Snr Specialist: Cyber Security Engineer

Transnet SOC Ltd


Date: 1 day ago
City: Johannesburg, Gauteng
Contract type: Full time
Position Purpose Is Primary To Protect And Defend

Responsible for planning, implementing, managing, monitoring, and upgrading security measures to ensure that TFR digital eco-system of assets, technology, application systems, Industrial Internet of Things (IIoT) and information are protected against advanced and persistent threats, intrusion, and vulnerabilities and breaches.

Design and develop cybersecurity strategies, policies, processes, standards that are in line with best practices, which makes the organization more secure and less likely to fall victim to a cyber security event such as a breach or intrusion.

Responsible for the development and implementation of secure network solutions, carrying out assessments and penetration testing, managing audit/intrusion and security technology systems, architecting, and engineering/developing trusted systems into secure systems.

The incumbent must display an excellent understanding of technology infrastructures using Firewalls, VPN, Data Loss Prevention, IDS/IPS, Web-Proxy, and Security Audits.

Benchmarking of leading and industry best practise and technology trends to ensure that threat detection, response and remediation tools implemented are effective and enhance resilience to cyber threats in the ever-changing cyber threat landscape.

The position will also be responsible for analysing and managing threat hunting and insider threatsPosition OutputsStrategy Implement security standards and best practises for the TFR aligned to Transnet Cyber Security Framework, Policies and Standards. Provide input into the development and maintenance of the strategies, policies and standards for Information Security Benchmarking of leading and industry best practise and technology trends to ensure that threat detection, response and remediation tools implemented are effective and enhance resilience to cyber threats in the ever-changing cyber threat landscape. Ensure Cyber Security R&D (innovative security measures) supported by trend analysis is factored into the Business Plan Provide input to KPI’s

Information and Cyber Security Incident and Events Management (SIEM) Implementation of cyber defence infrastructure by building, installing, configuring and testing of dedicated cyber defence hardware. Conduct pre and post implementation security reviews and provide report for continuous improvement. Keep abreast of the Transnet Information security landscape and perform investigations into solution. Administer required testing, configuration of platforms managed by service providers. Create, edit and manage network access control list on intrusion prevention systems including firewalls. Identify potential conflicts with implementation of any cyber defence tools. Perform system administration on antivirus/audit and remediation including VPN

Implement infrastructure to enable Organisational policy requirements that are relevant to confidentiality, integrity, availability, authentication and non-repudiation. Align with Business Architecture team to ensure non duplication of efforts and required architectural standards are in place. Analyse the installation and use of the software such as firewalls, data encryption programs to ensure required resilience. Monitor and measure defence system performance including penetration testing. Troubleshooting security challenges and responding to all security breaches timeously. Execute Incident handling with precision.

Change Control Process Participate in the ICT change control process to ensure that changes and improvements in the operations environment are tested against security standard and architecture. Maintains documentation that relates to any deviations on the network, such as system audit trail against authorised user profiles to ensure implementation of the identity and access management protocols. Plan and execute upgrades and recommend solutions in line with change control processes to ensure that tools designed to protect the environment are refreshed in line with the latest supported versions and new security trends.

Network Monitoring and Response Responsible for processes designed to ensure that troubleshooting, identification of any unauthorized access, and provisioning of solutions cyber security tools and controls to ensure safe, secure, reliable and resilient environment. Engage in continually testing and monitoring technologies, systems and IToT environment, making sure that all the system’s defenses are up to date and working correctly. Investigate breaches and implement solid plans of incident response, learning from past shortcomings to create ever more robust security protocols Test, deploy, maintain and administer the infrastructure hardware and software to ensure the prevention from Cyber threats. Assess risk regularly and test systems to ensure they are protected from threats and vulnerabilities. Leads investigations and postmortem analysis in order to determine the root causes of vulnerabilities, intrusions and breaches in order to enhance security controls and measures.

Information and Cyber Security Programme Management Ensures implementation of automated systems designed to ensure effective and efficient security protocols. Ensures implementation of integration/orchestration of security infrastructure, standards, control measures and indicators with TFR Digital eco-system and existing landscape. Ensure collaboration with all ICTM programmes within TFR with the intent to detect and protect. Leads technical design reviews, integration, testing, and documentation for all security programmes/projects/initiatives. Responsible for technical advisory to research teams Leads the implementation of Support Cyber Operations and Response Management as well as the Cyber Security Incident Response Plans.

Policies and procedures Provide required Cyber Security Infrastructure Policy and ensure implementation for all projects including the Digital transformation Strategy. Development and updating of Information Security related policies and standards for existing and new technologies, including Business Continuity and Disaster Recovery. Ensure Implementation of regulation, laws, policies and ethnics as they relate to cyber security and POPIA All required businesses processes in support of function are documented and maintained with approved updates. Implement infrastructure to enable Organisational policy requirements that are relevant to confidentiality, integrity, availability, authentication and non-repudiation.

Reporting Ensures that all cyber threats/events are reported in line with the CSIR Plan. Create reporting template to ensure all stakeholders are kept abreast of the status of infrastructure protection/breaches. Document security breaches and highlight the business impact and extent of the damage with remedial action. Report cost benefit analysis for any recommended technology changes

People Management Understand and implement culture of high performance and Inspirational leadership style aligned to Transnet value system. Implement “plan, organise, lead and control. Motivate and provide energy to team and peers to allow for resilience when under attack Develop “on the job” learning and implement formal training programme. Build a culture of trust Develop and implement IDPs

Stakeholder Management Identify all stakeholders and build established relationships both internally and externally, show energetic support and communication supporting Cyber Defend Strategy and Resilience. Develop a relationship of trust and sharing with the Cyber Community (internally and externally). Create awareness with computer users and the environment at large with reference to good Cyber security practises. Provide reports as required by the organisation.

Governance/ Compliance and Risk Management Designs the required framework to support functional area and implement GRC for Cyber Security management. Conducts security assessments and authorisation requirements for dedicated Cyber defence systems within enterprise. Monitor statutory regulations, organisational standards, policies and procedures Amend if there are any changes in regulatory environment and communicate accordingly. Report any deviations identified and corrective measures. Address any audit related findings within stipulated time frame. Participate in Cyber Security awareness as per framework

Financial Management Manage related OPEX budget. Explain any deviations from planned and actual budget Submit required business cases for innovative continuous improvements projects that require funding be it CAPEX or OPEX

Qualifications and ExperienceQualifications:

  • IT National Higher Diploma, Bachelor’s degree in computer Science, Information technology, software, computer engineering, information systems or Cyber Security or related or equivalent field. Professional certification:
  • At least one of the following certifications from a professional body is a requirement, namely, CISSP, CISM, CISA, SSCP, ISSAP, ISSEP, ISSMP, CCSA.
  • ISO 27001 is an added advantage. Required Experience:
  • Minimum 5 years of experience in the Information Security field 1. Authentication 2. Security testing 3. Intrusion 4. Detection/ prevention 5. Incident response 6. Attacks and counter measures 7. Cryptography 8. Malicious code counter measures 9. System security 10. Network infrastructure 11. Access control 12. Assessments and audits 13. Organisation security Standard Job requirements:
  • Requirement of trust and honesty in the handling of finances as per the National Credit Act Amendment 19.
  • Must undergo Lifestyle Audit
  • Travel as required by business
  • Driver’s licenseCompetenciesFunctional/ Technical competencies:
  • TCP, Internet protocol, DNS
  • Dynamic host Configuration
  • Traffic analysis
  • Open system interconnection model
  • Information technology infrastructure library
  • Packet level analysis
  • VPN security
  • OS hardening techniques
  • VOIP
  • Jamming techniques
  • Computer coding, identifying anomalies or malicious malware, etc
  • Tuning sensors
  • Back up General Behavioural Competence:
  • Analytical, logical, structured and precise
  • Interpersonal skills
  • Motivate self and others
  • Innovative
  • Risk management
  • Attention to detail
  • Highly Alert
  • Quick thinker
  • Self-confident
  • Good communicator
  • Good listener Transnet Behavioural Competencies: Strategy & Sustainability 1. Formulates strategies and business plans to achieve the overall organisations direction. 2. Keeps abreast of internal and external factors that can impact the business. 3. Generates new ideas or solutions by thinking "outside of the box"; reviews current processes or systems and identifies ways to optimise them. Inspirational Leadership 4. Leads by example and empowers team members to do their best. 5. Provides clear direction and sets performance standards / requirements for the team. 6. Leads and directs change initiatives. 7. Leads and promotes equal opportunity and has an appreciation for diversity in the workplace. Business Performance and Delivery 8. Leads the business to be more efficient and effective. 9. Is decisive and takes full accountability for decisions. 10. Understands and deal with various business situation using obtained knowledge and a broad spectrum of expertise. 11. Thinks in a systemic way but is open to new approaches. Relationship Management 12. Communicates the business strategy and objectives in a clear manner. 13. Build wide and effective relationships with people inside and outside of the organisation to help achieve the organisations goals and objectives. 14. Leads by example; strives for a customer centric culture where everyone acts with the customer in mind. 15. Is able to persuade and influence those around him / her for the benefit of achieving the organisations / department goals and objectives. Identifies and influences key decisions makers using strong persuasive techniques and creates a strong personal impression that leads to buy in from others. Corporate Governance & Compliance 16. Always work in the best interest of the organisation and aligns business practices to the ethical oEquity StatementPreference will be given to suitably qualified Applicants who are members of the designated groups in line with the Employment Equity Plan and Targets of the Organisation/Operating Division.
Post a CV