Description:
Qualifications and ExperienceBachelors Degree/ Advanced Diploma in Information Technology related qualification. Certifications such as Security +, CISSP\ CEH\ Cybersecurity Practitioner Certification are advantageous. Relevant 4 years experience in an ICT Security related environment. Experience in developing, documenting and maintaining security procedures.
Key Performance Areas
Create and Manage Documented Standards, Processes and Procedures
Ensure compliance with ICT security standards, processes, and procedures for both systems and applications. Develop and update necessary documentation to support system and application security measures. Security Solutions Implementation and Maintenance
Develop and implement security procedures, and standards to safeguard company assets and data. Manage and administer common security tools such as Data Loss Prevention (DLP), Antivirus software, and Cloud Security Tools like Cloud Access Security Broker (CASB). Conduct regular security assessments and audits to identify vulnerabilities and assess the effectiveness of existing security controls. Collaborate with IT teams to design and implement security measures for new systems and applications. Provide guidance and support to internal teams on security-related matters, including incident response and security awareness training. Security Monitoring
Monitors networks and analyses intrusions using various tools like Intrusion Detection/ Prevention Systems (IDS/ IPS), firewalls, and Host-Based Security System (HBSS). Identifies unauthorized usage trends by correlating network activity across different networks. Reviews alerts and sensor data, then compiles technical incident reports. Conducts pre-implementation testing on new computers, software, switch hardware, and routers to ensure security. Assists in developing business continuity/disaster recovery plans, conducts disaster recovery tests, publishes results, and implements necessary changes to address any deficiencies. 2nd Level Support on Cybersecurity Incidents
Responds and resolves reported security incidents Monitors system logs from the SIEM and other network traffic for unusual or suspicious activities. Interprets such activity and makes recommendations or escalate for resolution Collates security incident and event data to produce monthly exception and management reports. Implement Security Controls Across Applicable Systems and Networks
Verifying all requests and changes are correctly authorized before implementation. Participate in identifying potential security violations, segregation of duties and risks prior to and post impl
29 Mar 2025;
from:
gumtree.co.za