Job Search and Career Advice Platform

Enable job alerts via email!

Tech Officer : Iam Security Engineer

Bcx

Gauteng

Hybrid

ZAR 300 000 - 450 000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology services provider in Gauteng is seeking a Tech Officer: IAM Security Engineer to manage user access to information systems. The role involves developing role-based access, ensuring compliance, and providing training. Ideal candidates will have a National Diploma and 2 years' experience in IT security support, along with cybersecurity certifications preferred. This position allows for a hybrid work environment and requires local travel and availability 24/7.

Qualifications

  • 2 years of experience in IT security support role emphasizing security access.
  • Understanding of network and desktop technology methods.
  • Strong customer focus and track record of operational performance improvements.

Responsibilities

  • Identify and develop role-based security access for users.
  • Create and disable user accounts with necessary approvals.
  • Ensure timely updates of access rights based on changes.

Skills

Cybersecurity Governance & Framework
Cybersecurity Tools & Solutions
Finance and Budget Management
Risk Management
Project Management

Education

NQF 4: Grade 12 National Diploma
NQF 6: 3 year Degree / Diploma in Computer Science or Information Technology

Tools

Microsoft Office
Job description
Job title : Tech Officer : IAM Security Engineer

Job Location: Gauteng, Centurion — Deadline: December 24.

Core Description

The Identity and Access Management (IAM) Tech Officer provides, removes, modifies, and reviews user access to information systems, ensuring roles and actions are correct based on user function, business need, and policies for least privilege access.

Key Deliverables / Primary Functions
  • Identify and develop role-based security access to match job requirements and adhere to the least privilege principle.
  • Create and disable user accounts, as requested, provided appropriate approvals.
  • Ensure access rights are updated in a timely manner as needs change due to events, including termination, role changes, new systems, and regulatory requirements.
  • Update and close tasks associated with access management requests and meet service level targets.
  • Develop and document user administration and audit practices.
  • Manage PAM functions in terms of compliance. Ensure compliance with related industry regulations and respond to information security audits.
  • Preserve all records that indicate changes made to access control lists to facilitate audits and investigations.
  • Suggest improvements to user access request workflows. Assist with audit preparations and help develop responses and action items for associated findings.
  • Provide user access administration training. Assist and support information security, system administration, and project teams with the integration of programs that intersect with user administration.
Span of Control

None

Level of Engagement

Interact with similar levels, clients and with various stakeholders within BCX

Core Functional Skills & Capabilities
  • Cybersecurity Governance & Framework
  • Cybersecurity Tools & Solutions
  • Finance and Budget Management
  • Risk Management
  • Project Management
Core Behavioural Competencies
  • Culture Match
  • Job Match
  • Applying expertise & Technology
  • Analysing
  • Creating & Innovating
  • Delivering Results & Meeting customer expectations
  • Entrepreneurial & Commercial thinking
Minimum Qualifications
  • NQF 4: Grade 12 National Diploma
Additional Education - Preferred / Advantage
  • NQF 6: 3 year Degree / Diploma / National Diploma in Computer Science or Information Technology
Experience
  • 2 years of experience working in an IT security support role with an emphasis on security / access.
  • Experience supporting an understanding of network and desktop technology methods that provide innovative solutions to customers.
  • Strong customer focus with a successful track record of delivery and operational performance improvements across an organization.
  • Proficient in Microsoft Office programs.
Certifications
  • A security industry certification is preferred including but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+.
  • Cyberarc, BeyondTrust or Sailpoint certified technical specialist
  • Professional Memberships in Relevant Industry
Special Requirements / Employment Condition
  • Required to travel locally
  • Required to be available 24 / 7
  • Ability to cope under pressure
Workplace / Physical Requirements
  • Hybrid Remote Worker
  • Billable
  • Revenue Generating
  • ICT jobs
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.