Home
About Us
Jobs
Career Advice
Contact Us

Definitive Recruitment Solutions

Information Security Officer


Salary
TBA
Start Date
End Date
Location
Cape Town
EE
np
Perm/Contract
Perm


Job Information

Please note: please ensure that all relevant skills and technologies are listed in CV

The role is responsible for identifying, evaluating and reporting on legal and regulatory, ICT, and cybersecurity risk to information and technology assets, while supporting and advancing business objectives.

CISSP or CISM certification.
Relevant degree (e.g. BSc Informatics, BSc Computer Science, BCom Information Systems) will be an advantage.
A minimum of 8 years’ experience in a combination of risk management, information security and ICT operations environment.
Working experience and ability to manage firewalls IPS, AV, SIEM, Wireless controllers and WAF.
Sound knowledge of legal, regulatory and compliance requirements relating to information security for example ISO27001
& ISO 27002)
Extensive working knowledge of an ICT environment that have a wide range of different technologies in a highly integrated technology landscape.
Ability to adapt to a fast-moving ICT security threat landscape and keep pace with latest thinking and new security technologies.
Strong collaborative problem solving and analytical capability to manage numerous information sources and provide data analysis reports to senior management.
Strong client focus with the ability to meet the demands of internal and external stakeholders.
Excellent written and verbal communication skills and the ability to communicate information security and risk-related
concepts to technical and non-technical stakeholders at various hierarchical levels.
Ability to build business partnerships that help drives the ICT security strategy of ‘The Company’ Southern Africa.
Display an understanding of different functions within an organisation
The ability to work in a team environment and independently.

Implements and maintains the ‘Company’ Southern Africa (MCSA) the security policies, procedures and standards. 
Ensure that the information security documents are consistent with the corporate security objectives. 
Manage and maintain the security events with the security incident response strategy.




Enquire Today!!