Security Engineer: Enterprise and Cloud Infrastracture

Alinta Tech Solutions

  • Centurion, Gauteng
  • Contract
  • Full-time
  • 15 days ago
  • Apply easily
The Security Engineer is tasked with the vital responsibility of implementing and maintaining robust security protocols to safeguard the organizations data and infrastructure. This hands-on position entails executing security strategies, as well as installing and configuring vital security apparatus, such as firewalls and intrusion detection systems. The Security Engineer is responsible for applying and maintaining security measures to protect critical data and infrastructure. Installing, configuring, and managing security systems and software. Identifying and remediating detected vulnerabilities on time. Responding swiftly to security breaches or incidents. Ensuring the continuous secure operation of the IT environment. Staying abreast of the latest developments in security technologies, threats, and countermeasures. The Security Engineer is essential in maintaining the integrity and security of the organization’s digital resources, ensuring they are shielded from potential cyber threats through diligent maintenance and proactive monitoring.Area of Responsibility: Security Implementation
  • Responsibilities: Implement security controls based on guidelines and designs provided by the security architect.
  • Key Performance Indicators:
  • Number of security controls implemented within the specified timeline.
  • Percentage of implemented controls functioning as expected.
Area of Responsibility: Security Configuration
  • Responsibilities: Configure and manage security solutions, including firewalls, intrusion detection systems, anti-virus software, and data encryption.
  • Key Performance Indicators:
  • Number of security configurations completed within scope, time, and budget.
  • Percentage of configured solutions functioning without critical issues.
Area of Responsibility: Vulnerability Remediation
  • Responsibilities: Apply patches and modifications to fix identified vulnerabilities.
  • Key Performance Indicators:
  • Meantime to remediate vulnerabilities.
  • Number of exceptions.
  • Average age of open vulnerabilities.
Area of Responsibility: Security Monitoring and Incident Response
  • Responsibilities: Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and escalate as necessary.
  • Key Performance Indicators:
  • Number of security incidents detected and responded to within an acceptable timeframe.
  • Meantime to identify and escalate critical incidents.
Area of Responsibility: Compliance Checks
  • Responsibilities: Resolve identified compliance issues from regular checks to ensure the systems comply with the organizations security policies and standards.
  • Key Performance Indicators:
  • Compliance rate with security standards and policies.
  • Number of non-compliance issues identified and resolved.
Area of Responsibility: End-user Security
  • Responsibilities: Implement end-user security practices, like password management and access controls.
  • Key Performance Indicators:
  • Percentage of end-users adopting implemented security practices.
  • Number of end-user-related security incidents.
Area of Responsibility: Vendor Management Support
  • Responsibilities: Coordinate with vendors to ensure the correct implementation and functioning of security systems.
  • Key Performance Indicators:
  • Vendor SLA compliance rate.
  • Number of successful interactions and resolutions with vendors.
Area of Responsibility: Updating and Upgrading Security Systems
  • Responsibilities: Regularly update and upgrade security systems in line with technological advancements and evolving threats.
  • Key Performance Indicators:
  • Number of successful updates and upgrades completed within the specified timeline.
  • Reduction in security incidents due to outdated systems.
Area of Responsibility: Training and Mentorship
  • Responsibilities: Train team members on security operations, troubleshooting, and best practices.
  • Key Performance Indicators:
  • Number of training sessions conducted.
  • Team member satisfaction rate with training.
Area of Responsibility: Staying Abreast of Emerging Technologies
  • Responsibilities: Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the companys security measures are updated.
  • Key Performance Indicators:
  • Number of relevant technology updates incorporated into the environment.
  • Number of industry events attended or certifications obtained.
Area of Responsibility: Team Collaboration
  • Responsibilities: Participate in cross-functional projects, enhance system integration, and collaboration.
  • Key Performance Indicators:
  • Participate in at least one major cross-functional project per year.
Area of Responsibility: Miscellaneous and General
  • Responsibilities: Complete any assigned work-related duties and responsibilities.
  • Key Performance Indicators:
  • Completion rate of assigned duties and responsibilities.
  • Overall satisfaction rate in the performance of miscellaneous duties
Requirements1. Knowledge Requirements
  • Cybersecurity Principles: Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures.
  • Security Systems: Expertise in managing, configuring, and troubleshooting security systems, such as firewalls, intrusion detection systems, antivirus software, authentication mechanisms, and log management tools.
  • Vulnerability Remediation: Proficiency in using assessment tools and techniques for vulnerability identification and remediation.
  • Security Incident Response: Familiarity with the protocols and procedures for responding to, documenting, and resolving security incidents.
  • Network and System Security: Good understanding of network and system security principles, including knowledge of encryption technologies, IPsec, VPNs, and network protocols.
  • Cloud Security: Knowledge of security controls for leading cloud platforms like AWS, Azure, and Google Cloud.
  • Compliance Standards: Understanding of IT compliance and security standards such as ISO 27001, NIST, PCI DSS, and GDPR.
  • Emerging Security Technologies: Awareness of the latest cybersecurity technologies and trends.
  • IT Service Management Frameworks: Knowledge of frameworks and processes such as ITIL.
2. Qualifications
  • Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Industry Certifications: CISSP, CEH, or CISM certifications are preferred.
  • Cloud Security Certifications: Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous.
  • Other Certifications: Certifications like ITIL, CRISC, or CISA are beneficial.
3. Experience
  • Security Implementation: Hands-on experience with security measures such as firewalls, intrusion detection systems, antivirus software, and data encryption.
  • Vulnerability Assessment and Remediation: Experience in vulnerability detection and the implementation of remediation strategies.
  • Security Protocols and Technologies: Deep experience with security protocols, encryption technologies, and network protocols.
  • Incident Response: Experience in managing security incidents and performing threat hunting.
  • Vendor Management: Experience managing vendor relations.
  • Network Security: Skills in implementing network security measures.
  • Cloud Security: Experience with security in cloud environments like AWS, Azure, or Google Cloud.
  • Compliance: Experience with compliance management according to relevant standards and regulations.
4. Technical Skills
  • Security Tools: Proficiency in using security tools including firewalls, intrusion detection systems, and antivirus software.
  • Vulnerability Assessment Tools: Experience with tools like Nessus, OpenVAS, and Qualys.
  • Network Security: Skills in managing network security protocols and systems.
  • Programming and Scripting: Proficiency in scripting languages like Python or Bash.
  • Cloud Security Tools: Knowledge of tools specific to cloud security.
  • Encryption Technologies: Understanding of encryption and secure communication technologies.
  • Incident Response Tools: Ability to utilize tools for quick response to security breaches.
  • IT Service Management Frameworks: Familiarity with frameworks like ITIL.
5. Personal Attributes/Behavioral Competencies
  • Problem-solving: Strong ability to troubleshoot and resolve complex network issues.
  • Detail-oriented: Meticulous in planning, execution, and documentation.
  • Communication Skills: Excellent communication skills, with the ability to explain complex technical issues in simple terms.
  • Teamwork and Collaboration: Strong team player with effective collaboration skills.
  • Continuous Learning: Commitment to continuous skill improvement and staying current with industry trends.
  • Customer Focus: Dedicated to meeting customer needs and maintaining high satisfaction levels.
  • Adaptability: Openness to adopting new technologies and methods.
  • Stress Management: Capable of handling pressure and urgent situations effectively.
  • Time Management: Efficient in prioritizing tasks and managing time.
  • Ethics and Integrity: High ethical standards and integrity in professional conduct.
BenefitsSalary is market related.

Alinta Tech Solutions

Similar Jobs

  • Server Engineer : Enterprise and Cloud Infrastructure

    Alinta Tech Solutions

    • Centurion, Gauteng
    The main objective of the Server Engineer position is to maintain the reliability, integrity, and efficient functionality of the information systems that are critical to the core f…
    • 11 days ago
    • Apply easily
  • Enterprise Architect

    iOCO

    • Centurion, Gauteng
    Are you a seasoned IT professional with a strong background in IT Governance, Enterprise Architecture, or Software Development? We're looking for someone like you to join our team.…
    • 12 days ago
  • Cloud Architect

    Manpower

    • Midrand, Johannesburg
    Client based in Gauteng is seeking a Cloud Architect to oversee cloud computing architecture through deployment, management, and support for cloud applicationsResponsibilities:Be t…
    • 26 days ago