Training Catalogue
WWISE

    Join Our Team

    Cyber Security Engineer

    Contract Type:
    Full-time
    Office Location:
    Pretoria Office

    General Job Specifications

    The Cyber Security Engineer’s duties will include, but are not limited to:

    • Maintaining and administering computer networks and related computing environments including systems software, applications software, hardware, and configurations.
    • Performing disaster recovery operations and data backups when required.
    • Protecting data, software, and hardware by coordinating, planning, and implementing network security measures.
    • Troubleshooting, diagnosing, and resolving hardware, software, and other network and system problems.
    • Replacing faulty network hardware components when required.
    • Maintaining, configuring, and monitoring virus protection software and email applications.
    • Monitoring network performance to determine if adjustments need to be made.
    • Conferring with network users about solving existing system problems.
    • Operating master consoles to monitor the performance of networks and computer systems.
    • Coordinating computer network access and use.
    • Designing, configuring, and testing networking software, computer hardware, and operating system software.
    • Providing network security expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure applications, operating systems, databases, and networks.
    • Translating security and technical requirements into business requirements, and communicate security risks to different audiences ranging from business leaders to engineers.
    • Implementing security controls, risk assessment frameworks, and programs which align to regulatory requirements, ensuring documented and sustainable compliance that aligns and advances the organisation’s cloud security.
    • Evaluating network security risks and developing security standards, procedures, and controls to manage risks.
    • Scheduling regular assessments and testing of effectiveness and efficiency of controls and create reports for the organisation, as well as its clients.
    • Updating security controls and providing support to all stakeholders on security controls covering internal assessments, regulations, protecting Personally Identifying Information (PII) data.
    • Performing and investigating internal and external information security risk and exceptions assessments. Assess incidents, vulnerability management, scans, patching status, secure baselines, penetration test result, phishing, and social engineering tests and attacks.
    • Documenting and reporting control failures and gaps to stakeholders.
    • Providing remediation guidance and preparing management reports to track remediation activities.
    • Assisting clients and other staff in the management and oversight of security program functions.
    • Training, guiding, and acting as a resource on security assessment functions to clients.
    • Remaining current on best practices and technological advancements and acting as the organisation’s technical resource for security assessment and regulatory compliance.

    Key Knowledge Areas

    • Maintaining and administering computer networks and related computing environments including systems software, applications software, hardware, and configurations.
    • Performing disaster recovery operations and data backups when required.
    • Protecting data, software, and hardware by coordinating, planning, and implementing network security measures.
    • Troubleshooting, diagnosing, and resolving hardware, software, and other network and system problems.
    • Replacing faulty network hardware components when required.
    • Maintaining, configuring, and monitoring virus protection software and email applications.
    • Monitoring network performance to determine if adjustments need to be made.
    • Conferring with network users about solving existing system problems.
    • Operating master consoles to monitor the performance of networks and computer systems.
    • Coordinating computer network access and use.
    • Designing, configuring, and testing networking software, computer hardware, and operating system software.

    Key Skills and Competencies Requirements

    • Developing and maintaining cloud infrastructure;
    • Researching and locating vulnerabilities to the system’s security;
    • Maintaining confidentiality;
    • Troubleshooting and operating a computer and various software packages; o Defining problems, collecting and analysing data, establishing facts and drawing valid conclusions;
    • Using judgement and ingenuity in maintaining objectives and technical standards.

    The ideal candidate should have the ability to:

    • Effectively communicate technical issues to diverse audiences, both in writing and verbally;
    • Apply a risk-based approach to planning, executing, and reporting on audit engagements and auditing processes;
    • Evaluate and update and/or revise program materials; o Learn quickly and apply knowledge to new situations;
    • Handle sensitive and confidential matters, situations, and data;
    • Understand and follow broad and complex instructions;
    • Interact positively with all relevant parties in order to enhance effectiveness and to promote quality service;
    • Comprehend technical language and to confer, analyse and write in an objective, clear manner;
    • Work independently and prioritise multiple tasks and adapt to needed changes;
    • Remain calm under pressure.

    Experience and Qualification Requirements

    • Bachelor’s degree in related business or technical areas, or an equivalency of education and work experience.
    • Minimum 3 (three) years’ proven work experience in a similar role.
    • Proven experience working with network infrastructure.
    • Certificates in cyber security, governance or any other related fields will be an added advantage.
    • ISACA Certification (CISA/ CRISC/ CISM/ CGEIT/ CSX-P/ CDPSE) will be an added advantage.
    • Valid driver’s licence.

    Education:

    • Bachelors (Preferred)

    Experience:

    • IT Help Desk Technician: 2 years (Preferred)
    • Computer Science: 3 years (Preferred)
    • Cyber Security: 3 years (Required)

    License/Certification:

    • Qualification in Computer Science (Preferred)
    • Qualification in Computer Engineering (Preferred)
    • Qualification in Cyber Security (Preferred)

      COPYRIGHT ©2024 WWISE. ALL RIGHTS RESERVED.