Security Engineer: Enterprise and Cloud Infrastracture
Alinta Tech Solutions
- Centurion, Gauteng
- Contract
- Full-time
- Responsibilities: Implement security controls based on guidelines and designs provided by the security architect.
- Key Performance Indicators:
- Number of security controls implemented within the specified timeline.
- Percentage of implemented controls functioning as expected.
- Responsibilities: Configure and manage security solutions, including firewalls, intrusion detection systems, anti-virus software, and data encryption.
- Key Performance Indicators:
- Number of security configurations completed within scope, time, and budget.
- Percentage of configured solutions functioning without critical issues.
- Responsibilities: Apply patches and modifications to fix identified vulnerabilities.
- Key Performance Indicators:
- Meantime to remediate vulnerabilities.
- Number of exceptions.
- Average age of open vulnerabilities.
- Responsibilities: Monitor security systems for anomalies, respond to security incidents, perform initial analysis, and escalate as necessary.
- Key Performance Indicators:
- Number of security incidents detected and responded to within an acceptable timeframe.
- Meantime to identify and escalate critical incidents.
- Responsibilities: Resolve identified compliance issues from regular checks to ensure the systems comply with the organizations security policies and standards.
- Key Performance Indicators:
- Compliance rate with security standards and policies.
- Number of non-compliance issues identified and resolved.
- Responsibilities: Implement end-user security practices, like password management and access controls.
- Key Performance Indicators:
- Percentage of end-users adopting implemented security practices.
- Number of end-user-related security incidents.
- Responsibilities: Coordinate with vendors to ensure the correct implementation and functioning of security systems.
- Key Performance Indicators:
- Vendor SLA compliance rate.
- Number of successful interactions and resolutions with vendors.
- Responsibilities: Regularly update and upgrade security systems in line with technological advancements and evolving threats.
- Key Performance Indicators:
- Number of successful updates and upgrades completed within the specified timeline.
- Reduction in security incidents due to outdated systems.
- Responsibilities: Train team members on security operations, troubleshooting, and best practices.
- Key Performance Indicators:
- Number of training sessions conducted.
- Team member satisfaction rate with training.
- Responsibilities: Continually educate themselves on the latest cybersecurity trends, threats, and technology advancements to ensure the companys security measures are updated.
- Key Performance Indicators:
- Number of relevant technology updates incorporated into the environment.
- Number of industry events attended or certifications obtained.
- Responsibilities: Participate in cross-functional projects, enhance system integration, and collaboration.
- Key Performance Indicators:
- Participate in at least one major cross-functional project per year.
- Responsibilities: Complete any assigned work-related duties and responsibilities.
- Key Performance Indicators:
- Completion rate of assigned duties and responsibilities.
- Overall satisfaction rate in the performance of miscellaneous duties
- Cybersecurity Principles: Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures.
- Security Systems: Expertise in managing, configuring, and troubleshooting security systems, such as firewalls, intrusion detection systems, antivirus software, authentication mechanisms, and log management tools.
- Vulnerability Remediation: Proficiency in using assessment tools and techniques for vulnerability identification and remediation.
- Security Incident Response: Familiarity with the protocols and procedures for responding to, documenting, and resolving security incidents.
- Network and System Security: Good understanding of network and system security principles, including knowledge of encryption technologies, IPsec, VPNs, and network protocols.
- Cloud Security: Knowledge of security controls for leading cloud platforms like AWS, Azure, and Google Cloud.
- Compliance Standards: Understanding of IT compliance and security standards such as ISO 27001, NIST, PCI DSS, and GDPR.
- Emerging Security Technologies: Awareness of the latest cybersecurity technologies and trends.
- IT Service Management Frameworks: Knowledge of frameworks and processes such as ITIL.
- Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Industry Certifications: CISSP, CEH, or CISM certifications are preferred.
- Cloud Security Certifications: Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous.
- Other Certifications: Certifications like ITIL, CRISC, or CISA are beneficial.
- Security Implementation: Hands-on experience with security measures such as firewalls, intrusion detection systems, antivirus software, and data encryption.
- Vulnerability Assessment and Remediation: Experience in vulnerability detection and the implementation of remediation strategies.
- Security Protocols and Technologies: Deep experience with security protocols, encryption technologies, and network protocols.
- Incident Response: Experience in managing security incidents and performing threat hunting.
- Vendor Management: Experience managing vendor relations.
- Network Security: Skills in implementing network security measures.
- Cloud Security: Experience with security in cloud environments like AWS, Azure, or Google Cloud.
- Compliance: Experience with compliance management according to relevant standards and regulations.
- Security Tools: Proficiency in using security tools including firewalls, intrusion detection systems, and antivirus software.
- Vulnerability Assessment Tools: Experience with tools like Nessus, OpenVAS, and Qualys.
- Network Security: Skills in managing network security protocols and systems.
- Programming and Scripting: Proficiency in scripting languages like Python or Bash.
- Cloud Security Tools: Knowledge of tools specific to cloud security.
- Encryption Technologies: Understanding of encryption and secure communication technologies.
- Incident Response Tools: Ability to utilize tools for quick response to security breaches.
- IT Service Management Frameworks: Familiarity with frameworks like ITIL.
- Problem-solving: Strong ability to troubleshoot and resolve complex network issues.
- Detail-oriented: Meticulous in planning, execution, and documentation.
- Communication Skills: Excellent communication skills, with the ability to explain complex technical issues in simple terms.
- Teamwork and Collaboration: Strong team player with effective collaboration skills.
- Continuous Learning: Commitment to continuous skill improvement and staying current with industry trends.
- Customer Focus: Dedicated to meeting customer needs and maintaining high satisfaction levels.
- Adaptability: Openness to adopting new technologies and methods.
- Stress Management: Capable of handling pressure and urgent situations effectively.
- Time Management: Efficient in prioritizing tasks and managing time.
- Ethics and Integrity: High ethical standards and integrity in professional conduct.