Cybersecurity Strategist
2 months ago
Centurion, Gauteng, South Africa
Future Africa Consulting (Pty)Ltd
Full time
Job Description:About the Role:FUTURE AFRICA CONSULTING (PTY) LTD is seeking a highly skilled Information Security Specialist to join our team. As a key member of our IT department, you will be responsible for developing and implementing information security services and initiatives that align with our IT strategy and enterprise architecture.
Key Responsibilities:- Information Security Services: Develop and maintain information security services capability and initiatives to support IT strategy and enterprise architecture planning.
- Advisory and Management: Advise on and ensure the effective management of information technology and business processes access, and communicate feedback to enable associated security risk management.
- Vulnerability Management: Perform vulnerability testing and scanning, and report on TCTA's vulnerability profile and recommendations to improve the profile.
- Analysis and Compliance: Analyze related information/reports to identify discrepancies and anomalies, recommend remedial action, and ensure compliance to security policies and standards.
- Policy Development: Develop and/or align information security policies to identify and manage risk exposure.
- Risk Mitigation: Mitigate risk by ensuring that proper IT security and information management measures are in place.
- Security Audits: Perform security audits and clean-ups to ensure accurate and up-to-date access within TCTA.
- IT Applications and Infrastructure: Understand IT applications and infrastructure in alignment with policies and procedures.
- Information Security Principles: Document the information security principles and guidelines for application software, as well as standards that should be adhered to for each product.
- Security Requirement Specifications: Develop information security requirement specifications prior to the procurement or implementation of new systems and technology to ensure alignment between business goals and supporting system functionality.
- Information Security Architectural Repository: Maintain the Information Security Architectural repository to ensure consistency between applications and systems.
- Environmental Awareness: Ensure currency of systems and technology by maintaining an environmental awareness.
- Life-Cycle Management: Provide guidelines for the development of life-cycle management strategies for systems and technology in conjunction with major stakeholders to ensure business continuity.
- Security Risk Management: Manage information security risks and issues, and escalate where necessary.
- Research: Research and develop leading practices for the Information Security function.
- Benchmarking and Analysis: Benchmark and analyze trends to optimize internal processes.
- Business Engagement: Engage with business units to proactively (and reactively) provide solutions, advise TCTA's management and other stakeholders in their relevant area of expertise.
- Best Practice Benchmarking: Benchmark TCTA's Information Security Architecture with local and international best practice and applications at other organizations.
- Project Identification: Identify strategic projects that need to be undertaken in the Information Security function.
- Project Planning: Prepare project definitions and detailed plans with the PMO.
- Project Implementation: Drive and support the implementation of specialized areas initiatives and strategic projects that address the needs and expectations of TCTA's stakeholders.
- Functional Requirements: Document functional requirements and specifications for new information security solutions.
- Progress Monitoring: Monitor and report on progress against functional initiatives.
- Compliance Reporting: Monitor and report on compliance with information security policies, procedures, and controls.
- Governance and Institutional Governance: Promote sound institutional governance, participate in required governance structures, and serve as a member on the required forums.
- Functional Performance Reporting: Compile reports on the functional performance at the required intervals, reflecting all relevant statistics, e.g., monthly/quarterly cybersecurity report.