16.04.2024
IT Security Technician
City Logistics
South Africa, Durban
Job category: Others: IT and Telecommunication Location: Durban Contract: Permanent Remuneration: Market Related EE position: No About our company City Logistics understands supply chains and the importance of adding maximum value, as well as providing cost-effective solutions and the highest service levels.Our extensive network throughout Southern Africa has been developed over 30 years, offering an exclusive supply chain solution, specializing in client and fleet requirements.This typically consists of a dedicated pool of vehicles and staff customized to the client’s operational needs, enabling the client to share the benefits of our procurement, maintenance and risk management capacity.We are passionate about what we do, passionate about Retail and service excellence.Let us be part of your solution. Introduction We currently have an opportunity for an IT Security Technician. This position requires a variety of specialised skills and applied patience. A security technician has a single place to work from, however is required to support multiple, different, and forever changing environments. Communication (both verbally and written) needs to be excellent, empathy, and the ability to manage expectations effectively are sought after characteristics. This function is 'fast paced' and often measured on the ability of an individual to work within a growing team of varied skill sets. A successful security technician will be well *** in the overall Microsoft Security stack, however in transition of technology a sound knowledge of third party Security Protocols and applications. 1.General Security Checks (these checks occur daily and include): Microsoft 365 Defender to monitor the security of Endpoint and remediate if needed McAfee database Daily report analysed. Forticloud to monitor traffic coming through our firewall. Microsoft Intune to check device compliance and clean up stale devices on O365. Rapid 7 to check on vulnerabilities on our serve 2.Patching and server administration Daily the Rapid7 dashboard is checked for any vulnerabilities which are then patched. These include Software updates, registry edits and the configurations of the servers’ settings. Servers are also rebooted after hours throughout the week and every Sunday the LMS servers are rebooted as they servers that are required to be up during the week. 3.N-Able Patch Management. Monthly Auto-patching takes place, where monthly Windows updates are pushed to our servers. This includes manually approving updates for each server. Maintenance of the N-Able server is done on a weekly basis, this involves making sure all our servers are reporting back to the N-Able servers and making sure all client connectors are operational. 4.Identity and Access management Create VPN accounts and domain accounts and issue credentials to the users. Modify or remove User’s Access or rights on our network. Keep accurate register of all external users with access to our network, this register is modified on a daily-weekly basis. Creation of accounts on Osirium PAM solution. Assists users with issues regarding Access to VPN. 5.Documentation Compilation of company security policies and Standard operating procedures. Understanding CIS 18 Controls and reporting on. Applicable tertiary qualification Information systems Excellent telephone manner and written communication Excellent attention to detail Ability to manage End User frustrations effectively, and exercise the patience needed to communicate to End Users who may often be unhappy (without face to face interaction) Ability to follow predefined procedures and escalate timeously to the Security Manager where required. Ability to meet deadlines and complete daily tasks within SLA timeframes Ability to use knowledge base resources to resolve problem. Good attitude towards work and colleagues. Consistent, prompt delivery of often common or repetitive tasks. Punctuality when keeping appointments and awareness of written tone Knowledge of information Security Governance Knowledge of Vulnerability and Risk Management. Information Security and Design Understanding Anti-Virus software, Intrusion Detection Systems By clicking on the above you are agreeing to this site's Terms of Use . Read our full Data Protection Policy here . To ensure safe access to your data, your password needs to meet the below minimum requirements: Minimum of 6 characters long Minimum of 1 numeric character [0 - 9] Minimum of 1 lowercase character [a - z] Minimum of 1 uppercase character [A - Z] Minimum of 1 special character, for example @!?#$%... Will be used for account recovery in the case that you no longer have access to the supplied email address. CV file * We will parse your CV to make creating a profile as easy as possible #J-18808-Ljbffr
Attention! You will be redirected to another site