Cyber Security Engineer
Steyn City Capital Park, South Africa
Telesure Investment Holdings
Join TIH, home to some of South Africa’s leading financial service providers, and grow your career while being part of an organisation with purpose.
Job Purpose
Resolve day to day operationsal security tasks and incidents. Act as Escalationpoint for specialists as a Level 1. Incident Response Specialist /SOC /L2 Breach and response lead member. Ensure centralised and dedicated cyber security technologies and operations functions operate at the right level of maturity, are effective and optimised. Ensure operations functions adequately support CIT's information & cyber security outcomes. Ensure operations functions produce relevant measurements and metrics to support CIT’s cyber & information security decisions. Ensure operations functions continue to mature and adequately adapt to the changing threat landscape.
Responsibilities
Information SecurityDefine business impact of security incidents and identify and drive recommendations for change to prevent similar incidents. Ensure, through appropriate planning, execution, oversight of implementation and management of centralised and dedicated operations, CIT is able to appropriately identify, protect, detect, respond and recover to information & cyber security threats. Where possible, play the role of a lead-in to further enhancing and optimising said lifecycle. Ensure effective Threat Hunting and Threat Intelligence is performed. Conduct penetration testing/offensive security procedures as required.
Operations Management
Supervise others working within established operational systems. Participate and take ownership during information & cyber security incident response activities, and specifically as it pertains to cyber security operations. Act as Incident Response Specialist /SOC /L2 Breach and Response as lead member. Escalation point for specialists as a Level 2. Oversee and perform Identity and Access Management and Privileged access Management tasks.
Risk Management & Analysis
Develop and/or deliver a contingency plan for significant aspects of the risk management and/or control process. Maintain visibility of emerging information & cyber security threats and trends, and adjust operations activities to best defend against such threats.
Operational Compliance
Monitor and review performance and behaviours within area of responsibility to identify and resolve non-compliance with the organisation's policies and relevant regulatory codes and codes of conduct. Take ownership of and optimise operation of dedicated and centralised cyber security technologies. This includes establishing relevant, operating procedures and other mechanisms to ensure consistent execution and quality outcomes.
Insights and Reporting
Contribute to the design and creation of reporting strategies and templates. Lead execution of complex reports, identifying and interpreting complex patterns and trends, and translating those insights into actionable recommendations. Provide input on cyber security operations metrics and indicators. Report on key cyber security operations metrics and indicators to management and colleagues.
Stakeholder Engagement
Develop stakeholder engagement through identifying stakeholders, finding out their needs/issues/concerns and reacting to these to support the communication of business information and decisions. Build and maintain relationships with teams and areas within CIT towards ensuring collaboration and overall successful functioning of cyber security operations across the organisation. Collaborate with the Enterprise Architecture function around strategic cyber security technology selection and investment, or technologies with an impact on cyber security.
Operational Procedure Development
Draft policies, procedures, and related guidelines within an area of expertise to meet defined key principles and ensure compliance with external requirements. Take ownership of and drive maturity of operational technologies, associated workflows and procedures across a variety of areas such as Internet and dark web cyber threat exposure, network and communications security, endpoint security, identity & access management, application security for proactive and reactive technology protections, vulnerability management and incident response and forensics.
Personal Capability Building
Act as subject matter expert in an area of technology, policy, regulation, or operational management for the team. Maintain external accreditations and indepth understanding of current and emerging external regulation and industry best practices through continuing professional development, attending conferences, and reading specialist media. Maintain and renew understanding of the information security operations landscape, both current and as it continues to evolve.
Building Capability
Implement the formal development framework for a team, with guidance from senior colleagues. Provide informal coaching to others throughout the organisation in area of expertise.
Continuous Improvement
Review existing operations in a major area of work and implement innovation processes to generate new ideas and ensure the required continuous improvement outcomes are delivered. Implement improvements and continuously mature cyber security operations activities.
Education
Grade 12/ SAQA Accredited Equivalent (Essential) Relevant industry certifications, such as Security+ ,CEH, MSCE, MCSA or equivalent (Essential) University degree in an information technology or related domain (Advantageous) Relevant Industry certification; OSCP or alternative in offensive or defensive security certifications(Advantageous) Relevant system / IT engineering certifications in on prem or cloud environments (Advantageous)Experience
3-5 years' experience in information / cyber security (Essential); Strong experience and understanding Cyber Security frameworks and applying it (Essential); Experience in Security Operations (Essential); Exposure and/or experience in Security Architecture (Advantageous); Experience in Threat Hunting and Threat Intelligence (Advantageous)Think you have what it takes to be part of an unstoppable team who constantly finds better ways to give peace of mind? Don't wait, apply now.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Category:
Security Engineering Jobs
Tags: Application security CEH Cloud Compliance Endpoint security Forensics IAM Incident response Offensive security OSCP Pentesting Risk management SOC Threat intelligence Vulnerability management
Perks/benefits: Career development Conferences Team events
Region:
Africa
Country:
South Africa
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsSenior Security Analyst jobsProduct Security Engineer jobsSenior Cloud Security Engineer jobsSenior Cybersecurity Engineer jobsSystems Administrator jobsSystems Engineer jobsSenior Information Security Analyst jobsInformation Security Manager jobsSenior Network Security Engineer jobsIT Security Engineer jobsCyber Security Specialist jobsChief Information Security Officer jobsIT Security Analyst jobsSecurity Consultant jobsSecurity Specialist jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior Information Security Engineer jobsSenior Cyber Security Engineer jobsSenior Product Security Engineer jobsThreat Intelligence Analyst jobsCyber Security Architect jobsSecurity Operations Analyst jobs
SaaS jobsTS/SCI jobsBash jobsEncryption jobsEDR jobsThreat detection jobsIDS jobsMalware jobsSplunk jobsIPS jobsTerraform jobsSDLC jobsTop Secret jobsFinance jobsSQL jobsForensics jobsDocker jobsRMF jobsIntrusion detection jobsSOC 2 jobsCompTIA jobsITIL jobsOWASP jobsActive Directory jobsDoDD 8570 jobs
GIAC jobsAnsible jobsVPN jobsTCP/IP jobsHIPAA jobsSANS jobsUNIX jobsIT infrastructure jobsSOAR jobsSAP jobsData Analytics jobsClearance Required jobsCRISC jobsCCSP jobsOSCP jobsPolygraph jobsMITRE ATT&CK jobsJira jobsJavaScript jobsMachine Learning jobsBanking jobsSOX jobsSecurity strategy jobsDNS jobsNIST 800-53 jobs