×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Consultant : Operations

Job in Cape Town, 7100, South Africa
Listing for: Recru-It
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below

Role Overview

The role of the Cyber Security Consultant :
Operations will form part of our client's team which focuses on Cyber Security Operations services to businesses on our client's Shared Network.

This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, Web, and Email content filtering environments.

The team also manages the Data Leakage Prevention, Network Access Management and Privileged Account Management infrastructure and processes. What will make you successful in this role?

Responsibilities
  • Configuration, monitoring, and management of Anti-Virus Infrastructure
  • Data Leakage Prevention system, rules, and reports
  • Privileged Account Management process
  • Network Access Control process and exception handling
  • Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance
  • Security hardening baseline compliance scanning, reporting and remediation
  • Issuing, renewing, and revoking PKI digital certificates
  • Assessing internet and email use on request of Forensics or HR departments
  • Review Firewall rule configuration and report
  • Reporting on the status of the cyber security control environments on a weekly, monthly, and quarterly basis
  • Continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls
  • Contribute to Knowledge and Skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses or through interaction with experts
Qualifications
  • Matric
  • Information Technology diploma or degree
  • Information Security certification (preferable)
Experience
  • At least 3 – 5 years in hands‑on technical experience which includes
    • Network experience (TCP / IP, Firewalls, IPS, NAC)
    • Operating System management and Hardening (Windows, Linux, CIS hardening baselines)
    • Anti-Virus System management and Configuration
    • Data Leakage Prevention tool configuration
    • Logical Access Management (AD, PAM)
    • Information Security Operations (Security+, CISSP will be beneficial)
    • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)
Knowledge and Skills
  • Security Auditing
  • Risk management
  • Incident Investigation
  • Reporting and Administration
  • Security tools monitoring
Personal Attributes
  • Interpersonal savvy - Contributing independently
  • Decision quality - Contributing independently
  • Plans and aligns - Contributing independently
  • Optimises work processes - Contributing independently
Core Competencies
  • Cultivates innovation - Contributing independently
  • Customer focus - Contributing independently
  • Drives results - Contributing independently
  • Collaborates - Contributing independently
  • Being resilient - Contributing independently
Package & Remuneration

Market related - Monthly

#J-18808-Ljbffr
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary