Transnet
Specialist: Cyber Security
- Job Type Full Time
- Qualification Bachelors
- Experience 5 years
- Location KwaZulu-Natal
- City Durban
- Job Field ICT / Computer
Position Purpose
The main goal of this role is to keep the organization’s ICT systems and networks safe. It also involves providing cyber security architecture to help the business reach its goals. This includes creating, testing, implementing, and checking the effectiveness of security systems. The role focuses on preventing data breaches, monitoring attacks, and responding to them.
The person in this role will assess the security of the organization’s internal and external networks, applications, sensitive systems, mobile apps, and data coding standards. They will simulate threat actors trying to breach the network, such as gaining admin access, stealing sensitive data, or mimicking ransomware attacks. This helps improve the organization’s security.
They will also offer cyber security architecture services to support business objectives.
Position Outputs
Information and Cyber Security Strategy
Help define, develop, and oversee the organization’s security management strategy and framework.
- Develop and implement standards, policies, procedures, and solutions to reduce risks and improve security, service availability, efficiency, and effectiveness.
- Define and promote an information security policy for senior management approval.
- Follow relevant standards, best practices, and legal requirements for information security.
Information Security
- Ensure technology, processes, and governance are in place to monitor, detect, prevent, and respond to current and emerging security threats.
- Research and recommend new technologies, architectures, and security products to meet organizational needs.
- Regularly scan the environment to identify vulnerabilities and threats.
- Document and escalate non-compliance issues.
- Investigate security breaches according to procedures.
- Help users define their access rights and privileges.
- Handle non-standard security tasks and resolve security issues.
- Respond to routine security support requests.
- Assist in investigating and fixing access control and security system issues.
- Review new and updated systems/applications to ensure proper security configuration.
- Work with IT teams to implement security solutions across all systems to manage risks and meet business and regulatory needs.
SIEM (Security Information & Event Management)
- Regularly monitor the SIEM solution to reduce false positives.
- Document and escalate high-priority incidents.
- Help investigate and resolve security incidents.
Threat Protection (including Penetration) and Response Management
- Stay updated on malware attacks and other cyber threats.
- Monitor emerging technologies, industry trends, and best practices in security.
- Research new threats, vulnerabilities, and incident response reports.
- Create test cases based on technical analysis of risks and vulnerabilities. Develop test scripts, materials, and packs for new and existing software or services.
- Specify requirements for testing environments, data, resources, and tools. Execute and document complex test scripts using standard methods.
- Ensure offensive security tools and techniques follow regulations and policies.
- Document and analyze test actions and results.
- Review test results and adjust tests as needed.
- Report on progress, anomalies, risks, and issues.
- Report on system quality and track test case metrics.
- Provide expert advice to others.
Data/Information Security and Loss Prevention Management (including Encryption)
- Explain and advise on physical, procedural, and technical security controls.
- Act as a cyber security lead for technology controls and information security in projects and the organization. Offer technical expertise, training, and advice on vulnerability management and system security. Provide architecture reviews, recommendations, and consulting.
- Lead red team exercises, penetration tests, and vulnerability assessments for IT and OT systems.
- Conduct security risk assessments, vulnerability checks, and business impact analyses for complex systems.
- Design, plan, and run threat actor simulations using advanced tactics, techniques, and procedures.
- Investigate suspected attacks and manage security incidents.
- Use forensics when needed.
- Communicate security risks and issues to business managers.
- Prepare assessment reports with conclusions, recommendations, and action plans.
Network Security
- Investigate security breaches according to procedures.
- Monitor network and application performance for unusual activity.
- Help users define access rights and privileges.
- Handle non-standard security tasks and resolve issues.
- Respond to routine security support requests.
- Maintain records and inform relevant people of actions taken.
- Assist in investigating and resolving access control and security issues.
- Perform security administration tasks and keep documentation up to date.
Data Centre, Server, and Storage Security
- Perform regular backups and restores on schedule and track offsite storage.
- Configure and maintain secure storage systems as per procedures.
- Identify and help resolve operational problems.
- Use tools to report on storage utilization, performance, and backup stats.
End User Device Security
- Resolve incidents related to end-user device security.
- Develop reporting dashboards for non-compliance with security standards.
- Follow up and fix non-compliance issues.
- Keep operating systems and security patches updated on end-user devices.
- Ensure devices are disposed of according to policy at end of life.
Qualifications and Experience
- Degree in Information Technology.
- At least 5 years’ IT experience in cyber security and architecture.
- Experience in information/cyber security at a senior or specialist level.
- Preferred certifications: Certified Information System Security Professional (CISSP), Offensive Security Certified Professional (OSCP), Certified Cloud Security Professional (CCSP).
- Advantageous: Honours Degree, SAP Security Certification.
- Standard requirements: Valid driver’s license code 08, willingness to travel as needed.
Check how your CV aligns with this job
Method of Application
Build your CV for free. Download in different templates.
Was this helpful?
0 / 0
#Administration #Compliance #Driver #Information Technology #Management