618 Senior Security Specialists jobs in South Africa

Information Security Architect

Johannesburg, Gauteng InfyStrat

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities:

  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
  • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
  • Define portfolio vision and reusable security patterns aligned with the EA strategy.
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
  • Manage security architects and mentor engineers, developers, and vendors.

What will you bring?

  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
  • Teamwork and Energy – work across different functional and business teams with effective collaboration.
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

Requirements / Skills and Competence

  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture.
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures.
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
  • Good experience in security architecture design in Cloud and on-prem.
  • Design and implementation of IOT, endpoint protection, and secure IAM.
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Architect

Johannesburg, Gauteng InfyStrat Software Services

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities
  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level - thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS
  • Evaluates and selects security technologies, tools, and frameworks to support the organization's security
  • Define portfolio vision and reusable security patterns aligned with the EA strategy
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS
  • Manage security architects and mentor engineers, developers, and vendors
What will you bring?
  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture
  • Teamwork and Energy - work across different functional and business teams with effective collaboration
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF)
Requirements
  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business
  • Good experience in security architecture design in Cloud and on-prem
  • Design and implementation of IOT, endpoint protection, and secure IAM
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling
Seniority level
  • Mid-Senior level
Employment type
  • Contract
Job function
  • Information Technology
Industries
  • IT Services and IT Consulting
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security architect

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job title: Information Security Architect Contract duration: Start with 6 months First preference: EEE candidates Location: JHB The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital. Key Responsibilities: Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems. Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS. Evaluates and selects security technologies, tools, and frameworks to support the organization’s security. Define portfolio vision and reusable security patterns aligned with the EA strategy. Lead architecture reviews for high-risk projects, driving recommendations to resolution. Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance. Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Experience with Cloud Security platform vendors and technologies such as Azure and AWS. Manage security architects and mentor engineers, developers, and vendors. What will you bring? Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls. Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items. Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture. Teamwork and Energy – work across different functional and business teams with effective collaboration. Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and Dev Sec Ops toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking. Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards. Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF). Requirements / Skills and Competence Tertiary qualification in Computer Science, Engineering, or related field (preferred) Minimum of 5-10 years of experience in Security Architecture. CISSP, CISA, CISM, or other relevant security-related designation(s) preferred. Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP) Experience in identifying gaps in existing architectures. Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid Iaa S/Paa S/Saa S solutions. Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies. Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business. Good experience in security architecture design in Cloud and on-prem. Design and implementation of IOT, endpoint protection, and secure IAM. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products Knowledge of web application architectures and threat modelling. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security architect

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job title: Information Security Architect Contract duration: Start with 6 months First preference: EEE candidates Location: JHB The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital. Key Responsibilities: Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems. Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS. Evaluates and selects security technologies, tools, and frameworks to support the organization’s security. Define portfolio vision and reusable security patterns aligned with the EA strategy. Lead architecture reviews for high-risk projects, driving recommendations to resolution. Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance. Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Experience with Cloud Security platform vendors and technologies such as Azure and AWS. Manage security architects and mentor engineers, developers, and vendors. What will you bring? Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls. Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items. Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture. Teamwork and Energy – work across different functional and business teams with effective collaboration. Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and Dev Sec Ops toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking. Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards. Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF). Requirements / Skills and Competence Tertiary qualification in Computer Science, Engineering, or related field (preferred) Minimum of 5-10 years of experience in Security Architecture. CISSP, CISA, CISM, or other relevant security-related designation(s) preferred. Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP) Experience in identifying gaps in existing architectures. Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid Iaa S/Paa S/Saa S solutions. Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies. Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business. Good experience in security architecture design in Cloud and on-prem. Design and implementation of IOT, endpoint protection, and secure IAM. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products Knowledge of web application architectures and threat modelling. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Technical Architect

Gauteng, Gauteng NTT DATA, Inc.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
Overview

Security Technical Architect at NTT DATA, Inc. Design robust security architectures that safeguard systems, applications, and infrastructure. Work with cross-functional teams to embed security throughout the system design and development lifecycle, ensuring solutions are secure, compliant, and industry-leading.

Responsibilities
  • Design robust security architectures for systems, applications, and infrastructure.
  • Collaborate with developers, engineers, and project managers to embed security into every project and lifecycle stage.
  • Apply secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Evaluate and select security technologies; create and enforce security policies; lead incident response activities.
  • Set technical standards and provide pre-sales technical support to help ensure solutions meet client objectives and regulatory requirements.
  • Manage client proof-of-concept initiatives and oversee transitions from proposed solutions to delivery. Document executive summaries, statements of work, and network diagrams; review pricing formats and validate proposals.
Qualifications
  • Deep knowledge of security domains: network security, application security, cloud security, data protection, identity and access management, cryptography, and secure coding.
  • Proficiency in enterprise architecture principles and frameworks (e.g., TOGAF).
  • Understanding of security regulations, standards, and frameworks (e.g., ISO 27001, NIST, PCI DSS).
  • Hands-on experience with security technologies and tools (e.g., firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, secure coding analysis tools).
  • Experience in a large-scale, multinational technology services environment.
  • Excellent analytical and problem-solving abilities for assessing risks and analyzing security issues.
  • Strong client engagement skills and technical consulting aptitude.
  • Ability to collaborate and communicate effectively with team members.
  • Bachelor's degree in IT, computer science, or a related field.

Workplace type: Hybrid Working

About NTT DATA

NTT DATA is a global innovator of business and technology services with over $30 billion in annual revenue. We serve a large portion of the Fortune Global 100 and invest in R&D to move organizations and society toward a digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem.

Equal Opportunity Employer

NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We do not discriminate based on age, race, color, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Technical Architect

Gauteng, Gauteng NTT

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

JOB DESCRIPTION

Make an impact with NTT DATA

Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

Your day at NTT DATA

As a Security Technical Architect at NTT DATA, you'll design robust security architectures that safeguard our systems, applications, and infrastructure. Working closely with cross-functional teams, you'll integrate security requirements throughout the system design and development lifecycle, ensuring our technology solutions are secure, compliant, and industry-leading.

On a day-to-day basis, you'll be viewed as a trusted technical advisor, collaborating with developers, engineers, and project managers to embed security into every project. Your expertise in secure coding practices, network security, identity and access management, DATA protection, and other security domains will be instrumental.

You'll play a pivotal role in evaluating and selecting security technologies, creating and enforcing security policies, and leading incident response activities. By setting technical standards and providing pre-sales technical support, you'll help define how our solutions meet client objectives and regulatory requirements.

Your role extends to managing client proof-of-concept initiatives and ensuring a smooth transition from proposed solutions to delivery. You'll document executive summaries, statements of work, and network diagrams, oversee pricing formats, and validate proposals, making you a key player in bringing security-focused projects to life.

To thrive in this role, you need to have :

  • Deep knowledge of security domains : network security, application security, cloud security, DATA protection, identity and access management, cryptography, and secure coding.
  • Proficiency in enterprise architecture principles and frameworks (e.g., TOGAF).
  • Understanding of security regulations, standards, and frameworks (e.g., ISO 27001, NIST, PCI dSS).
  • Hands-on experience with security technologies and tools (e.g., firewalls, intrusion detection / prevention systems, SIEM, vulnerability scanners, secure coding analysis tools).
  • Experience in a large-scale, multinational technology services environment.
  • Excellent analytical and problem-solving abilities for assessing risks and analysing security issues.
  • Strong client engagement skills and technical consulting aptitude.
  • Ability to collaborate and communicate effectively with team members.
  • Bachelor's degree in IT, computer science, or a related field.

Workplace type : Hybrid Working

About NTT DATA

NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer

NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Technical Architect

Johannesburg, Gauteng NTT America, Inc.

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
As a Security Technical Architect at NTT DATA, you'll design robust security architectures that safeguard our systems, applications, and infrastructure. Working closely with cross-functional teams, you'll integrate security requirements throughout the system design and development lifecycle, ensuring our technology solutions are secure, compliant, and industry-leading.
On a day-to-day basis, you'll be viewed as a trusted technical advisor, collaborating with developers, engineers, and project managers to embed security into every project. Your expertise in secure coding practices, network security, identity and access management, DATA protection, and other security domains will be instrumental.
You'll play a pivotal role in evaluating and selecting security technologies, creating and enforcing security policies, and leading incident response activities. By setting technical standards and providing pre-sales technical support, you'll help define how our solutions meet client objectives and regulatory requirements.
Your role extends to managing client proof-of-concept initiatives and ensuring a smooth transition from proposed solutions to delivery. You'll document executive summaries, statements of work, and network diagrams, oversee pricing formats, and validate proposals, making you a key player in bringing security-focused projects to life.
**To thrive in this role, you need to have:**
+ Deep knowledge of security domains: network security, application security, cloud security, DATA protection, identity and access management, cryptography, and secure coding.
+ Proficiency in enterprise architecture principles and frameworks (e.g., TOGAF).
+ Understanding of security regulations, standards, and frameworks (e.g., ISO 27001, NIST, PCI dSS).
+ Hands-on experience with security technologies and tools (e.g., firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, secure coding analysis tools).
+ Experience in a large-scale, multinational technology services environment.
+ Excellent analytical and problem-solving abilities for assessing risks and analysing security issues.
+ Strong client engagement skills and technical consulting aptitude.
+ Ability to collaborate and communicate effectively with team members.
+ Bachelor's degree in IT, computer science, or a related field.
**Workplace type** **:**
Hybrid Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Senior security specialists Jobs in South Africa !

Security Engineer Data Security

Johannesburg, Gauteng Standard Bank of South Africa Limited

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

Business Segment: Personal & Private Banking

Location: ZA, GP, Johannesburg, 30 Baker Street

  • Manage and fine-tune Microsoft Purview DLP policies for endpoints, SharePoint, OneDrive & Teams
  • Investigate DLP alerts, coordinate incident response with stakeholders, and document outcomes.
  • Work closely with Legal, Risk, and Compliance teams to align DLP policies with regulatory and internal requirements (e.g., POPIA, GDPR, PCI-DSS).
  • Tune policy exceptions and reduce false positives without compromising security.

Email Security (Microsoft Defender for Office 365)

  • Administer and optimize anti-phishing, anti-malware, and anti-spoofing policies.
  • Monitor mail flow, quarantine, and threat reports to detect patterns and enhance protection.
  • Configure Safe Links, Safe Attachments, and ATP policies.
  • Support investigations of email-based threats and data leakage attempts.

Web Security (Forcepoint and DMARC)

  • Maintain and support the Forcepoint Web Security environment, including URL filtering, content categorization, and user policies.
  • Investigate web-based threat alerts and policy violations.
  • Assist in integration of web security controls with broader DLP and SIEM tools.
  • Provide guidance for policy tuning and user experience improvements.
  • Manage, Maintain and Support DMARC to ensure Email is protected against spoofing.

SSE / Cloud Access Controls (Cato Networks)

  • Configure and monitor policies on Cato Networks’ SSE platform for secure internet access and cloud app control.
  • Help define Zero Trust Network Access (ZTNA) policies for remote users and sensitive resources.
  • Review access logs, user behaviour, and cloud application usage for anomalies.
  • Coordinate with network and identity teams to streamline SSE enforcement.
  • Triage alerts across DLP, email, web, and SSE tools; escalate or respond as needed.
  • Provide weekly/monthly reports to leadership on data protection metrics, incident trends, and policy effectiveness.
  • Collaborate with SOC and Blue Teams on threat correlation and data security posture assessments.
  • Maintain documentation and support audit readiness.
Qualifications

Technical Skills

  • Strong hands-on experience with Microsoft Purview DLP (E5).
  • Proficient in Microsoft Defender for Office 365 (email hygiene, ATP, threat management).
  • Experience with Forcepoint Web Security policy design, deployment, and management.
  • Working knowledge of Secure Service Edge (SSE) and ZTNA concepts; Cato Networks experience preferred.
  • Familiarity with security incident workflows, SIEMs (e.g., Sentinel), and PowerShell scripting.

Experience

  • 5+ years in IT Security roles, with at least 2–3 focused on data security.
  • Direct involvement in policy design, incident triage, and ongoing tuning of DLP/email/web security tools.
  • Exposure to regulated environments with compliance reporting (e.g., financial services)
  • Soft Skills
  • Detail-driven with strong analytical skills.
  • Clear communicator, especially when engaging end-users on policy violations or tuning.
  • Able to balance risk mitigation with operational practicality.
  • Comfortable working across InfoSec, Infrastructure, Legal, and Business teams.

Preferred Certifications

  • Bachelors Degree in Computer Science (advantageous)
  • Microsoft Certified: Information Protection Administrator Associate (SC-400)
  • Microsoft Certified: Security Operations Analyst Associate (SC-200)
  • General security certifications (e.g., CompTIA Security+, CISM, CISSP) are a plus
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer Data Security

Johannesburg, Gauteng Standard Bank of South Africa Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Business Segment: Personal & Private Banking

Location: ZA, GP, Johannesburg, 30 Baker Street

  • Manage and fine-tune Microsoft Purview DLP policies for endpoints, SharePoint, OneDrive & Teams
  • Investigate DLP alerts, coordinate incident response with stakeholders, and document outcomes.
  • Work closely with Legal, Risk, and Compliance teams to align DLP policies with regulatory and internal requirements (e.g., POPIA, GDPR, PCI-DSS).
  • Tune policy exceptions and reduce false positives without compromising security.

Email Security (Microsoft Defender for Office 365)

  • Administer and optimize anti-phishing, anti-malware, and anti-spoofing policies.
  • Monitor mail flow, quarantine, and threat reports to detect patterns and enhance protection.
  • Configure Safe Links, Safe Attachments, and ATP policies.
  • Support investigations of email-based threats and data leakage attempts.

Web Security (Forcepoint and DMARC)

  • Maintain and support the Forcepoint Web Security environment, including URL filtering, content categorization, and user policies.
  • Investigate web-based threat alerts and policy violations.
  • Assist in integration of web security controls with broader DLP and SIEM tools.
  • Provide guidance for policy tuning and user experience improvements.
  • Manage, Maintain and Support DMARC to ensure Email is protected against spoofing.

SSE / Cloud Access Controls (Cato Networks)

  • Configure and monitor policies on Cato Networks’ SSE platform for secure internet access and cloud app control.
  • Help define Zero Trust Network Access (ZTNA) policies for remote users and sensitive resources.
  • Review access logs, user behaviour, and cloud application usage for anomalies.
  • Coordinate with network and identity teams to streamline SSE enforcement.
  • Triage alerts across DLP, email, web, and SSE tools; escalate or respond as needed.
  • Provide weekly/monthly reports to leadership on data protection metrics, incident trends, and policy effectiveness.
  • Collaborate with SOC and Blue Teams on threat correlation and data security posture assessments.
  • Maintain documentation and support audit readiness.
Qualifications

Technical Skills

  • Strong hands-on experience with Microsoft Purview DLP (E5).
  • Proficient in Microsoft Defender for Office 365 (email hygiene, ATP, threat management).
  • Experience with Forcepoint Web Security policy design, deployment, and management.
  • Working knowledge of Secure Service Edge (SSE) and ZTNA concepts; Cato Networks experience preferred.
  • Familiarity with security incident workflows, SIEMs (e.g., Sentinel), and PowerShell scripting.

Experience

  • 5+ years in IT Security roles, with at least 2–3 focused on data security.
  • Direct involvement in policy design, incident triage, and ongoing tuning of DLP/email/web security tools.
  • Exposure to regulated environments with compliance reporting (e.g., financial services)
  • Soft Skills
  • Detail-driven with strong analytical skills.
  • Clear communicator, especially when engaging end-users on policy violations or tuning.
  • Able to balance risk mitigation with operational practicality.
  • Comfortable working across InfoSec, Infrastructure, Legal, and Business teams.

Preferred Certifications

  • Bachelors Degree in Computer Science (advantageous)
  • Microsoft Certified: Information Protection Administrator Associate (SC-400)
  • Microsoft Certified: Security Operations Analyst Associate (SC-200)
  • General security certifications (e.g., CompTIA Security+, CISM, CISSP) are a plus
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security engineer data security

Johannesburg, Gauteng Standard Bank Of South Africa Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Business Segment: Personal & Private Banking Location: ZA, GP, Johannesburg, 30 Baker Street Manage and fine-tune Microsoft Purview DLP policies for endpoints, Share Point, One Drive & Teams Investigate DLP alerts, coordinate incident response with stakeholders, and document outcomes. Work closely with Legal, Risk, and Compliance teams to align DLP policies with regulatory and internal requirements (e.g., POPIA, GDPR, PCI-DSS). Tune policy exceptions and reduce false positives without compromising security. Email Security (Microsoft Defender for Office 365) Administer and optimize anti-phishing, anti-malware, and anti-spoofing policies. Monitor mail flow, quarantine, and threat reports to detect patterns and enhance protection. Configure Safe Links, Safe Attachments, and ATP policies. Support investigations of email-based threats and data leakage attempts. Web Security (Forcepoint and DMARC) Maintain and support the Forcepoint Web Security environment, including URL filtering, content categorization, and user policies. Investigate web-based threat alerts and policy violations. Assist in integration of web security controls with broader DLP and SIEM tools. Provide guidance for policy tuning and user experience improvements. Manage, Maintain and Support DMARC to ensure Email is protected against spoofing. SSE / Cloud Access Controls (Cato Networks) Configure and monitor policies on Cato Networks’ SSE platform for secure internet access and cloud app control. Help define Zero Trust Network Access (ZTNA) policies for remote users and sensitive resources. Review access logs, user behaviour, and cloud application usage for anomalies. Coordinate with network and identity teams to streamline SSE enforcement. Triage alerts across DLP, email, web, and SSE tools; escalate or respond as needed. Provide weekly/monthly reports to leadership on data protection metrics, incident trends, and policy effectiveness. Collaborate with SOC and Blue Teams on threat correlation and data security posture assessments. Maintain documentation and support audit readiness. QualificationsTechnical Skills Strong hands-on experience with Microsoft Purview DLP (E5). Proficient in Microsoft Defender for Office 365 (email hygiene, ATP, threat management). Experience with Forcepoint Web Security policy design, deployment, and management. Working knowledge of Secure Service Edge (SSE) and ZTNA concepts; Cato Networks experience preferred. Familiarity with security incident workflows, SIEMs (e.g., Sentinel), and Power Shell scripting. Experience 5+ years in IT Security roles, with at least 2–3 focused on data security. Direct involvement in policy design, incident triage, and ongoing tuning of DLP/email/web security tools. Exposure to regulated environments with compliance reporting (e.g., financial services) Soft Skills Detail-driven with strong analytical skills. Clear communicator, especially when engaging end-users on policy violations or tuning. Able to balance risk mitigation with operational practicality. Comfortable working across Info Sec, Infrastructure, Legal, and Business teams. Preferred Certifications Bachelors Degree in Computer Science (advantageous) Microsoft Certified: Information Protection Administrator Associate (SC-400) Microsoft Certified: Security Operations Analyst Associate (SC-200) General security certifications (e.g., Comp TIA Security+, CISM, CISSP) are a plus #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Senior Security Specialists Jobs