Our client requires the services of an ITO Systems Security Engineer to:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify and define system security requirements.
Design computer security architecture and develop detailed security designs.
Prepare and document standard operating procedures and protocols.
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Provide onsite or remote access diagnoses and resolution of computer hardware and software problems using a highly integrated set of diagnostic tools and techniques.
Work well as a team player providing technical expertise and leadership in the various fields Follow process, policies and procedures as laid out.
Serve as a technical expert providing support to the other IT Technicians and ITO team in general.
Provisioning of servers according to strict guidelines with attention to detail and documentation.
Installation and upgrading of complex IT equipment, networks and systems.
Maintaining and documenting of all work performed as well as strict usage of the call logging systems to ensure open communication with the whole team.
Administer, implement, and provide technical support of applications and associated hardware utilizing a specialized set of diagnostic tools with elevated privileges.
Operation and administration of most of the IT systems used to manage, monitor and configure all the technical systems in the environment.
Manage access and security of systems in accordance with policies.
Serve as a liaison between other technical staff, management, users, and vendors regarding service requests, usage, standards, security, and other technical matters.
Develop structured diagrams for the specifications of technical systems, communication systems, servers, storage area networks, security or any other computer related hardware or software.
Develop and document configurations of the following: databases, servers, computers, security and network monitor systems, packaged programs, macros, utilities, and communication systems.
Deliver stable and responsive server, network, storage, and backup services and software development infrastructure.
Technical and structured testing of diagnostic tools and systems, often in conjunction with the testing team.
Willingness to be available to work after hours where necessary to minimize business downtime and resolve issues within maintenance window periods.
The ideal candidate should have:
Proven work experience as a system security engineer or information security engineer.
Experience in building and maintaining security systems.
Detailed technical knowledge of database and operating system security.
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
Experience with network security and networking technologies and with system, security, and network monitoring tools.
Thorough understanding of the latest security principles, techniques, and protocols.
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol.
Previous experience working with the relevant systems in use in the companys IT Environment.
Ability to accurately identify and assist in the resolution of IT issues, risks and problems.
Excellent verbal, written and technical presentation skills including diagramming in Visio.
Good ability to work as a team member and not in isolation.
Generate enthusiasm among team members.
Challenge others to develop as leaders while serving as a role model.
Ability to effectively prioritise and execute tasks in a high-pressure environment.
Manage the process of innovative change.
Understand complex IT systems and concepts as well as the implications of changes, upgrades and new project implementations.
Knowledge of and exposure to ITIL and COBIT, experience in implementation of these frameworks would be beneficial.
Seek and participate in development opportunities above and beyond required training.
Actively contribute to corporate knowledge base.
Possess significant knowledge of SANs, networks, blade infrastructures, Microsoft and Linux and SQL systems.
IT Degree or Diploma.
At least 8 years IT experience in the role as an Engineer or similar role.
CEH: Certified Ethical Hacker.
GSEC: SANS GIAC Security Essentials CISSP: Certified Information Systems Security Professional.
CISM: Certified Information Security Manager.
COMMENCEMENT: As soon as possible.
Please send your comprehensive resume, 2 recent payslips and supporting documentation.
Only shortlisted candidates will be contacted.
N.B: If you have not received a response from us within 14 days please consider your application for this role as not successful.
Full Circle offers a R2000-00 finder\'s fee for any candidates referred and successfully placed in a permanent role. A R1000-00 finder\'s fee for any candidates referred and successfully placed in a contract role with a duration of three months or more.