Job Openings Mid-level Cyber Security Engineer

About the job Mid-level Cyber Security Engineer

EMPLOYMENT TYPE:

Permanent

COMPANY:

A large retail chain based in Cape Town

LOCATION:

Cape Town (Hybrid working model)

JOB OVERVIEW:

The Cyber Security Engineer is responsible for designing, implementing, and managing a
highly secure network solution that protects against potential cyber attacks and hacking
threats by maintaining the cyber security environment on-prem and in the cloud.

  • Applicants need an excellent understanding of technology infrastructures using Firewalls, VPN, IDS/IPS, Web-Proxy, Cloud Security and Security Audits.
  • Applicants must be comfortable working with various technologies, security problems, and network troubleshooting.

DESCRIPTION OF POSITION:

  • Give input on best practice security standards on new systems, network design, and
    respective third-party integrations.
  • Design, implement, manage, monitor, and upgrade security measures for the protection of the organization's data, systems, and networks
  • Create and maintain documentation as it relates to network configurations, security
    architecture and best practice principles.
  • Support and maintain all network security devices across multiple sites (Globally)
  • Daily administration of firewall rules, IPS Policies and Filters via change control procedures.
  • Monitor performance, logs, reports and alerts of potential threats or attempted breaches related to security incidents and remediate accordingly.
  • Collaborate with management and department leaders to assess near and long-term
    network security assessments, vulnerabilities and risks.
  • Troubleshooting all network and security issues and incidents
  • Responding to network and associated systems security breaches
  • Ensuring that the organization's data and infrastructure are protected by enabling the
    appropriate security controls
  • Testing and identifying network and system vulnerabilities
  • Daily administrative tasks, reporting, and communication with the relevant departments in the organization
  • Evaluating the organization's security needs and establishing best practices and standards accordingly
  • Routinely conduct penetration testing
  • Taking appropriate security measures to ensure that the organization's infrastructure and existing data are kept safe
  • Conducting testing and scans to identify any vulnerabilities in the network and system
  • Knowledge of current cybersecurity trends, as well as the continued research of emerging trends and hacking techniques
  • Taking an active role in the change management process
  • Willing to travel and be on standby

KNOWLEDGE AND SKILLS:

  • Strong problem-solving and analytical skills
  • Ability to seek out vulnerabilities in IT infrastructures
  • A deep understanding of how hackers work and the ability to keep up to date with the fast pace of change in the criminal cyber-underworld
  • Ability to use logic and reasoning to identify the strengths and weaknesses of IT systems
  • Excellent communication and presentation skills
  • Ability to take responsibility and be decisive
  • Ability to work within a small team
  • Effective planning and organizational skills
  • Ability to work under pressure
  • Ethical hacking
  • Strong attention to detail and problem-solving skills
  • Solid understanding of the OSI model and renowned ports and services
  • Understanding of cybersecurity methodologies
  • The ability to evaluate system changes for security implications and the knowledge to
    make recommendations for improvements
  • The ability to thrive in a fast-paced environment and to work under pressure

QUALIFICATIONS REQUIRED:

  • Formal Cisco certification ideal CCNA/CCNP (Security)
  • Formal Cloud certifications ideal Azure & Google Cloud Platform

EXPERIENCE REQUIRED:

  • Minimum of 3 years of cybersecurity support experience
  • Must have experience in the areas of vulnerability threat management and intrusion prevention.
  • Experience with SIEM technology. 
  • Understanding of cyber security methodologies 
  • The ability to evaluate system changes for security implications and the knowledge to make recommendations for improvements.  
  • The ability to thrive in a fast-paced environment and to work under pressure
  • Experience in any of the following will be beneficial: 
    • Trend
    • Micro
    • Vision
    • One Splunk 
    • Linux 
    • Tenable
    • Nessus 
    • Google Cloud Platform 
    • MicrosoftAzure

**Please note: If you have not heard from us within 2 weeks, please consider your application unsuccessful.