Enable job alerts via email!

Information Security Management System

Vector Logistics

Gauteng

On-site

ZAR 800 000 - 1 200 000

Full time

Today
Be an early applicant

Job summary

A leading supply chain company seeks an Information Security Management System Specialist in Gauteng. This role involves overseeing the ISMS implementation, ensuring compliance with ISO standards, and managing security incidents. Candidates should possess extensive experience in information security and necessary certifications. Join us to help maintain our commitment to security across our operations.

Qualifications

  • 7-10 years of experience in information security or cybersecurity.
  • 1-3 years in a managerial or leadership role.
  • ISO Lead Implementer certification mandatory.

Responsibilities

  • Lead the design and implementation of ISMS.
  • Conduct risk assessments.
  • Ensure compliance with ISO standards.

Skills

Risk management
Incident response
Information security frameworks
Regulatory compliance
Communication
Leadership

Education

Bachelor's Degree in Information Security, Computer Science, Information Technology, or related field

Tools

Microsoft Sentinel
CyberReason
Microsoft Defender
Job description
Overview

Permanent Midrand. We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature‑controlled network in Southern Africa. But we are also more than that.

We are people serving people.

While we boast the best in tech and infrastructure, our people are our greatest resource. With our skilled, curious, can‑do people at the forefront, our assets become your assets, our service your solutions. Vector's vehicle fleet includes a food industry first in 'multi-temperature' vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.

Job Purpose

Information Security Management System (ISMS) Specialist is responsible for the end‑to‑end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO / IEC standards.

The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.

Key Responsibilities
  • Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO / IEC and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).
  • Develop, implement, and maintain information security policies, procedures, and guidelines.
  • Assess existing information security practices and recommend improvements.
  • Ensure the organization's ISMS aligns with business needs, regulatory requirements, and industry best practices.
  • Perform risk assessments to identify potential security risks to the organization's information assets in alignment to ISO.
  • Develop risk treatment plans and assist in the implementation of risk mitigation strategies.
  • Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS compliance.
  • Ensure compliance with ISO / IEC and other industry standards and regulations.
  • Prepare the organization for certification audits and support the audit process; coordinate with auditors and certification bodies.
  • Maintain records and documentation to ensure traceability and compliance with ISMS requirements.
  • Provide training to staff and management on information security best practices, policies, and compliance requirements; promote a culture of information security awareness across the organization.
  • Support the creation of an internal security awareness program.
  • Assist in the development and testing of incident response plans; provide guidance and support in handling information security incidents.
  • Ensure incidents are documented and reported in accordance with regulatory and contractual obligations & assist in post‑incident analysis to determine the cause and recommend preventive actions.
  • Define and monitor ISMS‑related KPIs and metrics; monitor and report on the performance of the ISMS, identifying areas for improvement.
  • Monitor compliance with security policies and procedures; lead regular internal audits to assess the effectiveness of the ISMS.
  • Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.
  • Keep up‑to‑date with emerging threats, vulnerabilities, and regulatory changes.
  • Assess and monitor third‑party vendors and service providers for information security compliance; assist in the integration of ISMS controls into third‑party contracts and SLAs.
Key Relationships

This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders. These interactions are essential for ensuring the organization's security posture is robust and aligned with its strategic objectives.

Qualifications and Experience
  • Degree: Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field.
  • Mandatory Requirement: ISO Lead Implementer; Preferred: ISO Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA).
  • Minimum of 7‑10 years of experience in the field of information security, cybersecurity, or a related discipline, with at least 1‑3 years in a managerial or leadership capacity.
  • Extensive experience in risk management, incident response, and compliance, including South African regulations like POPIA and the Cybercrimes Act.
  • Hands‑on management of security frameworks such as ISO / IEC and NIST; experience leading ISO / IEC certification projects and certification maintenance.
  • Experience with ISO certification bodies, development of audit and ISMS remediation plans.
  • Strong proficiency in security tools including Microsoft Sentinel, CyberReason, and Microsoft Defender.
  • Relevant professional certifications such as CISM, CRISC, or CISA.
Knowledge of frameworks and skills (qualifications)
  • Intrinsic understanding of the ISMS statement of applicability.
  • In‑depth knowledge of information security frameworks such as ISO / IEC, NIST, and CIS Controls.
  • Familiarity with IT governance frameworks (COBIT, ITIL).
  • Experience in BIA, BCM, DR; vulnerability management, patching, JML.
  • Knowledge of data protection laws and industry regulations.
  • Excellent communication, adaptability, attention to detail, and ethical judgement.
Strategic Thinking & Leadership
  • Strategic Thinking: Align security strategies with business objectives.
  • Technical Expertise: Proficiency in threat analysis and mitigation.
  • People Management: Strong leadership skills to build and manage external resources.
  • Decision‑Making and Judgment: Make critical security decisions with discretion.
  • Collaboration and Communication: Engage with technical and non‑technical stakeholders.
  • Problem‑Solving and Analytical Skills: Assess and resolve complex security issues.
  • Compliance and Regulatory Knowledge: In‑depth understanding of relevant regulations.
  • Adaptability and Resilience: Manage high‑pressure situations.
  • Ethical Integrity: Commitment to uphold high ethical standards.

We look forward to hearing from you.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.