructure linked to SITA managed networks.
- Manage implementation of information security awareness and training programmes for employees and clients.
- Coordinate ongoing activities related to the development, implementation, and maintenance of information security controls and services aligned to the cyber security framework, policies, standards and procedures.
Qualifications and Experience
- Required Qualification : 3-year National Diploma / Degree in Computer Science or Information Technology or Network Management or a relevant discipline NQF level 6 qualification.
- Certification : Professional IT security management certification e.g. CISSP ITIL Foundation, CoBit Foundation or CISM, GIAC, CCNP, ISACA CRISC CCSP : Certified Cloud Security Professional Advanced certifications such as SANS GIAC / GCIA / GCIH, CISSP or CASP and / or SIEM specific training and certification will be an advantage. Certified information system security professional (CISSP) or Certified Information Security Management (CISM), would be an added advantage.
- Experience : 6 - 7 years ICT Infrastructure or application development experience including IT Security working experience.
Information Security • Pietermaritzburg, ZA
#J-18808-LjbffrBe The First To Know
About the latest Security system Jobs in South Africa !
Specialist, Technical Support
Posted today
Job Viewed
Job Description
Business Segment: Personal & Private Banking
Location: ZA, GP, Johannesburg, Simmonds Street
To design, develop, and maintain mainframe applications to maintain the stability, security, and efficiency of mainframe systems. Perform analysis, testing, debugging, and troubleshooting of mainframe software applications. Create technical documentation and user manuals to support mainframe applications.
Qualifications
Type of Qualification: First Degree
Field of Study: Information Technology
Experience Required
Technology Operations / Infrastructure Production
Technology
5-7 years
5-7 years’ experience with full software development lifecycle (SLDC), within systems development, implementation and maintenance / enhancements of solutions in the corporate sector organisation.
Please note: All our recruitment processes comply with the applicable local laws and regulations. We will never ask for money or any from of payment as part of our recruitment process. If you experience this, please contact our Fraud line on +27 800222050 or
#J-18808-LjbffrTechnical Support Specialist
Posted today
Job Viewed
Job Description
Technical Support Specialist
What’s holding global brands back in South Africa isn’t demand. It’s friction. We’re changing that. If you're excited by complex challenges, care about doing things properly, and thrive in a fast-moving environment, this is a rare opportunity to do your best work.
The problem Precium is solving:
Global businesses want to grow across the continent but broken payment experiences, regulatory minefields, and infrastructure gaps get in the way.
Precium helps global brands reduce payment failures, navigate local regulations, and get paid, reliably and at scale.
We build payment infrastructure that reduces friction, increases revenue, and ensures compliance without compromising performance.
From reconciliation to payouts, we handle the complexity so our clients can operate with confidence.
Our clients include South Africa’s biggest enterprises and some of the world’s most recognisable consumer brands. We're backed by global investors like QED Investors, Partech, and SpeedInvest, and we’re building for scale, for depth, and for the long term.
We’re a team of builders who care about craft, rigour, and impact. We value the effort it takes to do hard things well and we’re excited by the opportunity to shape how the world does business in South Africa.
We give global brands the infrastructure, insight, and control they need to grow in South Africa.
The role
We're seeking a Technical Support Specialist to join our team and play a central role in providing exceptional support to our merchants after they go live on our platform. In this role, you will be responsible for resolving complex technical issues related to our payment platform, API integration, transaction flows, and platform monitoring. You will report to the Payment Operations Manager.
If you thrive in a fast-paced environment and excel at technical troubleshooting with a customer-focused approach, we want to hear from you.
Why this role matters:
As a Technical Support Specialist, you will be crucial in ensuring seamless merchant experiences and maintaining customer trust. Your work will directly impact merchant satisfaction and the smooth operation of our platform.
Why Precium
At Precium, ambition is expected. We believe this is what it takes to build something that lasts.
- Partner with some of the world’s most ambitious merchants and orchestrators as they expand into South Africa.
- Build from first principles whether you're designing a system, solving a client problem, or rewriting a process.
- Join a team that values precision, curiosity, and discipline, and backs it up with high trust and high standards.
- Competitive salary, ESOP, and benefits.
Who you are
You’re a sharp thinker and an even sharper doer. You care about the details, ask good questions, and enjoy learning as you go. You’re motivated by challenges, not discouraged by them. You like solving hard problems with other smart people. You don’t need hand-holding, but you value open feedback and being part of a strong, honest team.
The ideal candidate will possess:
- Technical Troubleshooting – Ability to diagnose and resolve complex technical issues efficiently, especially related to APIs, integration, and transactions.
- API Knowledge – Hands-on experience working with and troubleshooting RESTful APIs, using tools like Postman.
- Coding Languages – Proficiency in multiple programming languages such as JavaScript, Python, or C# to troubleshoot code-level problems.
- Incident Management – Experience managing and resolving platform incidents, including escalating issues to engineering teams.
- Payments Industry Familiarity – Understanding of payment gateways, transaction processing, and related technologies.
Key responsibilities
- Provide advanced technical support for API integration, Postman troubleshooting, and transaction processing.
- Diagnose and troubleshoot integration issues between Precium's platform and merchant systems.
- Monitor the platform to identify and address transaction failures and system performance issues.
- Manage engineering escalations, collaborating closely with developers for timely solutions.
- Assist with card data and vault migrations, ensuring smooth customer transitions.
- Offer support and guidance as the escalation point for unresolved technical issues.
- Document troubleshooting steps, solutions, and platform knowledge to enhance support processes.
Challenges you’ll need to solve
- Tackle complex technical issues in a fast-paced environment where precision is key.
- Serve as a knowledge resource and escalation point for internal and external stakeholders.
- Balance multiple support priorities while maintaining a high standard of customer service.
How we work
At Precium we follow 5 guiding values. These values underpin our day-to-day, guide our decision making both externally and internally and describe who we are.
- We spell Client with a capital C
- We speak and seek truth and transparency
- We are here to win the match together
- We continuously level up
- We take action
Job details
- Cape Town based (Min 1 day in office)
- Preferred start date: 1st June 2025
- Role budget: Disclosed in intro call
- Contractor or permanent: Permanent
This is a chance to do your best work and help lead Precium’s next chapter of growth as we shape how global merchants do business in South Africa.
#J-18808-LjbffrTechnical Support Representative
Posted today
Job Viewed
Job Description
Join to apply for the Technical Support Representative role at RELX .
DescriptionThis position provides high-quality telephonic technical support and problem resolution to customers daily, aiming to meet or exceed department objectives to protect and increase LexisNexis revenues. The role involves initiating escalation processes for unresolved issues and utilizing skills from training, education, or certifications to fulfill responsibilities. It also includes assisting with account-related issues such as ID/password recovery, billing, and general account services. Experienced representatives are expected to share their knowledge to improve team performance, working collaboratively in a team environment.
Qualifications- Bachelor’s degree in a technical field or equivalent experience.
- 1-2 years of relevant experience.
- Experience with software support, including troubleshooting and usability support.
- Experience with internet troubleshooting and website support.
- Supporting accounting applications is a plus.
- Experience with enterprise systems, hardware, or billing support is a plus.
- Ability to multitask across calls, emails, and chat support.
- Quick understanding of key terms for troubleshooting.
- Ability to handle difficult customers and de-escalate situations.
RELX is an equal opportunity employer. Qualified applicants will be considered without regard to race, color, creed, religion, sex, national origin, or other protected characteristics. For accommodations, contact or call 1. .
#J-18808-Ljbffr