
Enable job alerts via email!
Generate a tailored resume in minutes
Land an interview and earn more. Learn more
A security-focused organization in Johannesburg is seeking an Information Security Officer to protect its information assets. The ideal candidate will develop and implement security policies, conduct risk assessments, and ensure compliance with security standards. Candidates should have a Bachelor's degree in a relevant field, a professional certification in Information Security, and a minimum of 3–5 years of experience in information security roles. This role offers an opportunity to work in a dynamic environment focused on safeguarding sensitive data.
The Information Security Officer is responsible for protecting the organisation's information assets by implementing and maintaining effective information security policies, procedures, and controls.
This role ensures compliance with security standards, mitigates risks, and supports business continuity while safeguarding confidential and sensitive data.
Develop, implement, and maintain information security policies, standards, and procedures.
Monitor and manage security systems, including firewalls, antivirus, intrusion detection, and access controls.
Conduct regular risk assessments and vulnerability assessments to identify and address security gaps.
Investigate security breaches, incidents, and threats, and implement corrective actions.
Ensure compliance with relevant legislation, regulatory requirements, and industry best practices.
Provide training and awareness programs to staff on information security protocols and procedures.
Maintain up-to-date knowledge of emerging threats and technologies in information security.
Collaborate with IT, HR, and other departments to ensure secure handling of data and IT systems.
Support audits and internal / external security assessments.
Develop and maintain incident response and disaster recovery plans.
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field.
Professional certification in Information Security (e.g., CISSP, CISM, ISO Lead Implementer / Lead Auditor) advantageous.