Current jobs related to Chief Information Security Strategist - Pretoria, Gauteng - Alinta Tech Solutions


  • Pretoria, Gauteng, South Africa Office Of The Chief Justice South Africa Full time

    Chief Information Security Officer - Gauteng - Office Of The Chief Justice South AfricaJob Title: Chief Information Security OfficerThe Office Of The Chief Justice South Africa is seeking a highly skilled and experienced Chief Information Security Officer to join its team. As a key member of the ICT management team, you will be responsible for ensuring the...


  • Pretoria, Gauteng, South Africa beBee Careers Full time

    Job Summary">The role of the Chief Safety and Security Strategist is to lead and manage all aspects regarding safety and security within a complex. This position requires strong disciplinary, investigation, assessment, interview, report writing, fault-finding, risk management, MIB (Management of Information and Intelligence Briefings), and high-level VIP...


  • Pretoria, Gauteng, South Africa Nambiti Technologies Ltd Full time

    Job Title: Chief Technology StrategistAbout Nambiti Technologies LtdNambiti Technologies Ltd is a leading technology firm that provides innovative solutions to businesses. We are seeking a highly skilled Chief Technology Strategist to join our team.Key ResponsibilitiesDevelop and maintain strategies for cloud infrastructure, applications, and data...


  • Pretoria, Gauteng, South Africa Sabenza It & Recruitment Full time

    Role OverviewSabenza IT & Recruitment seeks an experienced Chief Network Architect and Security Strategist to spearhead the development of secure, high-performance networks in a dynamic hybrid environment.About the JobThis is an excellent opportunity for a seasoned professional with a passion for security, automation, and next-gen networking. You will work...


  • Pretoria, Gauteng, South Africa The Recruitment Council Full time

    The Recruitment Council is seeking a highly skilled Chief Information Security Officer to join our team. As the IT Risk Manager, you will be responsible for ensuring that our company's IT risk is well managed within our risk appetite.The ideal candidate will have a strong background in information technology and risk management, with experience in developing...


  • Pretoria, Gauteng, South Africa Tumaini Full time

    About TumainiA well-established organization in the light industry seeks a highly skilled Chief Financial Strategist to oversee its financial operations.


  • Pretoria, Gauteng, South Africa beBee Careers Full time

    Job Description:As a Chief Technology Strategist, you will be responsible for defining, designing, and maintaining the organization's enterprise architecture, ensuring alignment between business strategy and IT infrastructure.About the Role:This role focuses on business, information, application, technology, and security architecture, while establishing...


  • Pretoria, Gauteng, South Africa beBee Careers Full time

    Job Title: Chief Information OfficerWe are seeking an experienced Chief Information Officer to oversee the management and development of our hospital's information technology systems.About the Role:Develop and implement IT strategies aligned with our hospital's objectives to enhance operational efficiency and patient care.Lead a team responsible for...


  • Pretoria, Gauteng, South Africa Pps Recruitment Full time

    The Chief Information Officer (CIO) is responsible for leading the organization's information technology strategy, ensuring alignment with business objectives to enhance member experiences, drive innovation, and maintain compliance with regulatory requirements.The CIO will oversee the development and implementation of secure, scalable, and efficient IT...


  • Pretoria, Gauteng, South Africa beBee Careers Full time

    Job DescriptionOverviewThe role of the Chief Agribusiness Strategist is to develop and implement a comprehensive business services strategy that aligns with the organization's mission and objectives. This involves engaging with key stakeholders in the fertilizer industry, including private sector players, financial institutions, development partners, and...

Chief Information Security Strategist

2 weeks ago


Pretoria, Gauteng, South Africa Alinta Tech Solutions Full time

At Alinta Tech Solutions, we are looking for a seasoned Cybersecurity Solutions Architect to join our team. In this role, you will be responsible for implementing and maintaining robust security protocols to safeguard our organization's data and infrastructure.

This hands-on position entails executing security strategies, as well as installing and configuring vital security apparatus, such as firewalls and intrusion detection systems.

The Cybersecurity Solutions Architect is essential in maintaining the integrity and security of our digital resources, ensuring they are shielded from potential cyber threats through diligent maintenance and proactive monitoring.

Key Responsibilities:

  1. Designing and implementing comprehensive security controls based on industry best practices and organizational guidelines.
  2. Configuring and managing security solutions, including firewalls, intrusion detection systems, anti-virus software, and data encryption.
  3. Identifying and remediating detected vulnerabilities in a timely manner.
  4. Responding swiftly to security breaches or incidents.
  5. Ensuring the continuous secure operation of our IT environment.
  6. Staying abreast of the latest developments in security technologies, threats, and countermeasures.

Areas of Responsibility:

  1. Security Implementation: Implementing security controls based on guidelines and designs provided by the security architect.
  2. Security Configuration: Configuring and managing security solutions, including firewalls, intrusion detection systems, anti-virus software, and data encryption.
  3. Vulnerability Remediation: Applying patches and modifications to fix identified vulnerabilities.
  4. Security Monitoring and Incident Response: Monitoring security systems for anomalies, responding to security incidents, performing initial analysis, and escalating as necessary.
  5. Compliance Checks: Resolving identified compliance issues from regular checks to ensure our systems comply with our security policies and standards.
  6. End-user Security: Implementing end-user security practices, like password management and access controls.
  7. Vendor Management Support: Coordinating with vendors to ensure the correct implementation and functioning of security systems.
  8. Updating and Upgrading Security Systems: Regularly updating and upgrading security systems in line with technological advancements and evolving threats.
  9. Training and Mentorship: Training team members on security operations, troubleshooting, and best practices.
  10. Staying Abreast of Emerging Technologies: Continually educating themselves on the latest cybersecurity trends, threats, and technology advancements to ensure our security measures are updated.
  11. Team Collaboration: Participating in cross-functional projects to enhance system integration and collaboration.
  12. Miscellaneous and General: Completing any assigned work-related duties and responsibilities.

Requirements:

  1. Knowledge Requirements:
  • Extensive understanding of cybersecurity protocols, principles, and best practices, particularly for enterprise and cloud infrastructures.
  • Expertise in managing, configuring, and troubleshooting security systems.
  • Proficiency in using assessment tools and techniques for vulnerability identification and remediation.
  • Familiarity with the protocols and procedures for responding to security incidents.
  • Good understanding of network and system security principles.
  • Knowledge of security controls for leading cloud platforms.
  • Understanding of IT compliance and security standards.
  • Awareness of the latest cybersecurity technologies and trends.
  • Knowledge of frameworks and processes such as ITIL.
Qualifications:
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • CISSP, CEH, or CISM certifications are preferred.
  • Credentials from AWS, Google Cloud, or Microsoft Azure are advantageous.
Experience:
  • Hands-on experience with security measures.
  • Experience in vulnerability detection and remediation strategies.
  • Deep experience with security protocols and technologies.
  • Experience in managing security incidents.
  • Skills in implementing network security measures.
  • Experience with compliance management.
Technical Skills:
  • Proficiency in using security tools.
  • Experience with vulnerability assessment tools.
  • Skills in managing network security protocols and systems.
  • Proficiency in scripting languages.
  • Understanding of encryption and secure communication technologies.
  • Ability to utilize tools for quick response to security breaches.
  • Familiarity with frameworks like ITIL.
  • Strong problem-solving abilities.
  • Excellent communication skills.
  • Strong team player with effective collaboration skills.
  • Commitment to continuous skill improvement.
  • High ethical standards and integrity in professional conduct.

We offer a competitive market-related salary and opportunities for career growth and development.