IT Security Specialist (Network) Mr Price Group
Durban, Kwazulu Natal, South Africa
Mr Price Group
The Investment Case Profitability Return on Equity Return on Assets Return on EquityEmpower our company's security infrastructure and safeguard our valuable assets as a Security Specialist.
Your expertise will be crucial in maintaining the day-to-day operations of our security solutions and swiftly identifying, investigating, and resolving security breaches. Share your knowledge in shaping policies, standards, baselines, guidelines, and procedures, ensuring compliance with cloud service providers. Become an integral part of our team, actively upholding the company's security goals and safeguarding our future.
- Work with architects, system engineers and other IT support teams to define, guide, advise on security standards across the IT landscape, monitoring network activity to identify vulnerable points
- Design and configure security hardware and software
- Use the toolsets available to identify and detect intrusions on corporate network and endpoints; detect any unauthorized attempts to access the systems
- Solutionise by providing options for the IT network for enhancement to the security roadmap
- Train other employees on security best practices, mentoring to junior team members
- Monitor software and hardware for any possible cyber attacks
- Perform security assessments and conduct internal scanning on the network
- Analyze existing systems and make recommendations for changes or improvements
- Prepare reports, action plans and updating of the risk register
- Organize and conduct tests and “ethical hacks” of the existing company IT architecture
- Keep technical knowledge current through continuation of education
- Provide automation solutions as far as possible
- Serve as a security specialist and conduct training when required
- Draft policies, standard operating procedures and guidelines
- Prepare reports, action plans and updating of the risk register
- Be an active change advisory member by reviewing production changes
- Research and Design, benchmark, baseline exercises, trend analysis
- Align with enterprise’s security goals as established by its stated policies, procedures, and guidelines, and to actively work towards upholding those goals.
Experience
- 3 years’ experience in a Security role
- 5+ years in an Infrastructure Back-end support environment and Implementation and deployment of enterprise solutions
- Solid technical experience in Networking (LAN and WAN management, FW/Routers/Switches/Wifi/DHCP/DNS/DMZ/Edge/Segmentation etc).
- Essential understanding of the response required in a Security Operations Centre.
- Strong knowledge of design, test solutions, authentication methods, Windows, Apple & Linux operating systems, protocols, Data leakage, Mobile device management, endpoint, application, cloud solutions, identity and access management, penetration testing, web security, strong networking or Microsoft back-end experience.
- Scripting and knowledge of the NIST and SANS framework would be advantageous.
- Experience in Governance (POPI/Data Protection/PCI/Policy and Procedure) is required. Knowledge of current security risks and protocols, creation of policy, procedure and standards documentation.
- Management of a Security information and event management environment
- Design, test, implementation and support of vulnerability management solutions, authentication methods, email and collaboration tools
- Windows, Apple & Linux operating systems, protocols, Mobile device management, Intrusion Detection and Prevention software, network, perimeter, endpoint, application, cloud solutions, identity and access management, penetration testing
- Scripting and knowledge of the NIST and SANS framework would be a great advantage
- Knowledge of current security risks and protocols, creation of policy, procedure and standards documentation.
- Cloud security and controls
Education & Certifications
Relevant IT degree and certifications in 1 or more of the following:
- CompTIA Security+ CISSP
- GIAC
- Microsoft Certified Systems Engineer
- Microsoft Certified Azure Administrator
- AWS Engineer
- GSuite Engineer
- Associate of ISC
- Certified Cisco or Meraki Engineer
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation AWS Azure CISSP Cloud Compliance CompTIA DNS GIAC Governance IAM Intrusion detection Linux Monitoring NIST Pentesting SANS Scripting Security assessment Vulnerability management Windows
Perks/benefits: Equity
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Manager Pentest H/F jobs
- Open Chief Information Security Officer jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Security Specialist jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Penetration Tester jobs
- Open IT Security Engineer jobs
- Open Security Researcher jobs
- Open Security Operations Analyst jobs
- Open Sr. Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open DevOps-related jobs
- Open EDR-related jobs
- Open IPS-related jobs