Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

ICT Infrastructure and Security Specialist | #microsoft | #hacking | #cybersecurity | #hacking | #aihp

Job Purpose:

  1. Responsible for protecting IT infrastructure, edge devices, networks, and data.
  2. Responsible for preventing data breaches and monitoring and reacting to attacks.
  3. Need to stay up to date with the latest in Cyber Attacks
  4. Advise and implement user access controls and identity and access management systems
  5. Monitor network and application performance to identify and irregular activity
  6. Perform regular audits to ensure security practices are compliant
  7. Deploy endpoint detection and prevention tools for protection of malicious hacks
  8. Monitor patch management systems to update applications automatically
  9. Implement comprehensive vulnerability management systems across all assets on-premises and in the cloud
  10. Work with Organization to educate employees on how to identify suspicious activity
  11. Provide input to the organizations ICT security policies and controls.
  12. Assist CIO with the cyber security strategy.
  13. Managing security incidents with the organizations Cybersecurity Partner
  14. Good Understanding and hands on support and monitoring of Infrastructure Security – Firewalls, IPS, Endpoint Security, email, and application security.
  15. Provide input to IT Security governance and risk management.1
  16. Familiar with and provide input to ISO27001 and CIS Controls across the organization
  17. Continual advice to CIO on how to improve the organizations Information Security posture
  18. Performs daily policy checks on organization Security Infrastructure
  19. Deploy and provide technical documentation related to groupwide ICT security Posture
  20. Good understanding of network and Microsoft Infrastructure and SQLQualifications and or

– 5 years relevant Information Security experience, at a technical level.
– Proven experience as an Information Security Officer, Manager and/or Consultant.
– Security + CEH
– Experience in cybersecurity architecture design and governance in both data centre and cloud environments.
– Practical implementation experience in risk management/control frameworks such as ISO27001 and/or CIS Controls or equivalent.
– Good understanding of cyber controls and/or vendors, specifically IEM/EDR/NDR/DLP/IAM/PAM.
– Technical security design and integration.
– Comprehensive background of cloud security architecture.
– Understanding of regulations and compliance such as POPIA, and their technical application.

Skills, Knowledge and Attributes:
– Excellent Communication skills
– Analytic skills (Information processing)
– Interpersonal skills
– Assist CIO on how to improve the organizations Information Security posture
– Implement and follow through security Policies for Network, security, and Endpoint security – aligning with CIS Controls.
– Good understanding of IT Infrastructure
– Good understanding of Security (FW, IPS, EPS)
– Good understanding of Microsoft applications and SQL DB
– Ability to take ownership of an ICT problem or project from beginning to completion.
– Excellent written, communication and presentation skills
– Excellent organizational and follow-up skills
– Competent in problem solving (problem analysis)
– Outstanding organizing skills
– Ability to update and draft technical Documents.
– Attention to detail.
– Monitoring
– Record keeping and documentation
– Planned change control knowledge.
– Teamwork
– Ability to work under pressure
– Deadline orientated
– Apply company ISO policies relating to network and security.
– Monitor and report on security vulnerabilities.
– Implementation of network and security standards
– Proactive Monitoring

Desired Skills:

  • communication
  • analytical
  • interpersonal

Desired Work Experience:

Desired Qualification Level:

Employer & Job Benefits:

Learn more/Apply for this position

Click Here For The Original Source.


National Cyber Security