More jobs:
Information Security Consultant : Operations
Job in
Cape Town, 7100, South Africa
Listed on 2026-01-02
Listing for:
Recru-It
Full Time
position Listed on 2026-01-02
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Role Overview
The role of the Cyber Security Consultant :
Operations will form part of our client's team which focuses on Cyber Security Operations services to businesses on our client's Shared Network.
This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments.
The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes. What will make you successful in this role?
Responsibilities- Configuration, monitoring, and management of Anti-Virus Infrastructure
- Data Leakage Prevention system, rules, and reports
- Privileged Account Management process
- Network Access Control process and exception handling
- Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance
- Security hardening baseline compliance scanning, reporting and remediation
- Issuing, renewing, and revoking PKI digital certificates
- Assessing internet and email use on request of Forensics or HR departments
- Review Firewall rule configuration and report
- Reporting on the status of the cyber security control environments on a weekly, monthly, and quarterly basis
- Continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls
- Contribute to Knowledge and Skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts
- Matric
- Information Technology diploma or degree
- Information Security certification (preferable)
- At least 3 – 5 years in hands‑on technical experience which includes
- Network experience (TCP / IP, Firewalls, IPS, NAC)
- Operating System management and Hardening (Windows, Linux, CIS hardening baselines)
- Anti-Virus System management and Configuration
- Data Leakage Prevention tool configuration
- Logical Access Management (AD, PAM)
- Information Security Operations (Security+, CISSP will be beneficial)
- Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)
- Security Auditing
- Risk management
- Incident Investigation
- Reporting and Administration
- Security tools monitoring
- Interpersonal savvy - Contributing independently
- Decision quality - Contributing independently
- Plans and aligns - Contributing independently
- Optimises work processes - Contributing independently
- Cultivates innovation - Contributing independently
- Customer focus - Contributing independently
- Drives results - Contributing independently
- Collaborates - Contributing independently
- Being resilient - Contributing independently
Market related - Monthly
#J-18808-LjbffrNote that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×