Salary
R0 - R0 (PER MONTH)
Datafin
Salary
R0 - R0 (PER MONTH)
Location
Cape Town
Role
Cybersecurity Specialist (CPT Hybrid)
Job type
Permanent
Work setup
Remote
Closing date
07 May 2026
Cybersecurity Specialist (CPT Hybrid) Engineering/Technical ~ IT - Software Development ~ IT - InfrastructureCape Town - Western Cape - South Africa ENVIRONMENT: A reputable Financial Services Group seeks the technical expertise of a Cybersecurity Specialist with at least 5-10 years experience in a technical hands-on administrative or engineering role responsible for Cybersecurity toolsets. Your role will include specifying the parameters that the security solutions require to function properly, contributing to the engineering of the security solutions, carrying out operations with the support of the security solutions, operating the security solutions in functional and technical terms, and providing help and support to users. Your Cybersecurity toolset knowledge should include IAM, PAM, Firewall, NAC, WAF, DDoS, MFA, MDM, Endpoint Protection, DLP, Vulnerability Scanning, AD, Windows OS, Linux OS, Network and Wi-Fi Administration. DUTIES: Implementation of business enablement through securing IoT, 5G and Edge Computing. Develop and implement security architecture strategies encompassing traditional network and micro segmentation, defence-in-depth, remote access, encryption technologies, backup and replication, Software Defined Networking (SDN), network function virtualization, zero trust models, Secure Access Service Edge (SASE)/Secure Service Edge (SSE), and overlay networks and secure enclaves. Management of risk by conducting risk assessments and Penetration Testing. Ensure security operations resilience through threat prevention involving network and application firewalls, assess management, SaaS detection, and encryption (SSL, PKI). Ensure security operations resilience through threat detection, including log analysis and correlation, threat hunting, insider threat detection, integration with Managed Security Service Providers (MSSP), integration of Threat Intelligence Platform (TIP), utilisation of deception technologies for breach detection, full packet inspection, and detection of misconfigurations. Management of identities by providing oversight of identity credentialing, account creation and deletion, Single Sign On (SSO), and privileged access mana...
Sponsored