01.05.2024
IT Security Specialist (Network) Mr Price Group
Mr Price Group
South Africa, Durban
IT Security Specialist (Network) Mr Price Group Mr Price Group The Investment CaseProfitabilityReturn on EquityReturn on AssetsReturn on Equity View company page Empower our company's security infrastructure and safeguard our valuable assets as a Security Specialist.Your expertise will be crucial in maintaining the day-to-day operations of our security solutions and swiftly identifying, investigating, and resolving security breaches. Share your knowledge in shaping policies, standards, baselines, guidelines, and procedures, ensuring compliance with cloud service providers. Become an integral part of our team, actively upholding the company's security goals and safeguarding our future.Work with architects, system engineersand other IT support teams to define, guide, advise on security standards across the IT landscape, monitoring network activity to identify vulnerable pointsDesign and configure security hardware and softwareUse the toolsets available to identify and detect intrusions on corporate network and endpoints; detect any unauthorized attempts to access the systemsSolutionise by providing options for the IT network for enhancement to the security roadmapTrain other employees on security best practices, mentoring to junior team membersMonitor software and hardware for any possible cyber attacksPerform security assessments and conduct internal scanning on the networkAnalyze existing systems and make recommendations for changes or improvementsPrepare reports, action plans and updating of the risk registerOrganize and conduct tests and “ethical hacks” of the existing company IT architectureKeep technical knowledge current through continuation of educationProvide automation solutions as far as possibleServe as a security specialist and conduct training when requiredDraft policies, standard operating procedures and guidelinesPrepare reports, action plans and updating of the risk registerBe an active change advisory member by reviewing production changesResearch and Design, benchmark, baseline exercises, trend analysisAlign with enterprise’s security goals as established by its stated policies, procedures, and guidelines, and to actively work towards upholding those goals.Experience3 years’ experience in a Security role5+ years in an Infrastructure Back-end support environment and Implementation and deployment of enterprise solutionsSolid technical experience in Networking (LAN and WAN management,FW/Routers/Switches/Wifi/DHCP/DNS/DMZ/Edge/Segmentation etc).Essential understanding of the response required in a Security Operations Centre.Strong knowledge of design, test solutions, authentication methods, Windows, Apple & Linux operating systems, protocols, Data leakage, Mobile device management, endpoint, application, cloud solutions, identity and access management, penetration testing, web security, strong networking or Microsoft back-end experience.Scripting and knowledge of the NIST and SANS framework would be advantageous.Experience in Governance (POPI/Data Protection/PCI/Policy and Procedure) is required. Knowledge of current security risks and protocols, creation of policy, procedure and standards documentation.Management of a Security information and event management environmentDesign, test, implementation and support of vulnerability management solutions, authentication methods, email and collaboration toolsWindows, Apple & Linux operating systems, protocols, Mobile device management, Intrusion Detection and Prevention software, network, perimeter, endpoint, application, cloud solutions, identity and access management, penetration testingScripting and knowledge of the NIST and SANS framework would be a great advantageKnowledge of current security risks and protocols, creation of policy, procedure and standards documentation.Cloud security and controlsEducation & CertificationsRelevant IT degree and certifications in 1 or more of the following:Explore more InfoSec / Cybersecurity career opportunitiesFind even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.#J-18808-Ljbffr
Attention! You will be redirected to another site