ICT Network Security Officer
Gauteng Partnership Fund
2024/08/30   JHB North


Job Reference Number: GPF-60
Department: Corporate Services
Industry: Professional
Job Type: Permanent
Positions Available: 1
Salary: Market Related
The incumbent is expected to build and manage network and security systems for the organization’s networks. Identifying networks and cyber security risks and mitigating them through the deployment of technologies, processes, and user awareness programs.
Job Description
  1. JOB PURPOSE

The incumbent is expected to build and manage network and security systems for the organization’s networks. Identifying networks and cyber security risks and mitigating them through the deployment of technologies, processes, and user awareness programs. The role is also responsible for reporting on security breaches and defending systems against cyber threats such as flaws, viruses, and hacking attempts.  defends systems against cyber threats such as flaws, viruses, and hacking attempts.

KEY PERFORMANCE AREAS

The incumbent is expected to deliver on the following detailed key performance areas:

 

  1. Network and Security project implementation
    1. Responsible for the upgrade of network and security hardware equipment
    2. Documentation and project scheduling
    3. Project resource management
    4. Reporting

       

  2. ICT Security and Network operations (To ensure early detection of all network and cyber threats.)
    1. Responsible for conducting continuous scanning and security monitoring of all IT cybersecurity domains, i.e., Networks, Firewalls, Anti-virus, Mobile devices, and Patch management.
    2. Maintaining LAN, WLAN, and security architecture of the server as per the IT policy
    3. Generating and maintaining the virtual private network, firewalls, web protocols and email security domains
    4. Resolving the existing network and security issues including hardware malfunctions
    5. Maintaining & implementing SOPs for Network security
    6. Perform continuous threat and vulnerability management monitoring.
    7. Responsible for analyzing and assessing potential security risks and developing plans to deal with such incidents.
    8. Makes recommendations based on various monitoring outputs to improve the security posture of the organization.
    9. Monitoring of web security gateways, perimeter security, network access controls, endpoint security

       

       

       

  3. Network and Security policies and frameworks (To ensure the integrity of the IT environment and to drive compliance across the GPF.)
    1. Ensures that the network and security architecture meet all the requirements in line with the overall ICT strategy of the organization and cyber security requirements.
    2. Manages the dependencies between the various areas of the business and ensures that various security components are aligned.
    3. Develops and Implements GPF ICT policies and programs and ongoing activities to preserve the availability, integrity, and confidentiality of the information resources in compliance with applicable security governance and standards.
    4. identifies and Implements suitable toolsets to manage the network and security environment

       

       

  4. Network and Cybersecurity (To ensure that any threats to the ATNS network, systems, and applications are mitigated.)
    1. Operates and controls the Information Security Management System (ISMS).
    2. Implements key Information Security projects.
    3. Conducts information gathering on internal and external security intelligence for an investigation into security incidents.
    4. Investigates, responds, and actions information security incidents.
    5. Responsible for writing incident reports and submitting them to Senior Management for decision-making purposes.
    6. Selects, applies, and ensures adherence to good information security practices.
    7. Ensures internal and external suppliers and partners implement security to the required standard and maintain positive relationship with vendors.
    8. Ensures that all IT risks are mitigated and addressed.
    9. Responsible for investigation into incidents related to recovery of deleted files, analysing and interpreting data linked to crime, analysing mobile telephone records and uncovering links between events, groups and individuals through pursuit of data trails.
    10. Maintains detailed records of investigations to be used as evidence in internal disciplinary hearings as well as court of law.

       

       

  5. Governance (To ensure compliance to ATNS IT Security policies.)
    1. Responsible for compliance of the security policy through effective management of security events.
    2. Manage and comply with all IT policies, procedures and standards relating to IT security systems.

       

       

  6. Manage configuration and change control records with regards to IT network and security system activities. (To ensure business continuity as well as continuous improvement of IT processes.)
    1. Develop metrics that allow the enterprise to gauge the success of security system investments.
    2. Ensure and report on IT DR exercises that are conducted with business on all IT systems as well as make recommendations for continuous improvement in order to ensure business continuity.
    3. Develop and review current disaster recovery management plan.
    4. Conduct/ review and sign-off on IT Security audits.
    5.  Signoff on all IT change requests and communicate changes to organisation

       

       

  7. Budget Management
    1. Compilation of CAPEX and OPEX budgets for all networks and security activities
    2. Management reporting
    3. Drafting of business cases for procurement processes
    4. Maintains and manages proper records of all budget information

       

  8. General Duties
    1. Daily reporting.
    2. Analysing targets.
    3. Meeting with department heads.
    4. Managing and coordinating monthly reporting, budgeting and reforecast processes.
    5. Providing back-office services

       

  9. Teamwork
    1. Ability to work closely with others
    2. Being pro-active in assisting others
    3. Contribution to business unit meetings and brain storming sessions
    4. Mentoring and coaching of interns and peers
Job Requirements
  1. APPOINTMENT REQUIREMENTS
    • Any Information Technology degree or any IT-related NQF level 7 qualification
    • Good FortiGate, Forti Analyzer, and other Fortinet Product experience
    • At least 3 to 5 years’ experience with network security experience
    • Minimum of 3 years’ experience with firewall technologies
    •      NSE4Certification  will be an advantage

 

 

Closing Date: 13 September 2024