Location – Woodstock
Role Purpose:
The Principal Security Professional is responsible for the support & maintenance of the organization’s information security, this will include acting as a technical lead, cybersecurity architect and provide strategic into the organization’s roadmap.

Qualifications:

  • Bachelor’s Degree in IT or similar qualification.
  • Certifications in Information Security are required.
  • CISSP
  • CISM

Key Performance Areas would include, but are not limited to:

  • Analyze, test, troubleshoot and support client’s cybersecurity investment.
  • Monitor the performance and security of infrastructure, applications, and operations with the Protects information assets by developing security strategies, directing system access control, monitoring, and response.
  • Perform system and account administration tasks.
  • Contribute to, maintain, and document system architecture, standards, and procedures.
  • Adhere to and identify solutions that streamline the internal workflow.
  • Maintain the software license register and periodically re-verify existing license validity.
  • Assists in Information Security projects to align with organizational strategic objectives, goals, and risk tolerance.

Key Outputs:

  • Implement and regularly review automated monitoring cybersecurity for all infrastructure and application services.
  • Maintain detailed infrastructure documentation, including an incident register for all cybersecurity incidents & outages.
  • Maintain an up-to-date software license register, following pre-defined SOPs.
  • Manage real-time infrastructure incidents to minimize operational business impact and maximize availability with the relevant cybersecurity service providers.
  • Perform preventative and reactive maintenance to ensure required availability of services, in line with business needs, whilst adhering to defined change management principles.
  • Ensure that the relevant service providers process support requests within SLA.
  • Perform system and account administration tasks within SLA.
  • Perform project-based activities as directed by the IT project manager.
  • Provide detailed & accurate estimates and feedback to the business as required.

Functional Requirements:

  • Review existing software license allocations to ensure optimal use.
  • Review cybersecurity infrastructure and application monitoring for potential improvements
  • Produce a monthly dashboard of pertinent security metrics.
  • Produce a monthly reporting of pertinent cybersecurity metrics both technical and executive.

The successful candidate must have the following experience/skills:

  • A minimum of 5 years of experience performing cybersecurity support duties.
  • A minimum of 2 years’ experience in at least five of the following: access control systems and methodology; business continuity and disaster recovery planning; risk, response, and recovery; network security architecture; security management practices; audit and monitoring; enterprise and IT risk assessments; incident response management.
  • Experience and expertise in managing and administering infrastructure and data systems.

Knowledge:

  • Experience with standards and best practices such as POPI, GDPR, SOC 2, PCI compliance
  • Ability to work effectively in a multi-disciplinary, collaborative team environment or independently with minimal direction.
  • Display high-energy, self-motivation, flexibility, and an ability to multitask and prioritize demands in a fast-paced environment.
  • Must possess a keen attention to detail and an ability to work effectively under pressure, and during non-core hours.
  • Excellent customer service skills and an ability to clearly explain technical issues to non-technical persons.
  • Must be able to communicate clearly and professionally via phone, email and in person.
  • Must be a very organized individual with the ability to clearly document their work in accordance with office procedures.

Tech Skills
Control Area

  • MFA
  • Web Proxy (SASE)
  • Sandbox
  • Identity and Access
  • Perimeter and Data Centre Security
  • Vulnerability Management
  • Vulnerability Management
  • Web Application Firewalling
  • Web Application Firewalling
  • Jumphost
  • DLP Classification
  • Email Security
  • PAM
  • Firewall Assurance
  • Cloud
  • Endpoint Protection
  • SIEM

Technology

  • Cisco DUO
  • Netskope
  • Thinkst Canary
  • Active Directory
  • FortiGates/FortiAnalyzer
  • Qualys VMDR
  • Nessus
  • FortiWeb
  • CloudFlare
  • ObserveIT
  • Varonis
  • Mimecast
  • SailPoint
  • Tufin

Desired Skills:

  • security
  • IT security
  • cissp
  • cism

Learn more/Apply for this position