Equals
Key responsibilities
- Work as part of a software development team to develop quality solutions and services.
- Share knowledge and insight whenever possible.
- Develop strong relationships with key personnel from other teams across the organisation.
- Communicate clearly and efficiently with all stakeholders.
- Monitor, triage and investigate security events, incidents and vulnerabilities.
- Support the response, reporting or escalation of security incidents.
- Assist in the prioritization of vulnerabilities through a risk-based approach.
- Communicate the results of investigations and risk mitigation outcomes, supporting the organization and clients to improve and maintain a robust response to new threats and attack vectors.
- Support the team with scoping, architecture development and project implementation of various security solutions.
- Collaborate with stakeholders to manage vulnerabilities and undertake remediation activities.
- Communicate common mitigation strategies such as patching and basic configuration change (system hardening).
- Contribute to the review and interpretation of penetration test reports and contribute to remediation action plans.
Learning outcomes
- Technical architecture development of security solutions to meet customer requirements.
- Vulnerability management and penetration testing.
- Security solutions design and implementation.
Required skills
- Strong interpersonal skills and ability to learn on the job.
- Ability to work independently and as part of a team.
- Passionate and interested in cyber security.
- Broad understanding of networking principles.
- Broad understanding of various operating systems.
- Flexibility to adapt to an ever-changing digital landscape.
- Self-motivated with the ability to learn new concepts and skills quickly.
- BSc in Computer Science or in related fields.
- Ability to maintain professional certifications in the field.
- Knowledge of DevSecOps an added advantage.
Desirable skills
- Familiarity with cyber security principles.
- Familiarity with security or compliance standards.
- An understanding of the WASP top 10 vulnerabilities.
- An understanding of incident response.
- An understanding of threat and vulnerability management.
- A professional certification is an added advantage.
- Familiarity with DevSecOps and the SDLC.
Remuneration
- A competitive remuneration will be communicated to selected candidates.