BankservAfrica IT / Telecom Jobs in Johannesburg
1. Patiently scroll down and read the job description below.
2. Scroll down and find how to apply or mode of application for this job after the job description.
3. Carefully follow the instructions on how to apply.
4. Always apply for a job by attaching CV with a Cover Letter / Application Letter.
We are looking to appoint a Information Security Specialist in our IT Security business reporting into the Manager IT Security Operations. You will be responsible for supporting the Cyber Defence Centre in its daily operations. This includes ensuring the defence and alerting capabilities are performing adequately, events raised by the SOC are analysed and remediation steps are taken were needed.
Furthermore, the specialist will need to enable both proactive and reactive measures, these will include threat intelligence and threat hunting capabilities.
You will engage with the following stakeholders:
- Business Unit Owners
- Chief Technology Officer
- IT Risk Manager
- Enterprise Risk Manager
- IT Infrastructure team members
- Network team members
- Manager – End User Technology
- Internal Audit
- Systems Development team members
Key role responsibilities include:
Event Orchestration Management
- The collection, secure centralised storage and correlation of log, alert and event data from security systems, designated business critical systems (OS, Database and Application) and critical infrastructure components
- This includes the logging and tracking of security related issues and incidents to ensure successful resolution of potential incidents, problems, vulnerabilities, deviations and exposures
ADVERTISEMENT - CONTINUE READING BELOW
Cyber Intelligence & Threat Hunting (Detection)
- The collection, maintenance, reporting and response again Cyber/IT security threat intelligence
- The candidate will need to show an understanding of threat intelligence and threats as it pertains to organizations and the active and reactive measures that come in light of this information. This includes active threat hunting pre, during and post incidents
Incident Response, Recovery
- Security Incident Response and Recovery also considered, Incident Management is the organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident)
- The goal is to handle the situation in a way that limits damage and reduces recovery time and costs
Investigations Representative
- Investigation representation includes the support for further investigations, audit, and forensic support
- This also includes acting as a liaison between the other Cyber functions such as Assurance and Prevent and including other internal stakeholders such as GRC, Networks, IT and Audit
QUALIFICATIONS / KNOWLEDGE
- Tertiary qualification or equivalent experience in computer science and / or information systems or related technology infrastructure field
- Security Industry relevant certifications, e.g. CISSP, CISM, CISA, CompTIA – Security+, CEH (Certified Ethical Hacker)
- Understanding and application of the legislative and regulatory framework
- Experience in assessing, summarizing, and managing risk processes and methodologies in IT related environments (Risk related qualifications essential)
- Working knowledge of change management processes and frameworks
- Trend/root cause analyst from a vulnerability management perspective
- Proficient with Microsoft Programs
- Excellent written and verbal communication skills
EXPERIENCE
- At least 5 years in a large internal IT division or in a corporate IT company
- Minimum 5 years’ experience in IT Infrastructure or related field
- A sound background in technical/operational security is preferred
- Good commercial / business experience
- Excellent working knowledge of firewalling, intrusion prevention systems, proxies, gateways, network routing, switching
- Strong knowledge of TCP/IP, Internet facing services, Windows, Linux
- Working knowledge of Virtualisation (VMWare)
- Competent understanding of Penetration testing methodologies and techniques;
- Strong analytical skills
- Working knowledge of Security Event and Incident analysis
- Knowledge of various Unix scripting languages
- A good understanding of databases, database security technologies and measures
- Excellent knowledge of Directory Services, e.g. Microsoft Active Directory
- Proficiency in security architectures, design and protocols
- A good understanding of cryptography
ADVERTISEMENT - CONTINUE READING BELOW