Enable job alerts via email!

Information Security Manager

Boardroom Appointments

Midrand

On-site

ZAR 40,000 - 80,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking an Information Security Manager to lead their Cyber Security efforts. In this pivotal role, you will create and enforce security policies, conduct risk assessments, and ensure compliance with industry standards. Your expertise in information security principles and practices will be crucial in protecting the company's data and assets. Collaborating with various stakeholders, you will foster a culture of security awareness while managing both on-premises and cloud security environments. If you are passionate about Cyber Security and ready to make a significant impact, this opportunity is for you.

Qualifications

  • 3-5 years in information/Cyber Security with IT Security background.
  • Professional certifications like CISSP or CISM are negotiable.

Responsibilities

  • Create and enforce security policies to protect data and assets.
  • Identify and mitigate security risks while ensuring compliance.

Skills

Information Security Principles
Network Protocols
Intrusion Detection Systems
Scripting Languages (Python, Perl, etc.)
Risk Assessment

Education

Bachelor's in Computer Science
Cyber Security Qualification

Tools

Windows
Linux

Job description

Information Security Manager

Minimum Requirements:

  • Bachelor's degree in Computer Science or Information Technology.

  • Completed Cyber Security or an equivalent qualification.

  • Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) (Negotiable).

  • 3-5 years of experience in information/Cyber Security and IT Security background.

  • Strong knowledge of information security principles and practices.

  • Understanding of network protocols, firewalls, intrusion prevention, and intrusion detection systems.

  • Proficiency with various operating systems, such as Windows, Linux, etc.

  • Ability to identify and assess vulnerabilities in systems, networks, and social engineering.

  • Proficient understanding of scripting and programming languages, including but not limited to Python, Perl, Bash, Java, PHP, etc.

Responsibilities:

  • Creating and enforcing security policies, procedures, and protocols to protect the company's data and information assets.

  • Identifying, mitigating security risks, and ensuring compliance with relevant regulations and standards.

  • Addressing security incidents and collaborating with various departments, promoting a culture of security awareness and best practices within the company.

  • Providing leadership and effective communication to guide and motivate a team of Cyber Security specialists.

  • Defining Cyber-Security objectives supported by a roadmap to ensure the company's information assets and data are effectively protected.

  • Defining metrics to measure and improve the maturity level of the company's Cyber Security posture.

  • Enhancing management and operational reporting of the Cyber Security posture.

  • Creating and maintaining information security policies and procedures to mitigate risks and ensure compliance with industry standards and regulations.

  • Monitoring and ensuring compliance with applicable regulations and standards, such as NIST and ISO 27001.

  • Conducting risk assessments to identify potential vulnerabilities and threats and developing strategies to mitigate those risks.

  • Managing security systems for potential breaches and crisis management by responding to security incidents effectively.

  • Conducting training and education programs to raise security awareness among employees and foster a security culture within the organization.

  • Staying updated with the latest Cyber trends and threats.

  • Managing hybrid security environments, integrating on-premises and cloud platforms.

  • Collaborating with various stakeholders across the company to ensure a cohesive approach to Cyber Security.

  • Partnering with security vendors for effective solutions.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.