Cyber Security Specialist
  • South Africa Cape Town
  • DataTech Recruitment
1 year before
31.12.2023
Protect and Defend
Cyber Defense Infrastructure Support
Job Description

About the job
Cyber Security Specialist IT Security

Cape Town - Western Cape - South Africa

Cyber Security Specialist required in Cape Town area - Hybrid, to analyse, design, implement and support Technology Security IT Services regarding Cyber Security aspects and solutions in support of the organization. 5+ years' experience in IT Security related services and infrastructure (physical / virtual infrastructure, operating systems and supporting software), designing, deploying and supporting Identity Platform deployments in a medium to large organization. Experience with Microsoft and Opensource Operating Systems, ITIL concepts and Policies, Cloud Platforms and IAM concepts and technologies

Responsibilities

To analyse, design, implement and support Technology Security IT Services in regard to Cyber Security aspects and solutions in support of the organization.

Requirements

Grade 12 National Certificate / Vocational
5+ years' experience in IT Security related services and infrastructure (physical / virtual infrastructure, operating systems and supporting software)
5+ years' experience designing, deploying and supporting Identity Platform deployments and its supporting technologies in a medium to large-sized organization
Proven experience implementing security solutions in a heterogeneous environment.
6+ years' experience in Microsoft Operating Systems
3+ years' experience in OpenSource Operating Systems
Proven experience in designing and deploying server security and configuration using policies.
5+ years' experience in Microsoft Security technologies
3+ years' experience in ITIL concepts and policies
2+ years' experience in Public Cloud Platforms
2+ years' experience with IAM concepts and technologies
IT Security solutions design and administration
Designing, implementing and administering IDP / IAM Platforms (Active Directory, Azure AD), Group Policy and related technologies.
Security administration in a Windows and Opensource Environment.
Implementing Security Technologies in the enterprise, including cloud services
Security Principles, IT Security procedures and Best Practices
PKI, RADIUS, LDAP, DNS, IDP, SAML, OAUTH, MFA, PAM, Zero Trust
IT systems development processes (SDLC lifecycle)
Business compliance requirements
Business continuity planning
IT Operations
Virtualization architecture
Public Cloud architecture
SIEM (Security Information and Event Management) and/or ECA (Event Correlation and Analysis) Systems
Secure network architecture, identity and access management principles, and application security principles.
Advanced Networking
DevOps
A sound understanding of:
Project Management principles and processes
Application design principles
Ethical hacking and penetration testing
EDR and Malware technologies
Messaging and Collaboration technologies and architecture
Scripting and Automation
Data Centre / Cloud infrastructure architecture.
Data Centre / Cloud infrastructure performance and capacity analysis.

The company offers very competitive rates.

Only apply if you have the relevant experience!

Apply for this Job


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0061   Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • K0205   Knowledge of basic system, network, and OS hardening techniques.
  • K0324   Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • K0332   Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • K0334   Knowledge of network traffic analysis (tools, methodologies, processes).

Required Skills
  • S0121   Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
  • S0124   Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Abilities
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).