Job Search and Career Advice Platform

Enable job alerts via email!

Security Engineer : Enterprise And Cloud Infrastracture

Alinta Tech Solutions

Gauteng

On-site

ZAR 500 000 - 700 000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity solutions provider in Gauteng is seeking a Security Engineer to implement and maintain security protocols. This role involves configuring security systems, responding to incidents, and remediating vulnerabilities. Candidates should possess a Bachelor's degree in Cybersecurity or related fields, along with industry certifications such as CISSP or CEH. You will be crucial in safeguarding the organization's data and infrastructure, ensuring security measures align with the latest technology trends.

Qualifications

  • Extensive understanding of cybersecurity protocols and best practices.
  • Proficiency in security tools including firewalls and intrusion detection systems.
  • Knowledge of compliance standards like ISO, NIST, PCI DSS, and GDPR.

Responsibilities

  • Implement security controls according to guidelines from security architects.
  • Monitor security systems for anomalies and respond to incidents.
  • Conduct vulnerability remediation and apply necessary patches.

Skills

Cybersecurity Principles
Security Systems Management
Vulnerability Remediation
Security Incident Response
Cloud Security Knowledge
Compliance Understanding
Network and System Security
Technical Communication
Problem Solving
Continuous Learning

Education

Bachelor’s degree in Computer Science or related field
Industry Certifications (CISSP, CEH, or CISM)

Tools

Nessus
Open VAS
Qualys
Firewalls
Antivirus Software
Job description
Job Overview

The Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organization's data and infrastructure. This hands‑on position entails executing security strategies, as well as installing and configuring vital security apparatus, such as firewalls and intrusion detection systems. The Security Engineer is responsible for applying and maintaining security measures to protect critical data and infrastructure. Installing, configuring, and managing security systems and software. Identifying and remediating detected vulnerabilities on time. Responding swiftly to security breaches or incidents. Ensuring the continuous secure operation of the IT environment. Staying abreast of the latest developments in security technologies, threats, and countermeasures. The Security Engineer is essential in maintaining the integrity and security of the organization's digital resources, ensuring they are shielded from potential cyber threats through diligent maintenance and proactive monitoring.

Key Responsibilities
  • Security Implementation
    • Implement security controls based on guidelines and designs provided by the security architect.
    • KPIs: Number of security controls implemented within the specified timeline; Percentage of implemented controls functioning as expected.
  • Security Configuration
    • Configure and manage security solutions, including firewalls, intrusion detection systems, anti‑virus software, and data encryption.
    • KPIs: Number of security configurations completed within scope, time, and budget; Percentage of configured solutions functioning without critical issues.
  • Vulnerability Remediation
    • Apply patches and modifications to fix identified vulnerabilities.
    • KPIs: Mean time to remediate vulnerabilities; Number of exceptions; Average age of open vulnerabilities.
  • Security Monitoring and Incident Response
    • Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and elevate as necessary.
    • KPIs: Number of security incidents detected and responded to within an acceptable timeframe; Mean time to identify and elevate critical incidents.
  • Compliance Checks
    • Resolve identified compliance issues from regular checks to ensure the systems comply with the organization’s security policies and standards.
    • KPIs: Compliance rate with security standards and policies; Number of non‑compliance issues identified and resolved.
  • End‑user Security
    • Implement end‑user security practices, like password management and access controls.
    • KPIs: Percentage of end‑users adopting implemented security practices; Number of end‑user‑related security incidents.
  • Vendor Management Support
    • Coordinate with vendors to ensure the correct implementation and functioning of security systems.
    • KPIs: Vendor SLA compliance rate; Number of successful interactions and resolutions with vendors.
  • Updating and Upgrading Security Systems
    • Regularly update and upgrade security systems in line with technological advancements and evolving threats.
    • KPIs: Number of successful updates and upgrades completed within the specified timeline; Reduction in security incidents due to outdated systems.
  • Training and Mentorship
    • Train team members on security operations, troubleshooting, and best practices.
    • KPIs: Number of training sessions conducted; Team member satisfaction rate with training.
  • Staying Abreast of Emerging Technologies
    • Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the company’s security measures are updated.
    • KPIs: Number of relevant technology updates incorporated into the environment; Number of industry events attended or certifications obtained.
  • Team Collaboration
    • Participate in cross‑functional projects, enhance system integration, and collaboration.
    • KPIs: Participate in at least one major cross‑functional project per year.
  • Miscellaneous and General Responsibilities
    • Complete any assigned work‑related duties and responsibilities.
    • KPIs: Completion rate of assigned duties and responsibilities; Overall satisfaction rate in the performance of miscellaneous duties.
Requirements
Knowledge Requirements
  • Cybersecurity Principles: Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures.
  • Security Systems: Expertise in managing, configuring, and troubleshooting security systems, such as firewalls, intrusion detection systems, antivirus software, authentication mechanisms, and log management tools.
  • Vulnerability Remediation: Proficiency in using assessment tools and techniques for vulnerability identification and remediation.
  • Security Incident Response: Familiarity with the protocols and procedures for responding to, documenting, and resolving security incidents.
  • Network and System Security: Good understanding of network and system security principles, including knowledge of encryption technologies, IPsec, VPNs, and network protocols.
  • Cloud Security: Knowledge of security controls for leading cloud platforms like AWS, Azure, and Google Cloud.
  • Compliance Standards: Understanding of IT compliance and security standards such as ISO *****, NIST, PCI DSS, and GDPR.
  • Emerging Security Technologies: Awareness of the latest cybersecurity technologies and trends.
  • IT Service Management Frameworks: Knowledge of frameworks and processes such as ITIL.
Qualifications
  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Industry Certifications: CISSP, CEH, or CISM certifications are preferred.
  • Cloud Security Certifications: Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous.
  • Other Certifications: Certifications like ITIL, CRISC, or CISA are beneficial.
Experience
  • Security Implementation: Hands‑on experience with security measures such as firewalls, intrusion detection systems, antivirus software, and data encryption.
  • Vulnerability Assessment and Remediation: Experience in vulnerability detection and the implementation of remediation strategies.
  • Security Protocols and Technologies: Deep experience with security protocols, encryption technologies, and network protocols.
  • Incident Response: Experience in managing security incidents and performing threat hunting.
  • Network Security: Skills in implementing network security measures.
  • Cloud Security: Experience with security in cloud environments like AWS, Azure, or Google Cloud.
  • Compliance: Experience with compliance management according to relevant standards and regulations.
Technical Skills
  • Security Tools: Proficiency in using security tools including firewalls, intrusion detection systems, and antivirus software.
  • Vulnerability Assessment Tools: Experience with tools like Nessus, Open VAS, and Qualys.
  • Network Security: Skills in managing network security protocols and systems.
  • Programming and Scripting: Proficiency in scripting languages like Python or Bash.
  • Cloud Security Tools: Knowledge of tools specific to cloud security.
  • Encryption Technologies: Understanding of encryption and secure communication technologies.
  • Incident Response Tools: Ability to utilize tools for quick response to security breaches.
  • IT Service Management Frameworks: Familiarity with frameworks like ITIL.
  • Problem‑solving: Strong ability to troubleshoot and resolve complex network issues.
  • Detail‑oriented: Meticulous in planning, execution, and documentation.
  • Communication Skills: Excellent communication skills, with the ability to explain complex technical issues in simple terms.
  • Teamwork and Collaboration: Strong team player with effective collaboration skills.
  • Continuous Learning: Commitment to continuous skill improvement and staying current with industry trends.
  • Customer Focus: Dedicated to meeting customer needs and maintaining high satisfaction levels.
  • Adaptability: Openness to adopting new technologies and methods.
  • Stress Management: Capable of handling pressure and urgent situations effectively.
  • Time Management: Efficient in prioritizing tasks and managing time.
  • Ethics and Integrity: High ethical standards and integrity in professional conduct.

Salary is market related.

Posted By Alinta Tech Solutions HR Services, Recruitment & Selection

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.