Empower our company's security infrastructure and safeguard our valuable assets as a Security Specialist.
Your expertise will be crucial in maintaining the day-to-day operations of our security solutions and swiftly identifying, investigating, and resolving security breaches. Share your knowledge in shaping policies, standards, baselines, guidelines, and procedures, ensuring compliance with cloud service providers. Become an integral part of our team, actively upholding the company's security goals and safeguarding our future.
Qualifications:
3 years' experience in a Security role
5+ years in an Infrastructure Back-end support environment
Implementation and deployment of enterprise solutions
Solid technical experience in Networking (LAN and WAN management, FW/Routers/Switches/Wifi/DHCP/DNS/DMZ/Edge/Segmentation etc)
Essential understanding of the response required in a Security Operations Centre
Strong knowledge of design, test solutions, authentication methods, Windows, Apple & Linux operating systems, protocols, Data leakage, Mobile device management, endpoint, application, cloud solutions, identity and access management, penetration testing, web security
Strong networking or Microsoft back-end experience
Scripting and knowledge of the NIST and SANS framework would be advantageous
Experience in Governance (POPI/Data Protection/PCI/Policy and Procedure) is required
Knowledge of current security risks and protocols, creation of policy, procedure and standards documentation
Management of a Security information and event management environment
Design, test, implementation and support of vulnerability management solutions
Cloud security and controls
Relevant IT degree and certifications in 1 or more of the following: CompTIA Security+, CISSP, GIAC, Microsoft Certified Systems Engineer, Microsoft Certified Azure Administrator, AWS Engineer, GSuite Engineer
Certified Cisco or Meraki Engineer
Responsibilities:
Work with architects, system engineers and other IT support teams to define, guide, advise on security standards across the IT landscape
Monitor network activity to identify vulnerable points
Design and configure security hardware and software
Use the toolsets available to identify and detect intrusions on corporate network and endpoints
Detect any unauthorized attempts to access the systems
Provide options for the IT network for enhancement to the security roadmap
Train other employees on security best practices, mentoring to junior team members
Monitor software and hardware for any possible cyber attacks
Perform security assessments and conduct internal scanning on the network
Analyze existing systems and make recommendations for changes or improvements
Prepare reports, action plans and update the risk register
Organize and conduct tests and "ethical hacks" of the existing company IT architecture
Keep technical knowledge current through continuation of education
Provide automation solutions as far as possible
Serve as a security specialist and conduct training when required
Draft policies, standard operating procedures and guidelines
Be an active change advisory member by reviewing production changes
Research and Design, benchmark, baseline exercises, trend analysis
Align with enterprise's security goals as established by its stated policies, procedures, and guidelines, and actively work towards upholding those goals.
#J-18808-Ljbffr