Specialist : Information Security Systems - 12146

Specialist : Information Security Systems
Job No: 12146
R 433 000  to R 625 000 Per Annum
Location:  Fairlands, Johannesburg

Implement, monitor and maintain the Companies information and technology security standards and architecture, to protect their information assets

Security Compliance:
  • Provide input into, implement and document processes and procedures needed to support the security standards
  • Liaising and organising training for stakeholders on security protocols to meet policy requirements
  • Define and implement Server and Desktop Security policies, 
  • Collaborate with the Network Group planning and operations teams on shared policies
  • Work with internal stakeholders to define action plans to close or mitigate findings of external auditors
  • Train stakeholders on security to raise the overall awareness
  • Proactivity test for security related issues and propose remedial plans
  • Monitor and measure the deployment of security standards 
Security Systems:
  • Plan the life cycle of the security platforms 
  • Conduct capacity planning - platforms are upgraded to ensure sufficient headroom 
  • Propose and provide advice into the best platforms/solutions to minimise security related incidents
  • Liaise with Systems Administrators in respect of operational implementation of policies and security best practices
  • Deploy security solutions on Exchange, office 365 and hybrid Active directory
  • Conduct Research on security latest trends, plan and implement security solutions
  • Translate the security requirements into a technical implementation plan
  • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementation is managed to minimize risk and adverse impact to servers, workstations and user productivity.
  • Deploy and ensure adequate security standards across relevant environments
  • Implement the infrastructure, configurations and processes to monitor security related events in the server environment
  • Identify and prepare relevant information and data for reporting purposes
  • Provide daily, weekly and monthly information security reports as per the business reporting requirements
  • Drive to implementation of Information Security project
  • Report on the status of security project progress
  • Report on all security related incidents
  • Support Business Risk Management in security related investigations 
  • Plan and action remedies required to prevent exposure to security related threats
  • Perform security incident response and management
  • Document and operationalize the processes and procedures necessary to sustain the security posture of the environment
  • Conduct Research and maintain development policies to ensure security policies are up to date and cater for new technologies, including testing internal and external software development and procurement practices adhere to security protocols
  • Ensure all security system documentation is up to date
  • A more detailed Job description will be supplied to candidates that are short listed for interview.
  • 3 year degree / national diploma in IT
  • CISSP, CISM or equivalent Information Security qualification or relevant proven working experience
  • Unix/Microsoft certification
  • Background in cyber security
  • Fluent in English
  • Minimum of three years’ experience as a security engineer/analyst with exposure to Active Directory, Azure AD, Office 365, Operating System, Application, Database and Network security. 
  • Programming experience preferable, particularly scripting. 
  • Operating Systems 
  • Unix/Linux
  • Microsoft Windows Desktop and Server
  • Databases Oracle, MySQL, SQL Server
  • Active Directory (Security best practice, design, group policies)
  • Networking, network protocols
  • Development / Scripting - Any of the following (more than one preferable): C++, Java, Python, Perl, PHP, PowerShell, UNIX shell
  • Vulnerability Management / Configuration Management Tools
  • SIEM, Threat Intel and Event Management Tools
  • Identity and Access management
  • Digital forensics
  • Cryptography
  • Penetration testing
  • Experience working in a large organization