Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Jan 13, 2020
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    The Mr Price Group (MRPG) is a fashion value retailer, selling predominantly for cash. The Group retails Apparel, Homeware and Sportsware and is one of the fastest growing retailers in South Africa. Our History: 1885 - The first John Orrs store opens 1934 - The first Hub store opens 1952 - John Orrs is listed on the JSE 1967 - Acquisition of two Miladys s...
    Read more about this company

     

    Security Architect

    The IT Security Architect role secures information by determining security requirements; planning, implementing, and testing security systems; preparing security standards, policies, and procedures; mentoring team members.

    You will be responsible for ensuring that the populated architecture framework is appropriate in the context of the business environment.

    Want in? Our skills requirements below for this role are quite specific as we want the right person in our awesome team!

    • Bachelor’s degree or higher, specializing in Information Security or related fieldsCertified Information Systems Auditor (CISA) , CISSP (Certified Information Systems Security Professional) certification , Certified Information Security Manager (CISM) or similar
    • Payment Card Industry Data Security Standard (PCI-DSS) experience
    • Minimum 5 years related experience in the field of Information Technology, Information Security or Cyber Security Architecture and Project management. TOGAF - advantage
    • Generates new ideas, challenges the status quo, takes risks, supports change, encourages innovation, solves problems creatively
    • Strong leadership and negotiation skills with business and technical groups
    • Demonstrated ability to build consensus amongst stakeholders
    • Ability to establish, implement and enforce appropriate IT standards to meet business requirements

    Detailed day to day tasks may look like…

    • Enhances security team accomplishments and competence by planning delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members.
    • Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
    • Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards.
    • Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation.
    • Verifies security systems by developing and implementing test scripts.
    • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
    • Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
    • Prepares system security reports by collecting, analysing, and summarizing data and trends.
    • Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
    • Enhances department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments.
    • Responsible for the activities related to the design, development and maintenance of the IT Architecture, roadmaps and blueprints
    • Researches overall ICT solutions on the market for particular technical requirements and business needs
    • Conducts and/or actively participates in meetings related to the designated project/s, both locally and internationally
    • Envision, design and implement architecture strategies, processes and methodologies to ensure a consistent framework is applied across the Group
    • Leads and directs the analysis, evaluation and development of Security long-term strategic and operating plans to ensure that the architecture objectives are consistent with the enterprise’s long-term business objectives
    • Manages and facilitates Security Design Board to evaluate project proposals and architectural fit
    • Establishes and leads an optimal governance structure and compliance activities
    • Shares best practices, lessons learned and constantly updates the technical system architecture requirements based on changing technologies, and knowledge related to recent, current and upcoming vendor products and solutions
    • Collaborates with all relevant parties in order to review the objectives and constraints of each solution and determine conformance with the architecture. Recommends the most suitable technical architecture and defines the solution.
    • Identifies and recommends areas appropriate for further study and participates in any Proof of Concept projects required to thoroughly investigate architectural possibilities and strengthen arguments for their adoption
    • Identifies implementation risks and analyses potential impact on the Security and on the achievement of scheduled objectives
    • Participates in the design and implementation of IT service management standards, tools and methodologies
    • Keeps current with technology updates to ensure technology opportunities are leverage and adds value to the business

    Method of Application

    Interested and qualified? Go to Mr Price Group on www.linkedin.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Mr Price Group Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail