Enable job alerts via email!

Security Engineer

findojobs-za

Pretoria

Hybrid

ZAR 500 000 - 900 000

Full time

Today
Be an early applicant

Job summary

A technology solutions company in Pretoria is seeking an IT Security Engineer to lead cybersecurity efforts, ensuring compliance with standards while managing IT security systems. As part of the role, you will conduct penetration tests, monitor compliance, and drive improvements in security measures. Candidates must have an engineering degree and deep knowledge of cybersecurity practices, preferably with AWS experience. The position offers remote work options after the probation period.

Benefits

Work-from-home options
Flexible work hours

Qualifications

  • Engineering degree in Computer, Software, Mechanical or Electronic.
  • OSCP, PNPT, CISSP, or CCSP certifications are desirable.
  • Experience with AWS ecosystem and security compliance.

Responsibilities

  • Lead and manage cybersecurity initiatives and training.
  • Monitor compliance with cybersecurity policies and standards.
  • Conduct penetration tests and vulnerability scans.

Skills

Deep understanding of automation
Familiarity with operational observability
Understanding of Linux/Windows administration
Solid knowledge of IT security
Understanding of AWS ECS & Kubernetes
Knowledge in security classification frameworks
Good knowledge of industry standards

Education

Engineering degree

Tools

AWS
Docker
Kubernetes
Job description
Job Purpose

Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective. Ensures data integrity, and that information is kept accurate and consistent unless authorized changes are made (and documented), and that confidentiality is upheld by protecting information from unauthorized access. Responsible for cybersecurity compliance and training throughout the Company. As the IT Security Engineer, you’ll support the company by taking the lead on cybersecurity and working with the team to perform ongoing operations, administration, and development of security systems, as well as implementing fixes that would protect their systems. You will continuously work towards high confidence and high accuracy detection rules leveraging abnormal or suspicious events.

Minimum Education (Essential)

Engineering degree (Computer, Software, Mechanical or Electronic)

Minimum Education (Desirable)
  • OSCP (Offensive Security Certified Professional)
  • PNPT (Practical Network Penetration Tester)
  • CISSP (Certified Information Systems Security Professional)
  • CCSP (Certified Cloud Security Practitioner)
Minimum Applicable Experience (Years)

AWS' ecosystem: AWS Well Architected Framework, Trusted Advisor, GuardDuty, SCP, SSM, IAM, WAF, container services such as ECS/EKS, incident detection and response management. Performing penetration tests and vulnerability scans against networks and infrastructure, applications and AWS environments. Drafting and implementing security policies, security procedures, security design and implementation.

The Following Would Be Advantageous
  • ISO (risk management) compliance ISO
  • ISO (cybersecurity) compliance SOC2 Type 2 (with HiTrust attestation) or HiTrust experience (or equivalent)
Skills and Knowledge (Essential)
  • Deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design.
  • Familiarity with operational observability, including log aggregation, application performance monitoring, etc.
  • Understanding of Linux/Windows server and application administration and configuration, networking, scripting and automation, large-scale distributed computing architecture.
  • Solid knowledge of IT security (firewalls, EDR, IDS/IPS, SOAR, vulnerability scanning forensic, and threat hunting).
  • Understanding of AWS ECS & Kubernetes and containerisation (Docker/Podman/Containerd) with implementation, support, and design.
  • Knowledge in security classification frameworks like MITRE or the cyber-attack kill chain.
  • Good knowledge and understanding of industry standards, memberships, and frameworks such as CIS and SOC 2.
Cybersecurity Management (40%)

Drive development standards and processes related to cybersecurity compliance. Monitor all cybersecurity processes, operations, and infrastructure, monitoring internal and external policy and regulatory compliance. Review and evaluate development designs (for existing products and during design phase for new products) to identify gaps in cybersecurity controls, and drive updates to any cybersecurity or compliance documentation. Liaise with internal and external stakeholders to prepare for SOC2 Type 2 and HiTrust. Drive cybersecurity audit strategy and readiness from a dev, security and devops perspective. Identify, implement, and maintain all security tools and technology. Schedule (and ideally automate) internal vulnerability scans, remediating findings and ensuring accurate & timely reporting to satisfy PCI DSS requirements. Schedule annual penetration tests with external supplier(s) and ensure implementation of items identified in remediation plans. Complete required cybersecurity applications and records for large customers and audits, including reporting as required.

Infrastructure Management (30%)

Drive and action where required the planning, installation, monitoring and maintenance of IT systems and infrastructure focused on cyber security including any penetration testing that is required. Design and execute short- and long-term initiatives to detect and prevent any security vulnerabilities in the IT infrastructure (cloud, security and devops) to meet current and future needs. Develop, execute and oversee procedures, policies and related training plans for cybersecurity project management and infrastructure administration. Conduct research and recommend changes in services, products, protocols, and standards to support development efforts and infrastructure procurement. Define software and hardware security standards in collaboration with stakeholders and owners for the provisioning of the development and IT infrastructure. Ensure appropriate security levels on network, infrastructure and servers are maintained, ensuring that the IT team follows the requirements set in line with cybersecurity standards. Implement cybersecurity continuous improvement programs. Crisis management – keeping stakeholders informed and actively working with teams to return service in the shortest possible time frame. This would include documenting all disaster recovery procedures. Effective management and optimisation of vendors (where applicable) as well as collaborating with the dev and IT teams as necessary.

Risk Management and Compliance (20%)

Collaborate with divisional RAQA team and Senior Managers to define and centralise risks and put mitigation measures in place for new and existing products and services, from a cybersecurity and privacy perspective. Improve the automation of security controls. Work closely with the dev team on defining industry-standard processes and system requirements, identifying and proposing fixes to shortcomings in the development lifecycle, code reviews and scanning as well as infrastructure provisioning. Work with the dev team to ensure that security standards and policies are being set up and configured correctly, ensuring adherence to certifications and best-practice. Assist with remediations on risk items identified from security and preventative detection reviews to ensure compliance and ensure the security posture of the IT landscape is ensured at all times. Remediate audit items by putting measures in place to prevent the recurrence of findings. For example, by making sure that audit findings are resolved by the relevant personnel and that the resolutions are such that they prevent the item from reoccurring in the future. Manage internal and external audits as required with relation to cybersecurity. Maintain documentation for cybersecurity-related risks, processes and findings.

Quality Management System (QMS) and Documentation (10%)

Manage annual cybersecurity roadmap, IT audit (internal and external) plan and calendar. Work closely with the Compliance team to gather and submit evidence for all security and IT audits. Proactively keep stakeholders updated on status, progress, risks and problems. Review and approve documented outcomes of penetration tests, remediation plans and required activities. Review and approve documented outcomes of vulnerability scans, remediation plans and required activities. Maintain cybersecurity documents and records in line with certification requirements. Maintain document bank and matrix for the cybersecurity set‑up and external customer‑audit matrix requests. For example, ensuring that all cybersecurity related information, such as architectural diagrams, asset lists, asset control lists and vulnerabilities, can be referenced from a single central source from which to direct the readers to the appropriate resources.

Work‑from‑Home

2 days work‑from‑home in line with Company Policy (only applicable after probation is successfully passed).

Application Status

Should you not receive a response from us within one week of your application, your application has unfortunately not been successful.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.