Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 29, 2024
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    As an African oil company with a history dating back to 1897, we’ve spent every decade since then enriching the lives of the continent’s people. We’ve done this by identifying opportunities, finding innovative solutions, and providing energy that fuels Africa’s growth. It’s why we now hold presence in 17 countries in sub-Saha...
    Read more about this company

     

    Graduate Trainee - Cape Town

    What you’ll have done before:

    • ID
    • Matric Certificate
    • Completed Qualification (Certificate of degree) Bachelor of Commerce in Business Management/ Business Administration/ Human Resource 
    • Academic transcript (Statement of Results)
    • Please provide us with a contactable reference.
    • This can be your Spiritual / Religious / Community leader, former University Lecturer / School Principal or Employer.

    go to method of application »

    Principal Architect - Cybersecurity - Cape Town

    What You'll have done before:

    • Bachelor's or Master's degree in Computer Science, Information Technology, or a related field.
    • Certified Information Systems Security Professional (CISSP) or equivalent certifications preferred.
    • Proven experience in IT infrastructure and cybersecurity, with a minimum of 10 years in a leadership role.
    • Strong knowledge of cybersecurity technologies, tools, and best practices.
    • Excellent communication and leadership skills.
    • Exceptional problem-solving abilities.
    • Exciting Challenges you might face in the role
    • Advanced Threat Landscape: Staying ahead of constantly evolving cyber threats and devising strategies to protect against sophisticated attacks.
    • Balancing Security and Usability: Finding the right balance between robust security measures and ensuring a seamless user experience.
    • Regulatory Compliance: Ensuring that the organization complies with changing cybersecurity regulations and standards, which can be complex and demanding.
    • Incident Response: Leading effective responses to security incidents or breaches, which can be high-pressure situations.
    • Integration of New Technologies: Securing emerging technologies, such as IoT and cloud, and integrating them into the existing security framework.
    • Resource Constraints: Maximizing cybersecurity effectiveness within budget limitations.
    • Vendor and Tool Selection: Choosing the right cybersecurity tools and solutions from a vast array of options.
    • Employee Training: Ensuring that employees are well-informed and trained to recognize and respond to security threats.
    • Crisis Management: Handling major security breaches and their implications, including legal and public relations challenges.

    What You'll be doing

    • Cybersecurity Strategy: Provide input into developing and implementing a robust cybersecurity strategy, aligned with industry best practices and business goals. 
    • Security Architecture: Design, maintain, and evolve the security architecture to safeguard digital assets and data. 
    • Risk Management: Identify and assess cybersecurity risks and vulnerabilities, implementing proactive security measures and risk mitigation strategies. 
    • Incident Response: Part of the Leadership team to lead incident response teams in the event of security incidents or breaches, ensuring timely and effective resolution. 
    • Compliance: Ensure that the organization complies with industry standards, data protection regulations, and cybersecurity laws. 
    • Security Solutions: Evaluate, select, and deploy cybersecurity solutions, including firewalls, intrusion detection systems, encryption, and vulnerability management tools. 
    • Vendor Management: Manage relationships with IT vendors and service providers, ensuring service level agreements are met. 
    • Team Leadership: Lead and mentor the IT Cybersecurity technology implementation and operations team, fostering a culture of excellence and accountability. 
    • Budget Management: Provide input into the IT budget and lead sourcing, ensuring efficient allocation of resources. 

    Method of Application

    Use the link(s) below to apply on company website.

     

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Engen Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail