Cyber Security Operations Specialist
Auto and General Park
Telesure Investment Holdings
Join TIH, home to some of South Africa’s leading financial service providers, and grow your career while being part of an organisation with purpose.
Job Purpose
Provide direction, plan, oversee execute, analyse and measure, and report on various cyber security operations functions. Ensure centralised and dedicated cyber security technologies and operations functions operate at the right level of maturity, are effective and optimised. Ensure operations functions adequately support TIH’s information & cyber security outcomes. Ensure operations functions produce relevant measurements and metrics to support TIH’s cyber & information security decisions. Ensure operations functions continue to mature and adequately adapt to the changing threat landscape.Responsibilities
Information SecurityLead in detecting and analysing security incidents including attacks, breaches, and identified vulnerabilities and remediate any security gaps in line with the security incident management procedure.
Ensure, through appropriate planning, execution, oversight of implementation and management of centralised and dedicated operations, TIH is able to appropriately identify, protect, detect, respond and recover to information & cyber security threats. Where possible, play the role of a lead-in to further enhancing and optimising said lifecycle.
Operations Management
Supervise others working within established operational systems.
Participate and take ownership during information & cyber security incident response activities, and specifically as it pertains to cyber security operations.
Risk Management & Analysis
Ensure the organisation is not exposed to undue risks by using risk management systems to achieve specific goals within a designated area of the business.
Maintain visibility of emerging information & cyber security threats and trends, and adjust operations activities to best defend against such threats.
Highlight and track risks related to cyber security operations shortfalls and propose appropriate actions to management in order to manage such risks.
Operational Compliance
Maintain and renew a deep knowledge and understanding of the organisation's policies and procedures and of relevant regulatory codes and codes of conduct, and ensure own work adheres to required standards. Identify, patterns of non-compliance with the organisation's policies and procedures, and with relevant regulatory codes and codes of conduct, taking appropriate action to report and resolve these and escalating issues as appropriate.
Take ownership of and optimise operation of dedicated and centralised cyber security technologies. This includes establishing relevant, operating procedures and other mechanisms to ensure consistent execution and quality outcomes.
Insights and Reporting
Prepare and coordinate the completion of various data and analytics reports.
Provide input on cyber security operations metrics and indicators. Report on key cyber security operations metrics and indicators to management and colleagues.
Stakeholder Engagement
Contribute to stakeholder engagement through identifying stakeholders, finding out their needs/issues/concern and reacting to these by arranging meetings and events and drafting supporting materials to promote understanding and commitment.
Build and maintain relationships with teams and areas within TIH towards ensuring collaboration and overall successful functioning of cyber security operations across the organisation.
Collaborate with the Information Security Architecture function around strategic cyber security technology selection and investment, or technologies with an impact on cyber security.
Operational Procedure Development
Contribute to the drafting of operational procedures, and related guidelines within an area of expertise to meet defined key principles and ensure compliance with external requirements.
Take ownership of and drive maturity of operational technologies, associated workflows and procedures across a variety of areas such as Internet and dark web cyber threat exposure, network and communications security, endpoint security, identity & access management, application security for proactive and reactive technology protections, vulnerability management and incident response and forensics.
Cyber Security Project and Program Governance
Clarify roles and responsibilities within the project team and ensure project compliance with the organisation's wider program and/or portfolio management decision-making structures and processes.
Participate and positively contribute to governance forums, committees or groups within TIH.
Personal Capability Building
Develop own capabilities by participating in assessment and development planning activities as well as formal and informal training and coaching; gain or maintain external professional accreditation where relevant to improve performance and fulfill personal potential. Maintain an in-depth understanding of technology, external regulation, and industry best practices through ongoing education, attending conferences, and reading specialist media.
Maintain and renew understanding of the information security operations landscape, both current and as it continues to evolve.
Continuous Improvement
Review existing operations in own area of work and implement innovation processes to generate new ideas and ensure continuous improvements are delivered.
Implement improvements and continuously mature cyber security operations activities.
Education
Grade 12/ SAQA Accredited Equivalent (Essential) Relevant industry certifications, such as Security+ ,CEH, MSCE, MCSA or equivalent (Essential) University degree in an information technology or related domain (Advantageous) Relevant Industry certification; OSCP or alternative in offensive or defensive security certifications(Advantageous) Relevant system / IT engineering certifications in on prem or cloud environments (Advantageous)Experience
2 or more years experience in information / cyber security, preferably with specific experience in security operations role. (Essential).Think you have what it takes to be part of an unstoppable team who constantly finds better ways to give peace of mind? Don't wait, apply now.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
6
2
0
Category:
Incident Response Jobs
Tags: Analytics Application security CEH Cloud Compliance Endpoint security Forensics Governance Incident response OSCP Risk management Vulnerabilities Vulnerability management
Perks/benefits: Career development Conferences Team events
Region:
Africa
Country:
South Africa
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Security Analyst jobsInformation System Security Officer jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsSenior Network Security Engineer jobsInformation Security Specialist jobsSenior Cybersecurity Engineer jobsSecurity Consultant jobsSenior Penetration Tester jobsIT Security Engineer jobsSecurity Specialist jobsSenior Information Security Analyst jobsSenior Cyber Security Engineer jobsCyber Security Specialist jobsChief Information Security Officer jobsStaff Security Engineer jobsIT Security Analyst jobsInformation System Security Officer (ISSO) jobsPrincipal Security Engineer jobsCloud Security Architect jobsCyber Security Architect jobsSystems Engineer jobsSecurity Operations Analyst jobsSenior Product Security Engineer jobsSenior Information Security Engineer jobs
CI/CD jobsSaaS jobsMalware jobsForensics jobsEncryption jobsEDR jobsIDS jobsSplunk jobsTop Secret jobsIPS jobsRMF jobsSDLC jobsSQL jobsIntrusion detection jobsBash jobsCompTIA jobsThreat detection jobsDoDD 8570 jobsOWASP jobsITIL jobsFinance jobsDocker jobsActive Directory jobsTCP/IP jobsCRISC jobs
IT infrastructure jobsGIAC jobsVPN jobsHIPAA jobsUNIX jobsBanking jobsTerraform jobsClearance Required jobsSANS jobsJavaScript jobsDNS jobsPolygraph jobsSOX jobsCISO jobsOSCP jobsAnsible jobsCCSP jobsMITRE ATT&CK jobsSOC 2 jobsJira jobsGCIH jobsData Analytics jobsCryptography jobsCyber defense jobsSOAR jobs