Enable job alerts via email!

Cybersecurity Specialist

SavageOne Pty Ltd

Johannesburg

On-site

ZAR 500,000 - 800,000

Full time

15 days ago

Job summary

A leading company in cybersecurity solutions is seeking a Cybersecurity Specialist to protect its systems, networks, and data. Candidates should have expertise in security protocols, strong analytical skills in threat analysis, and relevant certifications. This role requires a proactive approach to safeguarding digital assets and managing incident responses. Join our team and help safeguard our digital landscape against evolving threats.

Qualifications

  • CISSP, CEH, CISM, or CompTIA Security+ preferred.
  • Experience with advanced threat detection tools.
  • Proficiency in network traffic analysis.

Responsibilities

  • Conduct vulnerability assessments and penetration testing.
  • Develop and enforce security policies.
  • Monitor and respond to security incidents.

Skills

Proficiency in security tools and systems
Knowledge of HTTPS, SSL/TLS, and VPN protocols
Ability to automate tasks using Python and PowerShell
Experience in compliance frameworks
Expertise in threat analysis
Understanding of incident response processes

Education

Certifications like CISSP, CEH, CISM, CompTIA Security+

Tools

Wireshark

Job description

The Cybersecurity Specialist is responsible for ensuring the security of systems, networks, and data, defending against breaches, vulnerabilities, and cyber-attacks. The role requires an in-depth understanding of security protocols, tools, and best practices to protect the organizations assets from cyber threats. Cybersecurity specialists are tasked with monitoring, detecting, and mitigating potential risks, while ensuring compliance with security regulations and standards. This position is crucial in maintaining the integrity and confidentiality of data and systems, as well as safeguarding against evolving cyber threats in a rapidly changing digital landscape.

Key Skills:
  • Security Tools: Proficient in using security tools and systems such as firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management (SIEM) platforms to monitor and protect IT environments.
  • Protocols & Encryption: Strong knowledge of HTTPS, SSL/TLS, and VPN protocols for securing data in transit and protecting user privacy.
  • Scripting: Ability to automate security tasks, data collection, and analysis using scripting languages like Python and PowerShell.
  • Compliance Standards: Knowledge and experience in compliance frameworks such as GDPR, ISO 27001, PCI-DSS, and HIPAA to ensure that security practices align with legal and regulatory requirements.
  • Threat Analysis: Expertise in performing risk assessments, identifying potential threats, and implementing appropriate mitigation strategies.
  • Incident Response: Understanding of incident detection and response processes, including analyzing logs and network traffic to identify malicious activity.
Responsibilities:
  • Conduct Vulnerability Assessments and Penetration Testing:
    Perform regular vulnerability assessments to identify weaknesses in the system and infrastructure. Conduct penetration testing to simulate cyber-attacks and assess the systems resilience against threats.
  • Develop and Enforce Security Policies:
    Design, implement, and enforce organizational security policies and procedures to safeguard systems and data. Ensure compliance with industry standards and internal guidelines.
  • Monitor and Respond to Security Incidents:
    Continuously monitor network traffic, system logs, and alerts from security tools to detect and respond to potential threats in real-time. Take proactive measures to mitigate any security breaches, from malware outbreaks to unauthorized access.
  • Security Infrastructure Management:
    Configure and manage firewalls, IDS/IPS systems, and other security tools to provide proactive protection against attacks. Optimize security settings for both internal and external communications.
  • Conduct Security Awareness Training:
    Educate employees about best practices for maintaining security hygiene, recognizing phishing attempts, and adhering to organizational security policies.
  • Risk and Threat Analysis:
    Evaluate potential risks to the organizations digital assets and infrastructure. Continuously assess emerging threats and adjust security measures accordingly to stay ahead of evolving attack strategies.
  • Incident Forensics and Reporting:
    Investigate security incidents, identify the root cause, and recommend improvements to prevent future occurrences. Document incidents, responses, and remediation efforts for compliance and reporting purposes.
  • Collaboration with Other Teams:
    Work closely with IT, development, and operational teams to ensure security is integrated into all processes and systems from the outset, particularly in the case of new technology deployments or system updates.
  • Continuous Improvement:
    Stay current with the latest cybersecurity trends, emerging threats, and evolving attack vectors. Recommend and implement improvements to the security infrastructure, tools, and processes.
Preferred Qualifications:
  • Certifications like Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), or CompTIA Security+ are highly preferred.
  • Experience with advanced threat detection tools and techniques (e.g., AI/ML-based security systems).
  • Proficiency in analyzing network traffic using Wireshark or similar tools.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.