Ethical Hacker and Security Lead

 

Recruiter:

Deka Minas Pty Ltd

Job Ref:

1512719872

Date posted:

Wednesday, November 24, 2021

Location:

Johannesburg, South Africa


SUMMARY:
-

POSITION INFO:

This position involves understanding and taking steps to mitigate the risks associated with collecting,
storing, and transmitting data in a business setting. You will be expected to set up security measures
that help prevent security breaches, as well as analysing any breeches that do occur.

RESPONSIBILITIES
• Research the latest information technology security trends.
• Monitor their organization’s networks for security breaches and investigate violations when
they occur.
• Help to design, implement, and maintain the organization’s cyber-security plan.
• Develop and direct implementation of security standards and best practices for the
organization.
• Direct the installation and use of security tools (e.g., firewalls, data encryption), to protect
sensitive information.
• Recommend security enhancements to IT Management.
• Help computer technicians, end users when they need to install or learn about new security
products and/or procedures.
• Ensure that IT security audits are conducted periodically or as needed (e.g., when a security
breach occurs).
• Analyse existing security systems and make recommendations for changes or improvements
• Prepare reports and action plans if a security breech does occur
• Organize and conduct tests and “ethical hacks” of the existing security architecture
• Monitor the network and provide early warning of abnormalities or problems
• Upgrade systems regularly to remain competitive in the field of security
• Communicate the system status and keep users informed of downtime or changes to the
system
• Keep technical knowledge current through continuing education
• Provide system updates and write code fixes

REQUIRED SKILLS / EXPERIENCE & QUALIFICATIONS

• Bachelor’s degree in Computer Science, Information Systems, or equivalent education or
work experience and CEH
• 4+ years relevant experience
• Familiarity with the DOD information assurance vulnerability management program
• Proficiency with any of the following: anti-virus, HIPS, ID/PS, Host-based Forensics,
Network Forensics and RSA security
• In-depth knowledge of architecture, engineering, and operations of at least one
enterprise SIEM platform) e.g Nitro/ McAfee Enterprise Security Manager, ArcSight,
QRadar, LogLogic, Splunk)
• Experience in developing and deploying signatures (e.g., YARA, HIPS etc.)
• Understanding of mobile technology, and UNIX and basic Unix commands
• Exceptional understanding of security vulnerabilities, attacker exploit techniques and
methods for remediation of such.
• Experience in protecting large-scale applications using Web Application Firewalls
(WAFs), network firewalls and Intrusion Prevention System (IPS).
• Experience in designing, building, or testing web and API-based architectures.
• Experience communicating technical concepts to non-technical audience.
• Exceptional presentation and written English communication skills, high degree of
comfort with technical and executive audiences.
• Experience scripting in common languages.
• 4+ years of experience in application and network security engineering.
• Experience with threat hunting.
• Experience working on public Cloud platforms.
• Good understanding of HTTP and TCP/IP
• A solid background in Internet and Security technologies such as SWG, Sandboxing,
Firewalls, DLP and VPNs.
• Network transformation technologies such as MPLS, SD-WAN or WAN Optimization.
• The ability to read packet captures.
• Ability to interpret security reports to provide actionable improvements for our clients.
• A detailed working knowledge of web-based security and network infrastructure,
Security Proxies, such as NGFW, SSL/IPSec VPNs and Firewalls.
• Good understanding of ITIL/ Service Management / Release Pipeline
• Troubleshooting knowledge, design, and implementation experience
• A vendor certification such as CISSP, CCIE, CCNP, JNCIE, MCSE
• Experience in security audits both internal and external endpoints.

 

Please note that by submitting your personal information to Deka Minas you free-willingly issue the business consent to make use of such data for the specific purpose of securing you either permanent or temporary employment. Our business makes use of a POPIA compliant database and you have the right to access, right to correction and right to deletion of your personal information.



 

NB! This job is now closed. You can apply for other jobs by uploading your CV.



 

 

 

Similar jobs you might be interested in:

Cyber Security Specialist - Networks
Location: Midrand
Salary:
Interfaces across multiple channels throughout the enterprise seeking business, technical and infrastructure issues and identifying potential areas of risk. Analysing network logs for suspicious activity. Configuring firewalls and intrusion detection systems. Conducting Penetration Testing (i.e., simulating attacks to identify vulnerabilities) and collaborating with colleagues on incident response...
19 days ago


Create a free job alert for Ethical Hacker and Security Lead in Johannesburg

Enter your email address below and we will email you similar jobs when they become available:

You can cancel at any time. We will not spam you.
By giving us your email address your agree to our Terms and Conditions