- A dynamic IT company that delivers value-driven IT solutions to the group.
- Our work lives revolve around our DNA.
- We take pride in our work, treat our colleagues, partners and our country with respect.
- We exercise collaborative decision-making and believe in having a balance in life.
- We do this all whilst being fun to be with and enjoying what we do.
Qualifications/Experience
- Formal Cisco certification ideal CCNA/CCNP (Security)
- Formal Cloud certifications ideal Azure & Google Cloud Platform
- Minimum of 5 years cybersecurity support experience
- Must have experience in the areas of vulnerability threat management, cybersecurity, and supporting management tools and technologies such as Cisco ASA/FTD/Meraki/DUO/FMC, Intrusion Prevention, Tenable Nessus and SIEM(Splunk).
- Network experience with the TCP/IP stack
- Solid understanding of the OSI model and renowned ports and services
- Understanding of cybersecurity methodologies
- Proficiency in Linux ideal
- The ability to evaluate system changes for security implications and the knowledge to make recommendations for improvements
- The ability to thrive in a fast-paced environment and to work under pressure
- Strong problem solving and analytical skills
- Ability to seek out vulnerabilities in IT infrastructures
- A deep understanding of how hackers work and ability to keep up to date with the fast pace of change in the criminal cyber-underworld
- Ability to use logic and reasoning to identify the strengths and weaknesses of IT systems
- Excellent communication and presentation skills
- Ability to take responsibility and be decisive
- Ability to work within a small team
- Effective planning and organizational skills
- Ability to work under pressure
- Ethical hacking
- Strong attention to detail and problem-solving skills
- The Cybersecurity Engineer is responsible for designing, implementing and managing a highly secure network solution that protects against potential cyber attacks and hacking threats by maintaining the cybersecurity environment on prem and in the cloud.
- The candidate must display an excellent understanding of technology infrastructures using Firewalls, VPN, IDS/IPS, Web-Proxy, Cloud Security and Security Audits.
- Top candidates will be comfortable working with a variety of technologies, security problems, and troubleshooting of the network.
- Give input on best practice security standards on new systems, network design, and respective third party integrations.
- Design, implement, manage, monitor, and upgrade security measures for the protection of the organizations data, systems, and networks
- Create and maintain documentation as it relates to network configurations, security architecture and best practice principles.
- Support and maintain all network security devices across multiple sites (Globally)
- Daily administration of firewall rules, IPS Policies and Filters via change control procedures.
- Monitor performance, logs, reports and alerts of potential threats or attempted breaches related to security incidents and remediate accordingly.
- Collaborate with management and department leaders to assess near and long-term network security assessments, vulnerabilities and risks.
- Troubleshooting all network and security issues and incidents
- Responding to network and associated systems security breaches
- Ensuring that the organizations data and infrastructure are protected by enabling the appropriate security controls
- Testing and identifying network and system vulnerabilities
- Daily administrative tasks, reporting, and communication with the relevant departments in the organization
- Evaluating the organizations security needs and establishing best practices and standards accordingly
- Routinely conduct penetration testing
- Taking appropriate security measures to ensure that the organizations infrastructure and existing data are kept safe
- Conducting testing and scans to identify any vulnerabilities in the network and system
- Knowledge of current cybersecurity trends, as well as the continued research of emerging trends and hacking techniques taking an active role in the change management process
- Willing to travel and be on standby.