Job DescriptionThe Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organization's data and infrastructure. This hands-on position entails executing security strategies, as well as installing and configuring vital security apparatus, such as firewalls and intrusion detection systems. The Security Engineer is responsible for applying and maintaining security measures to protect critical data and infrastructure. Installing, configuring, and managing security systems and software. Identifying and remediating detected vulnerabilities on time. Responding swiftly to security breaches or incidents. Ensuring the continuous secure operation of the IT environment. Staying abreast of the latest developments in security technologies, threats, and countermeasures. The Security Engineer is essential in maintaining the integrity and security of the organization's digital resources, ensuring they are shielded from potential cyber threats through diligent maintenance and proactive monitoring.Area of Responsibility: Security ImplementationResponsibilities: Implement security controls based on guidelines and designs provided by the security architect.Key Performance Indicators: Number of security controls implemented within the specified timeline.Percentage of implemented controls functioning as expected.Area of Responsibility: Security ConfigurationResponsibilities: Configure and manage security solutions, including firewalls, intrusion detection systems, anti-virus software, and data encryption.Key Performance Indicators: Number of security configurations completed within scope, time, and budget.Percentage of configured solutions functioning without critical issues.Area of Responsibility: Vulnerability RemediationResponsibilities: Apply patches and modifications to fix identified vulnerabilities.Key Performance Indicators: Meantime to remediate vulnerabilities.Number of exceptions.Average age of open vulnerabilities.Area of Responsibility: Security Monitoring and Incident ResponseResponsibilities: Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and escalate as necessary.Key Performance Indicators: Number of security incidents detected and responded to within an acceptable timeframe.Meantime to identify and escalate critical incidents.Area of Responsibility: Compliance ChecksResponsibilities: Resolve identified compliance issues from regular checks to ensure the systems comply with the organization's security policies and standards.Key Performance Indicators: Compliance rate with security standards and policies.Number of non-compliance issues identified and resolved.Area of Responsibility: End-user SecurityResponsibilities: Implement end-user security practices, like password management and access controls.Key Performance Indicators: Percentage of end-users adopting implemented security practices.Number of end-user-related security incidents.Area of Responsibility: Vendor Management SupportResponsibilities: Coordinate with vendors to ensure the correct implementation and functioning of security systems.Key Performance Indicators: Vendor SLA compliance rate.Number of successful interactions and resolutions with vendors.Area of Responsibility: Updating and Upgrading Security SystemsResponsibilities: Regularly update and upgrade security systems in line with technological advancements and evolving threats.Key Performance Indicators: Number of successful updates and upgrades completed within the specified timeline.Reduction in security incidents due to outdated systems.Area of Responsibility: Training and MentorshipResponsibilities: Train team members on security operations, troubleshooting, and best practices.Key Performance Indicators: Number of training sessions conducted.Team member satisfaction rate with training.Area of Responsibility: Staying Abreast of Emerging TechnologiesResponsibilities: Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the company's security measures are updated.Key Performance Indicators: Number of relevant technology updates incorporated into the environment.Number of industry events attended or certifications obtained.Area of Responsibility: Team CollaborationResponsibilities: Participate in cross-functional projects, enhance system integration, and collaboration.Key Performance Indicators: Participate in at least one major cross-functional project per year.Area of Responsibility: Miscellaneous and GeneralResponsibilities: Complete any assigned work-related duties and responsibilities.Key Performance Indicators: Completion rate of assigned duties and responsibilities.Overall satisfaction rate in the performance of miscellaneous duties.Requirements1. Knowledge RequirementsCybersecurity Principles: Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures.Security Systems: Expertise in managing, configuring, and troubleshooting security systems, such as firewalls, intrusion detection systems, antivirus software, authentication mechanisms, and log management tools.Vulnerability Remediation: Proficiency in using assessment tools and techniques for vulnerability identification and remediation.Security Incident Response: Familiarity with the protocols and procedures for responding to, documenting, and resolving security incidents.Network and System Security: Good understanding of network and system security principles, including knowledge of encryption technologies, IPsec, VPNs, and network protocols.Cloud Security: Knowledge of security controls for leading cloud platforms like AWS, Azure, and Google Cloud.Compliance Standards: Understanding of IT compliance and security standards such as ISO 27001, NIST, PCI DSS, and GDPR.Emerging Security Technologies: Awareness of the latest cybersecurity technologies and trends.IT Service Management Frameworks: Knowledge of frameworks and processes such as ITIL.2. QualificationsEducation: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.Industry Certifications: CISSP, CEH, or CISM certifications are preferred.Cloud Security Certifications: Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous.Other Certifications: Certifications like ITIL, CRISC, or CISA are beneficial.3. ExperienceSecurity Implementation: Hands-on experience with security measures such as firewalls, intrusion detection systems, antivirus software, and data encryption.Vulnerability Assessment and Remediation: Experience in vulnerability detection and the implementation of remediation strategies.Security Protocols and Technologies: Deep experience with security protocols, encryption technologies, and network protocols.Incident Response: Experience in managing security incidents and performing threat hunting.Network Security: Skills in implementing network security measures.Cloud Security: Experience with security in cloud environments like AWS, Azure, or Google Cloud.Compliance: Experience with compliance management according to relevant standards and regulations.4. Technical SkillsSecurity Tools: Proficiency in using security tools including firewalls, intrusion detection systems, and antivirus software.Vulnerability Assessment Tools: Experience with tools like Nessus, OpenVAS, and Qualys.Network Security: Skills in managing network security protocols and systems.Programming and Scripting: Proficiency in scripting languages like Python or Bash.Cloud Security Tools: Knowledge of tools specific to cloud security.Encryption Technologies: Understanding of encryption and secure communication technologies.Incident Response Tools: Ability to utilize tools for quick response to security breaches.IT Service Management Frameworks: Familiarity with frameworks like ITIL.Problem-solving: Strong ability to troubleshoot and resolve complex network issues.Detail-oriented: Meticulous in planning, execution, and documentation.Communication Skills: Excellent communication skills, with the ability to explain complex technical issues in simple terms.Teamwork and Collaboration: Strong team player with effective collaboration skills.Continuous Learning: Commitment to continuous skill improvement and staying current with industry trends.Customer Focus: Dedicated to meeting customer needs and maintaining high satisfaction levels.Adaptability: Openness to adopting new technologies and methods.Stress Management: Capable of handling pressure and urgent situations effectively.Time Management: Efficient in prioritizing tasks and managing time.Ethics and Integrity: High ethical standards and integrity in professional conduct.Salary is market related.Posted ByAlinta Tech SolutionsHR Services, Recruitment & Selection
#J-18808-Ljbffr
Position summaryIndustry: Scientific, Research & Development Job category: IT-Architecture Location: Randburg Contract: Permanent Remuneration: Market Relate...
Mintek Pty Ltd. - Gauteng
Published 15 days ago
Line of Service Advisory Industry/Sector Not Applicable Specialism Workday Management Level Manager Job Description & Summary A career within Workday Consult...
Pwc Remchannel (Pty) Ltd - Gauteng
Published 15 days ago
ENVIRONMENT: A Boutique Software company seeks the coding talents of a highly ambitious Junior-Mid C#.Net Developer to join its Joburg team who will help des...
Datafin - Gauteng
Published 15 days ago
Santam's Merit Claims department has a position available for a Merit Theft Desktop Assessor who will be based in Parktown, Gauteng. PURPOSE OF THE ROLEThe p...
Santam Insurance - Gauteng
Published 15 days ago
Built at: 2024-12-25T19:37:25.379Z