To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.
Job Responsibilities
Capture timesheets timeously and accurately
Capture claims timeously and accurately
Propose solutions that must be cost effective whilst meeting information security requirements within budget.
Participate in negotiations on fair pricing from vendors for new technologies procured.
Manage and or resolve low, medium and high incidents and engage with Specialists to resolve the high complexity incidents.
Build relationships with stakeholders to facilitate the flow of knowledge, input and discussion on new products and solutions as required by stakeholders.
Facilitate and manage the incident and problem management process when stakeholder environments are affected.
Oversee the implementation of the information security changes and check for the short comings and risks.
Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
Participate in the implementation of new products as provided in the selection criteria.
Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
Document and maintain all relevant processes and procedures mindful of current policies and standards.
Create and maintain information security standards.
Oversee and monitor the information security environment according to set standards.
Review and contribute to project documentation including business requirements, designs and implementation.
Create design documentation according to relevant standards and practices
Implement specific Information security technologies.
Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
Log submit and implement low, medium and high risk changes independently.
Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
Oversee and ensure change was successful in certain cases and when required perform unit testing.
Oversee and ensure back-ups are done, documents are stored and statuses updated.
Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
Ensure job related tasks and processes are in place.
Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
Transfer of knowledge to team members.
Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
Job Responsibilities Continue
Initial focus will be to Implementing identity and access management (IAM), encryption, and network security in both Azure and AWS.
This role will Support and maintain both Azure and AWS across Infrastructure as code, containers and applications pipelines.
Very Strong networking Skills
Experience with multiple Security Technologies.
Building relationships with I&O Teams
Degree or certification in computer science or similar field
Also would require following Microsoft and AWS certification:
SC-200: Microsoft Security Operations Analyst
SC-300: Microsoft Identity and Access Administrator
SC-400: Microsoft Information Protection Administrator
Microsoft Certified: Azure Security Engineer Associate
Microsoft Certified: Azure Solutions Architect Expert
Microsoft Cybersecurity Architect
AWS Certified Solutions Architect - Associate
AWS Certified SysOps Administrator - Associate
AWS Certified Solutions Architect - Professional
AWS Certified DevOps Engineer - Professional
Strong certification/ knowledge on Linux Operating System
Strong Knowledge on Linux Networks
Strong knowledge in Linux virtualization Knowledge of the following Scripting Languages
YAML and JSON SABSA - Sherwood Applied Business Security Architecture would be preferable
Good knowledge to ensure compliance with standards like ISO 27001, GDPR, NIST and CSA guidelines.
Minimum Experience Level
At least 8 years in an IT environment of which at least 5 years in information Security
Cloud Platform Knowledge - AWS and Azure
Networking knowledge - Wan, Lan and routing
Low-level design documentation skills
Knowledge of the following frameworks: CSA, NIST and ISO.
Experienced in delivering high quality design for cloud environments including Kubernetes and cloud PaaS services
Experienced in working with large cross functional teams.
Experienced in working in high pressure demanding environments.
Technical / Professional Knowledge
Administrative procedures and systems
Data analysis
Governance, Risk and Controls
Principles of project management
Relevant regulatory knowledge
Relevant software and systems knowledge
Cluster Specific Operational Knowledge
System Development Life cycle(SDLC)
TCP/IP
Information Security terms and definitions
Relevant Operating System
Information Security policies and procedures
Vendor Management Principles
Behavioural Competencies
Applied Learning
Communication
Collaborating
Customer Focus
Initiating Action
Managing Work
Technical/Professional Knowledge and Skills
- Please contact the Nedbank Recruiting Team at +27 860 555 566
Beware of fraud agents! do not pay money to get a job
MNCJobs.co.za will not be responsible for any payment made to a third-party. All Terms of Use are applicable.