Jobs in

Security Engineer Centurion - Centurion

Alinta Tech Solutions

Alinta Tech Solutions (also known as Alinta Tech) is a Managed IT Support Services and Technology Solutions Provider. Our services include comprehensive IT support functions, Recruitment / Outsourced IT staffing and technology solutions designed to support the success and growth of small and medium-sized businesses. Alinta Tech is owned by Alintacorp 64 PTY Ltd , which has been offering corporate training to the South African government and the private sector since its inception in August of 2011. Our Company The company's offices are located in Sandton, Johannesburg, with facilities including office space, a conference room and a phone centre. Alinta Tech has a limited number of private investors. The company has begun offering services as of the 1st March 2022 Our staff complement at Alinta Tech is proudly racially and culturally diverse. We embrace the policies and principles of Black Economic Empowerment (BEE) and are a 100% black-owned business. We have aligned our business structure and equity accordingly. The Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organization's data and infrastructure. This hands-on position entails executing security strategies, as well as installing and configuring vital security apparatus, such as firewalls and intrusion detection systems. The Security Engineer is responsible for applying and maintaining security measures to protect critical data and infrastructure. Installing, configuring, and managing security systems and software. Identifying and remediating detected vulnerabilities on time. Responding swiftly to security breaches or incidents. Ensuring the continuous secure operation of the IT environment. Staying abreast of the latest developments in security technologies, threats, and countermeasures. The Security Engineer is essential in maintaining the integrity and security of the organization's digital resources, ensuring they are shielded from potential cyber threats through diligent maintenance and proactive monitoring. Area of Responsibility: Security Implementation Responsibilities : Implement security controls based on guidelines and designs provided by the security architect. Key Performance Indicators : Number of security controls implemented within the specified timeline. Percentage of implemented controls functioning as expected. Area of Responsibility: Security Configuration Responsibilities : Configure and manage security solutions, including firewalls, intrusion detection systems, anti-virus software, and data encryption. Key Performance Indicators : Number of security configurations completed within scope, time, and budget. Percentage of configured solutions functioning without critical issues. Area of Responsibility: Vulnerability Remediation Responsibilities : Apply patches and modifications to fix identified vulnerabilities. Key Performance Indicators : Meantime to remediate vulnerabilities. Number of exceptions. Average age of open vulnerabilities. Area of Responsibility: Security Monitoring and Incident Response Responsibilities : Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and escalate as necessary. Key Performance Indicators : Number of security incidents detected and responded to within an acceptable timeframe. Meantime to identify and escalate critical incidents. Area of Responsibility: Compliance Checks Responsibilities : Resolve identified compliance issues from regular checks to ensure the systems comply with the organization's security policies and standards. Key Performance Indicators : Compliance rate with security standards and policies. Number of non-compliance issues identified and resolved. Area of Responsibility: End-user Security Responsibilities : Implement end-user security practices, like password management and access controls. Key Performance Indicators : Percentage of end-users adopting implemented security practices. Number of end-user-related security incidents. Area of Responsibility: Vendor Management Support Responsibilities : Coordinate with vendors to ensure the correct implementation and functioning of security systems. Key Performance Indicators : Vendor SLA compliance rate. Number of successful interactions and resolutions with vendors. Area of Responsibility: Updating and Upgrading Security Systems Responsibilities : Regularly update and upgrade security systems in line with technological advancements and evolving threats. Key Performance Indicators : Number of successful updates and upgrades completed within the specified timeline. Reduction in security incidents due to outdated systems. Area of Responsibility: Training and Mentorship Responsibilities : Train team members on security operations, troubleshooting, and best practices. Key Performance Indicators : Number of training sessions conducted. Team member satisfaction rate with training. Area of Responsibility: Staying Abreast of Emerging Technologies Responsibilities : Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the company's security measures are updated. Key Performance Indicators : Number of relevant technology updates incorporated into the environment. Number of industry events attended or certifications obtained. Area of Responsibility: Team Collaboration Responsibilities : Participate in cross-functional projects, enhance system integration, and collaboration. Key Performance Indicators : Participate in at least one major cross-functional project per year. Area of Responsibility: Miscellaneous and General Responsibilities : Complete any assigned work-related duties and responsibilities. Key Performance Indicators : Completion rate of assigned duties and responsibilities. Overall satisfaction rate in the performance of miscellaneous duties 1. Knowledge Requirements Cybersecurity Principles: Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures. Security Systems: Expertise in managing, configuring, and troubleshooting security systems, such as firewalls, intrusion detection systems, antivirus software, authentication mechanisms, and log management tools. Vulnerability Remediation: Proficiency in using assessment tools and techniques for vulnerability identification and remediation. Security Incident Response: Familiarity with the protocols and procedures for responding to, documenting, and resolving security incidents. Network and System Security: Good understanding of network and system security principles, including knowledge of encryption technologies, IPsec, VPNs, and network protocols. Cloud Security: Knowledge of security controls for leading cloud platforms like AWS, Azure, and Google Cloud. Compliance Standards: Understanding of IT compliance and security standards such as ISO 27001, NIST, PCI DSS, and GDPR. Emerging Security Technologies: Awareness of the latest cybersecurity technologies and trends. IT Service Management Frameworks: Knowledge of frameworks and processes such as ITIL. 2. Qualifications Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Industry Certifications: CISSP, CEH, or CISM certifications are preferred. Cloud Security Certifications: Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous. Other Certifications: Certifications like ITIL, CRISC, or CISA are beneficial. 3. Experience Security Implementation: Hands-on experience with security measures such as firewalls, intrusion detection systems, antivirus software, and data encryption. Vulnerability Assessment and Remediation: Experience in vulnerability detection and the implementation of remediation strategies. Security Protocols and Technologies: Deep experience with security protocols, encryption technologies, and network protocols. Incident Response: Experience in managing security incidents and performing threat hunting. Vendor Management: Experience managing vendor relations. Network Security: Skills in implementing network security measures. Cloud Security: Experience with security in cloud environments like AWS, Azure, or Google Cloud. Compliance: Experience with compliance management according to relevant standards and regulations. 4. Technical Skills Security Tools: Proficiency in using security tools including firewalls, intrusion detection systems, and antivirus software. Vulnerability Assessment Tools: Experience with tools like Nessus, OpenVAS, and Qualys. Network Security: Skills in managing network security protocols and systems. Programming and Scripting: Proficiency in scripting languages like Python or Bash. Cloud Security Tools: Knowledge of tools specific to cloud security. Encryption Technologies: Understanding of encryption and secure communication technologies. Incident Response Tools: Ability to utilize tools for quick response to security breaches. IT Service Management Frameworks: Familiarity with frameworks like ITIL. 5. Personal Attributes/Behavioral Competencies Problem-solving: Strong ability to troubleshoot and resolve complex network issues. Detail-oriented: Meticulous in planning, execution, and documentation. Communication Skills: Excellent communication skills, with the ability to explain complex technical issues in simple terms. Teamwork and Collaboration: Strong team player with effective collaboration skills. Continuous Learning: Commitment to continuous skill improvement and staying current with industry trends. Customer Focus: Dedicated to meeting customer needs and maintaining high satisfaction levels. Adaptability: Openness to adopting new technologies and methods. Stress Management: Capable of handling pressure and urgent situations effectively. Time Management: Efficient in prioritizing tasks and managing time. Ethics and Integrity: High ethical standards and integrity in professional conduct. Salary is market related. Apply Now
Share this job with someone you think should apply!
Facebook buttonFacebook   Whatsapp buttonWhatsapp

Related Jobs

Cyber Security Specialist - Networks - Midrand

...

SIEM Information Security Analyst /Senior Information Security Administrator - Pretoria

...

Information Security Specialist Centurion - Centurion

Advanced Projects & People

...

Sales Engineer - Centurion

...

Security Engineer Centurion - Centurion

Engineered Workforce Ltd

...

Want to do another search?

Jobs in