Key Responsibilities
Identity and Access Management (IAM)
Perform daily health checks for the IAM solution and remediate accordingly.
Manage user lifecycles (creation, modification, deletion) and ensure access aligns with job roles and least privilege principles.
Conduct monthly/periodic user access reviews to identify and remove unnecessary privileges.
Vulnerability Management (VM)
Perform daily health checks for the VM solution and remediate accordingly.
Scan vendor-specific and third-party vulnerability alerts and reports to ensure TFG-related infrastructure and applications are monitored.
Analyse and investigate vulnerability advisories to identify potential issues.
Collaborate with team members to develop communications to affected stakeholders regarding identified vulnerabilities.
Configure, run and evaluate vulnerability scans.
Provide vulnerability management reports to key stakeholders including remediation strategies for recorded vulnerabilities.
Network Security
Perform daily health checks for the network access control solution and remediate accordingly.
Respond promptly to network access-related incidents, provide initial analysis, remediate issues timeously to ensure there is limited impact to user productivity.
Document and report network access-related incidents, ensuring accurate and comprehensive records.
Follow established incident response procedures, playbooks and contribute to their enhancement.
Data Protection
Perform daily health checks for the data leakage prevention solution and remediate accordingly.
Assist first-line analysts in reviewing DLP incidents.
Assist second-line analysts with DLP investigations.
Engage with business stakeholders to improve DLP policies to reduce false positives
Work with IT teams to ensure DLP security configurations align with organisational standards.
Experience and Qualifications
Relevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience.
One or more certifications in: Network Access Control, Security+, Microsoft Certifications, Vulnerability Management
Must have 1-3 years' experience in a Cybersecurity related role
Familiarity with network access control tools, vulnerability management tools, data leakage prevention tools
Skills
Basic understanding of network protocols, operating systems, and security technologies.
Strong analytical and problem-solving skills.
Knowledge of security principles and best practices.
Knowledge and skill in using automation tools.
Effective communication and collaboration skills.
Behaviours:
Action Oriented - readily takes on new challenges and opportunities with a sense of urgency and eagerness
Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner
Courage - confronts and tackles challenging situations with courage
Decision Quality - consistently makes timely, well-rounded and informed decisions
Ensures Accountability - takes accountability and ensures others are held to account on agreed upon performance targets
Manages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problems
Plans and Aligns - develops plans and prioritises initiatives that align to the organisational goals and objectives
Tech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growth
Preference will be given, but not limited to candidates from designated groups in terms of the Employment Equity Act.
#J-18808-Ljbffr