Security Engineer – Centurion Alinta Tech Solutions • Gauteng
The Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organization’s data and infrastructure. This hands‑on position entails executing security strategies, as well as installing and configuring vital security apparatus such as firewalls and intrusion detection systems.
Key responsibilities include:
- Installing, configuring, and managing security systems and software.
- Identifying and remediating detected vulnerabilities on time.
- Responding swiftly to security breaches or incidents.
- Ensuring the continuous secure operation of the IT environment.
- Staying abreast of the latest developments in security technologies, threats, and countermeasures.
- Maintaining the integrity and security of the organization’s digital resources.
Security Implementation
- Implement security controls based on guidelines and designs provided by the security architect.
Security Configuration
- Configure and manage security solutions, including firewalls, intrusion detection systems, anti‑virus software, and data encryption.
Vulnerability Remediation
- Apply patches and modifications to fix identified vulnerabilities.
Security Monitoring and Incident Response
- Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and escalate as necessary.
Compliance Checks
- Resolve identified compliance issues from regular checks to ensure the systems comply with the organization’s security policies and standards.
End‑User Security
- Implement end‑user security practices, like password management and access controls.
Vendor Management Support
- Coordinate with vendors to ensure the correct implementation and functioning of security systems.
Updating and Upgrading Security Systems
- Regularly update and upgrade security systems in line with technological advancements and evolving threats.
Training and Mentorship
- Train team members on security operations, troubleshooting, and best practices.
Staying Abreast of Emerging Technologies
- Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the company’s security measures are updated.
Team Collaboration
- Participate in cross‑functional projects, enhance system integration, and collaboration.
Miscellaneous and General Responsibilities
- Complete any assigned work‑related duties and responsibilities.
Requirements:
- Knowledge of cybersecurity principles, best practices, enterprise, and cloud infrastructures.
- Experience managing, configuring, and troubleshooting security systems (firewalls, IDS, antivirus, authentication mechanisms, log management tools).
- Proficiency in vulnerability assessment tools and remediation.
- Familiarity with incident response protocols and documentation.
- Strong understanding of network and system security principles, encryption technologies, IPsec, VPNs, and network protocols.
- Knowledge of cloud security controls for AWS, Azure, and Google Cloud.
- Understanding of compliance standards such as ISO, NIST, PCI DSS, and GDPR.
- Awareness of emerging security technologies and trends.
- Knowledge of ITIL and other service‑management frameworks.
Education & Certifications:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Preferred certifications: CISSP, CEH, CISM, AWS, Google Cloud, Microsoft Azure, ITIL, CRISC, or CISA.
Experience:
- Hands‑on experience with security measures (firewalls, IDS, antivirus, data encryption).
- Proven record in vulnerability assessment, remediation, and incident response.
- In‑depth experience with security protocols, encryption, and network protocols.
- Experience managing security incidents and threat hunting.
- Experience with network security measures.
- Experience in cloud security within AWS, Azure, or Google Cloud.
- Experience with compliance management per relevant standards.
Technical Skills:
- Proficiency with security tools (firewalls, IDS, antivirus).
- Experience with vulnerability assessment tools (Nessus, OpenVAS, Qualys).
- Network security management.
- Programming/scripting (Python, Bash).
- Knowledge of cloud security tools.
- Encryption and secure communication knowledge.
- Incident response tools.
- ITIL framework familiarity.
- Strong troubleshooting, documentation, communication, teamwork, continuous learning, customer focus, adaptability, stress management, time management, and ethics.
Salary: Market related.