Cyber Security Engineer needed at Telesure Investment Holdings

Save

Job title : Cyber Security Engineer

Job Location : Gauteng, Johannesburg

Deadline : May 07, 2025

Quick Recommended Links

Job Purpose

  • Resolve day to day operationsal security tasks and incidents. Act as Escalation point for specialists as a Level 1. Incident Response Specialist /SOC /L2 Breach and response lead member. Ensure centralised and dedicated cyber security technologies and operations functions operate at the right level of maturity, are effective and optimised. Ensure operations functions adequately support CIT’s information & cyber security outcomes. Ensure operations functions produce relevant measurements and metrics to support CIT’s cyber & information security decisions. Ensure operations functions continue to mature and adequately adapt to the changing threat landscape.

Responsibilities

Information Security

  • Define business impact of security incidents and identify and drive recommendations for change to prevent similar incidents. Ensure, through appropriate planning, execution, oversight of implementation and management of centralised and dedicated operations, CIT is able to appropriately identify, protect, detect, respond and recover to information & cyber security threats. Where possible, play the role of a lead-in to further enhancing and optimising said lifecycle. Ensure effective Threat Hunting and Threat Intelligence is performed. Conduct penetration testing/offensive security procedures as required.

Operations Management

  • Supervise others working within established operational systems. Participate and take ownership during information & cyber security incident response activities, and specifically as it pertains to cyber security operations. Act as Incident Response Specialist /SOC /L2 Breach and Response as lead member. Escalation point for specialists as a Level 2. Oversee and perform Identity and Access Management and Privileged access Management tasks.

Risk Management & Analysis

  • Develop and/or deliver a contingency plan for significant aspects of the risk management and/or control process. Maintain visibility of emerging information & cyber security threats and trends, and adjust operations activities to best defend against such threats.

Operational Compliance

  • Monitor and review performance and behaviours within area of responsibility to identify and resolve non-compliance with the organisation’s policies and relevant regulatory codes and codes of conduct. Take ownership of and optimise operation of dedicated and centralised cyber security technologies. This includes establishing relevant, operating procedures and other mechanisms to ensure consistent execution and quality outcomes.

Insights and Reporting

  • Contribute to the design and creation of reporting strategies and templates. Lead execution of complex reports, identifying and interpreting complex patterns and trends, and translating those insights into actionable recommendations. Provide input on cyber security operations metrics and indicators. Report on key cyber security operations metrics and indicators to management and colleagues.

Stakeholder Engagement

  • Develop stakeholder engagement through identifying stakeholders, finding out their needs/issues/concerns and reacting to these to support the communication of business information and decisions. Build and maintain relationships with teams and areas within CIT towards ensuring collaboration and overall successful functioning of cyber security operations across the organisation. Collaborate with the Enterprise Architecture function around strategic cyber security technology selection and investment, or technologies with an impact on cyber security.

Operational Procedure Development

  • Draft policies, procedures, and related guidelines within an area of expertise to meet defined key principles and ensure compliance with external requirements. Take ownership of and drive maturity of operational technologies, associated workflows and procedures across a variety of areas such as Internet and dark web cyber threat exposure, network and communications security, endpoint security, identity & access management, application security for proactive and reactive technology protections, vulnerability management and incident response and forensics.

Personal Capability Building

  • Act as subject matter expert in an area of technology, policy, regulation, or operational management for the team. Maintain external accreditations and indepth understanding of current and emerging external regulation and industry best practices through continuing professional development, attending conferences, and reading specialist media. Maintain and renew understanding of the information security operations landscape, both current and as it continues to evolve.

Building Capability

  • Implement the formal development framework for a team, with guidance from senior colleagues. Provide informal coaching to others throughout the organisation in area of expertise.

Continuous Improvement

  • Review existing operations in a major area of work and implement innovation processes to generate new ideas and ensure the required continuous improvement outcomes are delivered. Implement improvements and continuously mature cyber security operations activities.

Education

  • Grade 12/ SAQA Accredited Equivalent (Essential) Relevant industry certifications, such as Security+ ,CEH, MSCE, MCSA or equivalent (Essential) University degree in an information technology or related domain (Advantageous) Relevant Industry certification; OSCP or alternative in offensive or defensive security certifications(Advantageous) Relevant system / IT engineering certifications in on prem or cloud environments (Advantageous)

Experience

  • 3-5 years’ experience in information / cyber security (Essential); Strong experience and understanding Cyber Security frameworks and applying it (Essential); Experience in Security Operations (Essential); Exposure and/or experience in Security Architecture (Advantageous); Experience in Threat Hunting and Threat Intelligence (Advantageous)

How to Apply for this Offer

Interested and Qualified candidates should Click here to Apply Now

  • ICT jobs

Disclaimer: MRjobs.co.za is not an employer and does not directly offer jobs. We share available opportunities from verified sources to help job seekers. Please do your due diligence before applying. We are not responsible for any transactions, interviews, or outcomes from third-party employers.