Job Search and Career Advice Platform

Enable job alerts via email!

Security Engineer

K2 Recruit

Durban

On-site

ZAR 600 000 - 800 000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity solutions provider seeks a Security Engineer to oversee cybersecurity operations in Durban. The role involves threat detection, incident response, and risk management while utilizing technologies from industry leaders like Microsoft, Fortinet, and Sophos. Candidates should have a minimum of 3 years in IT, with a strong focus on compliance and continuous improvement in security posture. Relevant security certifications and excellent communication skills are essential. The position requires hands-on experience managing complex security incidents.

Qualifications

  • Minimum of 3 years’ experience in Information Technology and at least 1 year in Cybersecurity.
  • Proven experience in progressively responsible technical roles.
  • Strong understanding of secure design principles and cybersecurity best practices.

Responsibilities

  • Ensure robust cybersecurity operations through proactive threat detection.
  • Conduct regular vulnerability audits to ensure compliance with standards.
  • Lead incident response activities from detection through to resolution.

Skills

Threat detection
Incident response
Communication
Analytical skills
Problem-solving

Education

Relevant security certifications

Tools

Microsoft security tools
Fortinet
Sophos
Job description

The Security Engineer is responsible for ensuring robust cybersecurity operations through proactive threat detection, effective incident response, and comprehensive risk management. This role works closely with IT and Security teams to identify vulnerabilities, implement security best practices, and protect organisational and client assets.

The role requires hands‑on experience with leading security technologies and operational platforms, with a strong focus on solutions from Microsoft, Fortinet, and Sophos, while driving continuous improvement in security posture and compliance.

Key Deliverables
  1. Stakeholder Collaboration & Communication
    • Work closely with IT and Security teams to enhance overall security posture.
    • Maintain clear and effective communication using collaboration tools such as Microsoft Teams, CRM platforms, and Service Desk systems.
  2. Continuous Improvement & Compliance
    • Stay current with emerging cybersecurity threats, technologies, and industry best practices.
    • Conduct regular vulnerability audits to ensure compliance with industry standards and regulatory requirements.
    • Research, evaluate, and recommend innovative security solutions to enhance organisational resilience.
  3. Security Operations, Threat Detection & Incident Response
    • Perform real‑time threat monitoring, detection, and response activities.
    • Ensure security operations align with industry best practices and compliance standards.
    • Lead and execute incident response activities from detection through to resolution.
    • Maintain accurate and up‑to‑date documentation for internal security controls and client security operations.
    • Conduct security assessments, including Microsoft 365 tenant evaluations and network security reviews.
    • Manage customer Security Posture Management in line with contractual requirements.
  4. Threat Hunting & Vulnerability Management
    • Proactively identify and mitigate cybersecurity threats before escalation.
    • Analyse network traffic, endpoint behaviour, and security logs to detect advanced threats.
    • Manage vulnerability assessments and ensure timely remediation of identified weaknesses.
    • Utilise leading SOC SaaS platforms such as Microsoft Defender, Fortinet, and Sophos to strengthen security defences.
    • Provide remediation assistance to internal teams and customers where required.
  5. Prevention & Risk Management
    • Design and implement proactive security controls to prevent cyber threats.
    • Manage identity and access management (IAM), email security, data protection, and endpoint security solutions.
    • Conduct IT risk assessments and recommend appropriate mitigation strategies.
    • Ensure secure configurations across operating systems, networks, and applications.
Key Performance Expectations
  • Work from the office a minimum of three days per week.
  • Achieve and track individual billable hours, CRM activities, and project milestones.
  • Ensure all work aligns with defined deliverables, project plans, and service level agreements.
  • Respond promptly to service requests, security incidents, and escalations.
  • Maintain accurate and current security documentation and reporting.
  • Demonstrate ownership and accountability for all assigned tasks and security initiatives.
  • Contribute to high levels of customer satisfaction and retention.
  • Proactively identify, communicate, and escalation security risks.
  • Maintain a strong commitment to continual professional development.
Job Requirements
Experience & Attributes
  • Minimum of 3 years’ experience in Information Technology and at least 1 year in Cybersecurity.
  • Proven experience in progressively responsible technical roles, including leadership exposure.
  • Strong technical, analytical, and problem‑solving skills.
  • Excellent communication and interpersonal skills.
  • Ability to work effectively both independently and as part of a team.
  • Strong understanding of secure design principles and cybersecurity best practices.
  • Ability to perform effectively in high‑pressure or incident‑driven environments.
  • Open‑minded approach to personal growth and continuous learning.
  • Demonstrates a proactive, solution‑driven “can do now” mindset.
Preferred Skills & Certifications
  • Strong expertise in Microsoft security tools, including Azure Sentinel, Microsoft Defender, and Azure Security Center.
  • In‑depth understanding of advanced threat management, including attacker tactics, techniques, and procedures (TTPs).
  • Proven experience managing complex security incidents and remediation processes.
  • Relevant certifications, including but not limited to:
    • CompTIA Security+
    • CompTIA Cybersecurity Analyst (CySA+)
    • Certified SOC Analyst (C|SA)
    • Certified Ethical Hacker (CEH)
    • CompTIA Advanced Security Practitioner (CASP+)
    • Microsoft Security Certifications
  • Familiarity with regulatory and compliance frameworks such as POPIA, PCI‑DSS, GDPR, ISO 27001, CIS, and NIST.
  • Strong written and verbal communication skills, including the ability to report to executives and educate stakeholders on security risks.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.