Job Search and Career Advice Platform

Enable job alerts via email!

Security Engineer Centurion

Alinta Tech Solutions

Gauteng

On-site

ZAR 400 000 - 500 000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology solutions provider based in Gauteng is looking for a Security Engineer. This role involves implementing and managing security measures, responding to incidents, and ensuring compliance with security policies. Ideal candidates will have a bachelor's degree in computer science and experience with security systems, including firewalls and IDS. Proficiency with vulnerability assessment tools and knowledge of cloud security are essential. The position offers a dynamic environment, relevant certifications are preferred, with a salary that is market related.

Qualifications

  • Knowledge of cybersecurity principles and best practices.
  • Experience with security systems configuration and troubleshooting.
  • Proficiency in using vulnerability assessment tools.

Responsibilities

  • Implement and manage security systems to safeguard data.
  • Respond to security breaches and ensure compliance.
  • Conduct regular security monitoring and incident response.

Skills

Knowledge of cybersecurity principles
Experience managing security systems
Proficiency in vulnerability assessment tools
Strong understanding of network security principles
Knowledge of cloud security controls
Understanding of compliance standards
Awareness of emerging security technologies
ITIL knowledge

Education

Bachelor's degree in Computer Science or related field
Certifications: CISSP, CEH, CISM

Tools

Firewalls
IDS
Antivirus software
Vulnerability assessment tools like Nessus
Job description
Security Engineer – Centurion Alinta Tech Solutions • Gauteng

The Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organization’s data and infrastructure. This hands‑on position entails executing security strategies, as well as installing and configuring vital security apparatus such as firewalls and intrusion detection systems.

Key responsibilities include:

  • Installing, configuring, and managing security systems and software.
  • Identifying and remediating detected vulnerabilities on time.
  • Responding swiftly to security breaches or incidents.
  • Ensuring the continuous secure operation of the IT environment.
  • Staying abreast of the latest developments in security technologies, threats, and countermeasures.
  • Maintaining the integrity and security of the organization’s digital resources.
Security Implementation
  • Implement security controls based on guidelines and designs provided by the security architect.
Security Configuration
  • Configure and manage security solutions, including firewalls, intrusion detection systems, anti‑virus software, and data encryption.
Vulnerability Remediation
  • Apply patches and modifications to fix identified vulnerabilities.
Security Monitoring and Incident Response
  • Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and escalate as necessary.
Compliance Checks
  • Resolve identified compliance issues from regular checks to ensure the systems comply with the organization’s security policies and standards.
End‑User Security
  • Implement end‑user security practices, like password management and access controls.
Vendor Management Support
  • Coordinate with vendors to ensure the correct implementation and functioning of security systems.
Updating and Upgrading Security Systems
  • Regularly update and upgrade security systems in line with technological advancements and evolving threats.
Training and Mentorship
  • Train team members on security operations, troubleshooting, and best practices.
Staying Abreast of Emerging Technologies
  • Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the company’s security measures are updated.
Team Collaboration
  • Participate in cross‑functional projects, enhance system integration, and collaboration.
Miscellaneous and General Responsibilities
  • Complete any assigned work‑related duties and responsibilities.

Requirements:

  • Knowledge of cybersecurity principles, best practices, enterprise, and cloud infrastructures.
  • Experience managing, configuring, and troubleshooting security systems (firewalls, IDS, antivirus, authentication mechanisms, log management tools).
  • Proficiency in vulnerability assessment tools and remediation.
  • Familiarity with incident response protocols and documentation.
  • Strong understanding of network and system security principles, encryption technologies, IPsec, VPNs, and network protocols.
  • Knowledge of cloud security controls for AWS, Azure, and Google Cloud.
  • Understanding of compliance standards such as ISO, NIST, PCI DSS, and GDPR.
  • Awareness of emerging security technologies and trends.
  • Knowledge of ITIL and other service‑management frameworks.

Education & Certifications:

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Preferred certifications: CISSP, CEH, CISM, AWS, Google Cloud, Microsoft Azure, ITIL, CRISC, or CISA.

Experience:

  • Hands‑on experience with security measures (firewalls, IDS, antivirus, data encryption).
  • Proven record in vulnerability assessment, remediation, and incident response.
  • In‑depth experience with security protocols, encryption, and network protocols.
  • Experience managing security incidents and threat hunting.
  • Experience with network security measures.
  • Experience in cloud security within AWS, Azure, or Google Cloud.
  • Experience with compliance management per relevant standards.

Technical Skills:

  • Proficiency with security tools (firewalls, IDS, antivirus).
  • Experience with vulnerability assessment tools (Nessus, OpenVAS, Qualys).
  • Network security management.
  • Programming/scripting (Python, Bash).
  • Knowledge of cloud security tools.
  • Encryption and secure communication knowledge.
  • Incident response tools.
  • ITIL framework familiarity.
  • Strong troubleshooting, documentation, communication, teamwork, continuous learning, customer focus, adaptability, stress management, time management, and ethics.

Salary: Market related.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.