Security Architect
  • South Africa Johannesburg
  • Boardroom Appointments - Global Human and Talent Capital
1 year before
31.12.2023
Protect and Defend
Cyber Defense Infrastructure Support
Job Description

About the job
Requirements:


A Degree in either Engineering or Computer Science preferred.


The following certifications are optional.


Security Certification (SABSA, CISSP, CeH, etc.)
Cloud Certifications.


Having Worked In The Following Roles Would Be Preferred.


Software Design role.
Software Technical Lead role.
Software Snr Development role (at least 4 years experience).
DevOps role.


Exposure and implementation of Agile methodologies (SAFe, Agile, Scrum, etc.) is preferred.


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0002   Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0044   Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • K0258   Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)).

Required Skills
  • S0007   Skill in applying host/network access controls (e.g., access control list).
  • S0059   Skill in using Virtual Private Network (VPN) devices and encryption.
  • S0077   Skill in securing network communications.
  • S0121   Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Abilities
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).