Cyber Security Consultant: Operations Competitive Ctc

Details of the offer

Cyber Security Consultant: OperationsThe role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes.Duties & ResponsibilitiesOn a day-to-day basis the Consultant will be involved with the configuration, monitoring and management of:Data Leakage Prevention system, rules and reportsPrivileged Account Management processNetwork Access Control process and exception handlingVulnerability Scanning, reporting, proposing remediation actions and tracking complianceSecurity hardening baseline compliance scanning, reporting and remediationOn an ad hoc basis the consultant will support businesses in:Issuing, renewing and revoking PKI digital certificates.Assessing internet and email use on request of Forensics or HR departments.Performing scheduled tasks like reviewing Firewall rule configuration and reporting.Reporting on the status of the cyber security control environments on a weekly, monthly and quarterly basis.Continuously considering ways to improve the effectiveness and efficiency of monitoring and response controls.Contributing to the Knowledge and Skills of the team, by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts.Desired Experience & QualificationQualificationsMatricInformation Technology diploma or degreeInformation Security certification (preferable)ExperienceAt least 3 – 5 years in hands-on technical experience which includes:Network experience (TCP/IP, Firewalls, IPS, NAC)Anti-Virus System management and ConfigurationData Leakage Prevention tool configurationLogical Access Management (AD, PAM)Information Security Operations (Security+, CISSP will be beneficial)Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)Knowledge and SkillsSecurity AuditingReporting and AdministrationSecurity tools monitoringPersonal AttributesInterpersonal savvyDecision qualityPlans and alignsOptimises work processesCore CompetenciesCultivates innovationCustomer focusDrives resultsCollaboratesBeing resilientPackage & RemunerationCompetitive CTC with benefits.
#J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Whatjobs_Ppc

Requirements

Information Technology Manager

Location: King George, VA Desired Candidate Qualities: Ten (10) plus years of experience with demonstrated ability to plan and coordinate the installation, t...


Tech Wizards - South Africa

Published a month ago

Data & Analytics Industrial Placement

Data & Analytics Industrial PlacementJob Description SummaryPrior to submitting your application, please visit our early careers website to find out more abo...


Industry Placements - South Africa

Published a month ago

Specialist Technology Transfer Project

JOB PROFILE FIXED TERM CONTRACT (12 MONTHS) JOB TITLE: Specialist: Technology Transfer Projects JOB GRADE: C5 Minimum Midpoint TOTAL CTC: R507 409 - R596 9...


Small Enterprise Development Agency_Gov - South Africa

Published a month ago

Data Engineer

Please note that at this time, we are not accepting resumes from external agencies or recruiters. Any unsolicited resumes will not be considered and will not...


Hakkoda Inc. - South Africa

Published 13 days ago

Built at: 2024-12-23T18:42:48.088Z