Job title: Information Security Consultant – Gain specialized security tool expertise with Financial Services group – Cape Town. Hybrid. R600K.
Job type: Permanent
Emp type: Full-time
Salary: ZAR 600,000.00
Location: Cape Town
Job published: 10/07/2024
Job ID: 39418

Job Description


Exciting opportunity for Information Security Consultant to be responsible for managing Cyber Security Operations services and play a key role in enhancing Data Leakage Prevention.

This Information Security Consultant (Operations) is based in CAPE TOWN and offers R600K. HYBRID.

The Client:
Financial Services group operating across several segments of the financial services industry.

The Role:
As a Cyber Security Consultant - Operations, you will join a dedicated team responsible for managing Cyber Security Operations services. Your role will involve configuring, monitoring, and managing critical security infrastructure including PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, and more. Play a key role in enhancing Data Leakage Prevention, NAM, and PAM processes.

The Responsibilities:
Configure and manage Anti-Virus infrastructure and ensure its effectiveness.
Oversee Data Leakage Prevention systems, rules, and generate insightful reports.
Manage Privileged Account Management processes and Network Access Control, including exception handling.
Conduct Vulnerability Scanning, propose remediation actions, and track compliance.
Ensure Security hardening baseline compliance through regular scanning and remediation efforts.
Issue, renew, and revoke PKI digital certificates as needed.
Assess internet and email use upon request from Forensics or HR departments.
Review and report on Firewall rule configurations.

The Requirements:
• Diploma or degree in Information Technology or related field.
• Information Security certification.
• 3-5 years of hands-on technical experience including:
   o Network experience (TCP/IP, Firewalls, IPS, NAC).
   o Operating System management and Hardening (Windows, Linux, CIS hardening baselines).
   o Anti-Virus System management and Configuration.
   o Data Leakage Prevention tool configuration.
   o Logical Access Management (Active Directory, Privileged Account Management).
   o Information Security Operations (Security+, CISSP beneficial).
   o Vulnerability Management (use of well-known scanning tools, interpretation of CVSS scores).