Our client is a leading telecommunications company in South Africa, committed to delivering innovative and reliable communication solutions to their customers.
They are dedicated to staying at the forefront of technology and providing exceptional services.
In support of their continued growth; we are seeking an experienced Networking Security Engineer to join their team and contribute to their success.PURPOSE OF POSITIONThe Network Engineer is responsible for supporting and driving the daily activities of IU's metrics & reporting program.
The role will aid in creating and refreshing reports, dashboards, and ad-hoc analysis of Information Security Services metrics, Key Performance Indicators, and Key Risk Indicators.
Works with all program owners across Information Security Services as well as key business stakeholder groups.KEY FUNCTIONSDesign, configure and maintain network operations software, applications and appliances (e.g.
operating systems; firewall; VolP; content filtering, spam filtering; layer 2 & 3 core switches; routers; Wireless controllers/AP; routine maintenance programs, etc.
)Design, configure and maintain all on-premise and cloud-based network storage in production and disaster recovery environments.Develop highly complex data extracts using various security solutions and ensure requirements are developed in accordance with specified business and technical requirements.Create reports, build dashboards & data visualizations using a variety of different data tools.Utilize ETL (Extract, Transform, and Load) tools to transform and blend data from disparate datasources.Review data for accuracy and trending and troubleshoot any errors in reporting or extracting.Create accurate charts, tables, and graphs in the correct format and within established time framesas required.Select and use appropriate software to effectively analyze security data.
Compile and analyzeinformation.Provide ad hoc data analysis support to all internal clients.Assist with SharePoint site administration & maintenance for the internal team site.Serves as an Infrastructure Security and Controls partner ensuring all infrastructure services meetsecurity policy while also addressing business needsEnsures appropriate security and controls are built into the IT systems & tools, vendor offerings, and services by providing technical expertise, evaluation, assessment, and consultationPartners with technology teams to design solutions that mitigate riskShare knowledge of future trends, tools, procedures and systems in infrastructure security,internal controls and risk managementParticipates in forums, benchmarking analyses, and processes that result in improvement,information sharing and innovation across IUDemonstrated high level of personal integrity and the ability to discreetly handle sensitive,personal and confidential case information.Heavy involvement with creating their organization's disaster recovery plan, a procedure that ITemployees follow in case of emergency.
These plans allow for the continued operation of IU's IT department.Design, configure and maintain network operations software, applications and appliances (e.g.
operating systems; firewall; VolP; content filtering, spam filtering; layer 2 & 3 core switches; routers; Wireless controllers/AP; routine maintenance programs, etc.
).Serve as lead engineer and point of contact in support of the IU RWAN and connections to customer school entities.Design, configure and maintain all on premise and cloud-based network storage in production and disaster recovery environments.Responsible for timely and appropriate equipment changes (e.g.
switches and devices; installing software; changing configurations or the physical network; creating sub, stand alone, or parallel networks, etc.)
for the purpose of fulfilling service requests.Make recommendations to management on enhancements to existing and new security hardware, software or related tools.
Assist in evaluating, planning, configuration, and implementation of new/existing security applications/tools.Create and maintain data security documentation, policies and procedures.Assists in the identification, response, investigation, and remediation of potential breaches of andissues surrounding data security.Interfaces with users of technology, employing a high degree of tact and diplomacy to promote apositive image of the department.
Resolves problem situations in a professional manner.Maintains competency and enhances professional growth and development.Please note that by submitting your personal information to Deka Minas you free-willingly issue the business consent to make use of such data for the specific purpose of securing you either permanent or temporary employment.
Our business makes use of a POPIA compliant database and you have the right to access, right to correction and right to deletion of your personal information