Cyber Security Consultant Western Cape

Cape Town, Western Cape, South Africa

Job Description


Professional Qualification and Certifications:

  • Bachelorxc3xa2xc2x80xc2x99s Degree in Computer Science, Information Systems or other related field, or equivalent work experience.
  • Certification in risk, information systems and/or security desired (CISM, CISSP, CRISC, Cyber Security courses. Ethical Hacking)
Work Experience:xc3x82
  • Minimum 3- 5 years of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and Governance.
Knowledge and skills:
  • Knowledge of IT infrastructure, especially networks, server. Desktop and DLP
  • Proven experience as a Cyber Security Engineer with a focus on Symantec DLP solutions.
  • In-depth knowledge of Symantec DLP architecture, components, and capabilities.
  • Strong understanding of data classification, encryption, and data loss prevention techniques.
  • Hands-on experience in designing, configuring, and managing DLP policies and rules.
  • Familiarity with regulatory requirements
  • Excellent analytical and problem-solving skills, with the ability to troubleshoot complex technical issues.
  • Effective communication skills, with the ability to convey technical concepts to non-technical stakeholders.
  • Knowledge of Third-party Risk management. Conducting Risk assessment and Cloud assurance.
  • Experience in security management, security and network architecture and/or design
  • Experience in implementing and maintaining IT security processes
  • Experience in creating and reviewing IT security policies for compliance
  • Skills and knowledge in data privacy, best practices such as; defence in-depth, least privileges, need-to-know, separation of duties, access controls, encryption
Key Processes Supported:
This role supports to following critical Head Office processes:
  • Interpret cyber security and corporate risk, and governance frameworks
  • Develop applicable policies and standards
  • Monitoring and reporting
  • Ensuring policy compliance
  • Perform daily, weekly, monthly system health checks for VPN, F/W and Proxy
  • Implement approved configuration/rule changes for VPN, F/W and Proxy
  • Ensure application/system security and availability thru load balancing and optimisation (F5)
  • Run adhoc reports for VPN, F/W and Proxy
  • Respond to P1, P2 and P3 Events and Alerts
  • Fine Tune Use Cases with SOC and OPS
  • Work with SOC to analyse threat intelligence and technical analysis
  • Conduct Cyber Incident Exercises to test preparedness
  • Set and implement user access controls and identity and access management systems
  • Monitor network and application performance to identify and irregular activity
  • Perform regular audits to ensure security practices are compliant
  • Deploy endpoint detection and prevention tools to thwart malicious hacks
  • Set up patch management systems to update applications automatically
  • Implement comprehensive vulnerability management systems across all assets on-premises and in the cloud
  • Document network, system, and application user access control procedures and feedback to management to update policies and processes when vulnerabilities are uncovered
  • Central point for all IT systems access requests for services or information
  • Validate legitimacy of requests; ensure proper approvals and executexc3x82 per the access policies, regulations and procedures
  • Develop and maintain user access application inventory
  • Distribute access control reports to support periodic reviews
  • Provide required Management Information Reports
  • Work with business stakeholders and participate in company projects to ensure that onboarding of new applications is managed in alignment with data governance policies.
  • Develop and implement regular access control process improvements
  • Heightened awareness of Cyber Security.
  • Share Vulnerabilities/Threats discovered and Mitigation Strategies with the user community
  • Inform stakeholders about inappropriate use of IT systems/Services
  • Perform vulnerability testing, risk analyses and security assessments
  • Respond immediately to security-related incidents and provide a thorough post-event analysis
  • Update and upgrade security systems as needed
  • Define, implement and maintain corporate security policies and procedures
  • Plan, research and design robust Security Architectures and Strategies for IT and OT projects
  • Act as an SME for Cyber Security related issues
  • Conduct technical risk assessment to capture security exceptions and design associated controls

JobPlacements.com

Beware of fraud agents! do not pay money to get a job

MNCJobs.co.za will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD1340170
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Cape Town, Western Cape, South Africa
  • Education
    Not mentioned