Cyber Security Architect - Cape Town Verfied

Salary Negotiable Cape Town, Western Cape Cape Town, Western Cape more than 14 days ago 24-10-2016 7:34:24 AM
21-11-2016 7:34:24 AM
Senior Penetration Testers, are you ready to take the next step in your career? If you have a minimum of 5 years solid experience with IT Security and a relevant Tertiary Degree, I have a dream job for you. You will report straight into the CTO and have the opportunity to travel to the USA on a regular basis. This opportunity is open due to growth and the company is rapidly expanding! Send me an updated version of your CV to secure this amazing vacancy!



Qualification:

BSc in Computer Science, Software Engineering, Cyber Security or CISSP



Skills & Experience:

Minimum 5 years’ experience in Information Security

You will need to bring your expertise in data-protection software and hardware solutions including File level

Application and Database encryption and tokenization solutions to the table along with your expertise in cryptographic algorithms such as SHA, ECC, RSA and AES

Sound knowledge of Hadoop and NoSQL

Experience in multiple information technology such as IIS, SQL, Firewall, Linux Pen Testing etc.

100% comfortability with complex security



Job Description:

Develop security requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices.

Design public key infrastructures (PKIs), including the use of certification authorities (CAs) and digital signatures. Configure and secure firewalls, intrusion detection systems, web servers and databases and more.

Collaborate with the principal stakeholders to establish an IT security risk management program.

Work with Senior Management to ensure IT security protection policies are being implemented, reviewed, maintained and governed effectively.

Monitor security vulnerabilities, threats, and events in the network, applications and host systems.

Analyze and establish security requirements for all systems / infrastructure.

Oversee and monitor routine security administration to defend systems against unauthorized access, modification, and destruction.

Investigate abnormalities, intrusion incidents, conduct forensic investigations and mount incident responses.

Act as a focal point for IT security inquiries and direct a full investigation with recommended courses of action.

Perform vulnerability testing, risk analysis, assessments and conduct security audits.

Respond immediately to security incidents, report violations and provide post-incident analysis.

Provide technical leadership in the security space for (and guidance too) development teams.

Integrate IT Systems Development with security policies and information protection strategies.

Collaborate with Developers on authentication, authorization and encryption solutions.