الصفحة الرئيسية جنوب أفريقيا Information Security Consultant: Operations

الصفحة الرئيسية جنوب أفريقيا Information Security Consultant: Operations

Information Security Consultant: Operations

دوام كامل في a Laimoon Verified Company في South Africa
نُشرت يوم April 18, 2024

تفاصيل الوظيفة

These jobs were popular with other job seekers Recru-IT Information Security Consultant: Operations CPT - Northern Suburbs Permanent Full Time Published: 6 days ago Non EE/AA Reference: PE010737-LM-1Role:The role of the Cyber Security Consultant: Operations will form part of our client's team which focusses on Cyber Security Operations services to businesses on our client's Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes. What will make you successful in this role?On a day-to-day basis the Consultant will be involved with the configuration, monitoring, and management of:Anti-Virus InfrastructureData Leakage Prevention system, rules, and reportsPrivileged Account Management processNetwork Access Control process and exception handling.Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance.Security hardening baseline compliance scanning, reporting and remediation.On an ad hoc bases the consultant will support businesses in:Issuing, renewing, and revoking PKI digital certificates.Assessing internet and email use on request of Forensics or HR departments.The consultant will also be performing scheduled tasks like review Firewall rule configuration and report.The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.The consultant will contribute to Knowledge and Skills of the team, by sharing lesson learned and knowledge gained through research, conferences, training courses or through interaction with experts. Qualifications:MatricInformation Technology diploma or degreeInformation Security certification (preferable) Experience:At least 3 - 5 years in hands on technical experience which includes:Network experience (TCP/IP, Firewalls, IPS, NAC)Operating System management and Hardening (Windows, Linux, CIS hardening baselines)Anti-Virus System management and ConfigurationData Leakage Prevention tool configurationLogical Access Management (AD, PAM)Information Security Operations (Security+, CISSP will be beneficial)Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores) Knowledge and Skills:Security Auditing.Risk management.Incident Investigation.Reporting and Administration.Security tools monitoring. Personal Attributes:Interpersonal savvy - Contributing independently.Decision quality - Contributing independently.Plans and aligns - Contributing independently.Optimises work processes - Contributing independently. Core Competencies:Cultivates innovation - Contributing independently.Customer focus - Contributing independently.Drives results - Contributing independently.Collaborates - Contributing independently.Being resilient - Contributing independently. Duties & Responsibilities Role:The role of the Cyber Security Consultant: Operations will form part of our client's team which focusses on Cyber Security Operations services to businesses on our client's Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes. What will make you successful in this role?On a day-to-day basis the Consultant will be involved with the configuration, monitoring, and management of:Anti-Virus InfrastructureData Leakage Prevention system, rules, and reportsPrivileged Account Management processNetwork Access Control process and exception handling.Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance.Security hardening baseline compliance scanning, reporting and remediation.On an ad hoc bases the consultant will support businesses in:Issuing, renewing, and revoking PKI digital certificates.Assessing internet and email use on request of Forensics or HR departments.The consultant will also be performing scheduled tasks like review Firewall rule configuration and report.The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.The consultant will contribute to Knowledge and Skills of the team, by sharing lesson learned and knowledge gained through research, conferences, training courses or through interaction with experts. Qualifications:MatricInformation Technology diploma or degreeInformation Security certification (preferable) Experience:At least 3 - 5 years in hands on technical experience which includes:Network experience (TCP/IP, Firewalls, IPS, NAC)Operating System management and Hardening (Windows, Linux, CIS hardening baselines)Anti-Virus System management and ConfigurationData Leakage Prevention tool configurationLogical Access Management (AD, PAM)Information Security Operations (Security+, CISSP will be beneficial)Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores) Knowledge and Skills:Security Auditing.Risk management.Incident Investigation.Reporting and Administration.Security tools monitoring. Personal Attributes:Interpersonal savvy - Contributing independently.Decision quality - Contributing independently.Plans and aligns - Contributing independently.Optimises work processes - Contributing independently. Core Competencies:Cultivates innovation - Contributing independently.Customer focus - Contributing independently.Drives results - Contributing independently.Collaborates - Contributing independently.Being resilient - Contributing independently. Package & Remuneration market related - Monthly These jobs were popular with other job seekers

#J-18808-Ljbffr Management & Strategy

Apply safely

To stay safe in your job search, information on common scams and to get free expert advice, we recommend that you visit SAFERjobs, a non-profit, joint industry and law enforcement organization working to combat job scams.

Share this job
تحسين فرصتك لحصول على وظيفة خذ دورة عبر الإنترنت على الشبكات والأمان ابتداءً من الآن. تطلب ترويج10 دولار للدورات عبر الإنترنت. انظر جميع الدورات
See All Information Jobs
تعليقات وملاحظات تعليقات وملاحظات