We are the only company in South Africa that partners with the South African Reserve Bank to collect all new banknotes and coins for distribution. We work closely with our four shareholding banks and customers Absa Group Limited, First National Bank, the Standard Bank of South Africa Limited and Nedbank Limited. We use the latest technology to count and ...
Read more about this company
Description
Gather information related to Technology Transformation & Innovation
- Research the latest information technology security threats and trends globally and use this information to provide the management team with the required information to implement solutions to protect SBV’s data.
- Adopt the strategic direction provided in order to execute duties, providing feedback as and when required.
Conduct Analysis & Planning Activities
- Gather evidence required for security and vulnerability assessments, providing findings to the Information Security Analyst L2 for review and reporting
- Conduct investigation on uses of data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
- Analyse security breaches to determine their root cause providing one’s findings and recommendations to the Information Security Officer.
- Conduct log correlation in the event of a breach or suspected data loss incident for investigative purposes. Evidence gathering to be presented to the Information Security Officer in form of a report.
Provide input into the Design for your area of responsibility
- Create content and drive security awareness through facilitating orientation, educational programs, and ongoing communication
- Investigate security remediation tool sets that will allow for automation on system threats through software development or off-the-shelf tools.
- Compile a business case outlining the preferred toolset, submitting for approval to the Information Security Officer
- Proactively configure and monitor security alerts relating to incidents, and disasters to reduce likelihood
Implementation & Execution within mandate
- Support Information Security Analyst L2 to conduct internal and external security reviews by conducting interviews, running toolsets and consolidating the information to provide recommendations to close any potential gaps within the process and or system Identify and respond to threats to meet or exceed defined SLAs, escalating where need be.
- Mitigate the incident and provide accurate documentation around the resolution process.
- Verify authorized access by conducting reviews of logical access on systems.
- Monitor and remediate network, intrusion detection and prevention systems on a daily basis for security breaches and investigate and report to the Information Security Officer when a violation occurs
- Monitor the information security compliance against SBV’s standards and best practices.
- Gather information and prepare reports that document security breaches and system compliance within the landscape
Risk & Quality Management within one’s area of responsibility
- Conducts vulnerability testing, risk analyses and security assessments providing findings to the Information Security Analyst L2
- Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence
- Support the Information Security Analyst L2 to create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimization, playbooks, and exercise development.
- Assists with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate To be the point of contact that interface between vendors and business units during audits, assessments or security reviews as per mandate
- Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc) and/or legal requirements as it relates to securing of data Drive compliance regarding Information Security business continuity planning.
- Subscribe and align to SBV Services' ISO 9001:2015 Quality Management Standards, ensuring the department’s processes and quality management system is at all times in compliance with the standard
- Support SBVs ESG journey, reporting on and managing the ESG requirements to ensure a positive reflection and outcome
Create awareness of IT Security good practices to the relevant stakeholders through communication and training
- Provide system users with assistance guidance about new security products and procedures
- Drive compliance with Cyber security Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non-compliant staff
- Deliver security awareness through facilitating the orientation, educational programs, and on-going communication
- Develop, document and distribute how-to guides and update the internal knowledge base
Adhere to Process and Policy
- Monitoring of systems to drive 0 data material breaches and findings in Audits
- Drive the closure of audit findings departmentally providing regular feedback to the Information Security Officer
- Support with checks and monitoring of internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance
- Monitor and drive compliance with established security configuration standards and best practices. Verify compliance with established security configuration standards and best practice
Lead as an Ambassador and executor of Change.
- Act as a change management architect in periods of change to ensure business continuity.
- Manage the integration of business units into a seamless end to end solution for customers.
- Effectively communicate and embed new processes and procedures as they occur, addressing or escalating matters/ concerns to the SME’s (subject matter experts) when required.
- Facilitate the necessary presentations, workshops, or forums to ensure consistent and accurate information is given across one's portfolio
Requirements
- Bachelor’s degree in Information Security or similar.
- Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE ISO 27001 (advantageous)
- Communication will be limited to shortlisted candidates only.
- SBV recruitment is committed to transformation and diversity alignment
Requirements: Work Experience
- 2 Years’ experience within either an Information Security position or Cybersecurity, of which:
- 2 Years’ IT administration experience
- In-depth knowledge of Cloud security platform (MS Intune / O365 Security, etc.) (Advantageous)
- In-depth knowledge of Firewalls and Malicious Code Defense including APT (Advantageous)
- Knowledge of Cybersecurity technical assessments, standards, tools, and processes (Advantageous)
- Knowledge of common attack vectors (Advantageous)
- Knowledge of Vulnerability assessment tools (Nessus, Nmap) (Advantageous)
- Endpoint and network security tools/techniques (Advantageous)
go to method of application »
Description
Support Technology Transformation & Innovation in your area of responsibility
- Support with developing and maintaining Cyber Security Road Map and interventions
- Support with developing company-wide best practices for Technology security
- Support improving the maturity, or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions.
- Creates and maintain appropriate standard operating procedures for the Cyber Security and information protection.
Support on Analysis & Planning Activities
- Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and other factors that indicate security risks as per SLA.
- Researching, investigating and developing proficiency in current and emerging threats, vulnerabilities, and security technology developments.
- Play an active role in Technology Security Planning sessions, driving agenda and deliverables with all participants.
- Support managing Vendor Strategy and roadmap for Information Security
- Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate
- Assessment of the organisation's technology risk exposure and measurement of the various parameters that make up technology risks.
Support the Design for your area of responsibility
- Work closely with other stakeholders to design, architect, consult and implement security solutions to ensure readiness for security technologies
- In support of program design, gather client requirements and draft documentation in order to compile a draft project plan, only more complex programs need to be reviewed by the Information Security Officer
- Identify the desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects.
- Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated
- Drafts procedures and or policies with regards to cyber security submitting them to the Information Security Officer for review and authorisation.
Implementation & Execution within mandate
Monitor and analyse Cybersecurity operational services, including intrusion detection and prevention, situational awareness of:
- network intrusions.
- security events.
- data spillage; and.
- Incident response actions.
- Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans.
- Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management.
- Provide daily operational effectiveness reporting to the Information Security Officer
- Create and update weekly dashboard view of cyber risk ratings in the organisation.
- Prepare reports for circulation to the management teams related to investigations and treats for the month, this will also be rolled up into quarterly reporting.
- Support with managing vendor resource deliverables to ensure quality and consistency of services
- Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer
Risk & Quality Management within one’s area of responsibility
- Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer
- Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence.
- Guide teams throughout the organisation, imparting knowledge to enable employees to become Technology Security champions
- Create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimization, playbooks, and exercise development.
- Assists with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate
- To be the point of contact that interface between vendors and business units during audits, assessments or security reviews as per mandate
- Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc) and/or legal requirements as it relates to securing of data.
- Drive compliance regarding Information Security business continuity planning.
- Subscribe and align to SBV Services' ISO 9001:2015 Quality Management Standards, ensuring the department’s processes and quality management system is at all times in compliance with the standard
- Support SBVs ESG journey, reporting on and managing the ESG requirements to ensure a positive reflection and outcome.
Create awareness of IT Security good practices to the relevant stakeholders through communication and training
- Foster relationships within the organization in order to implement security interventions that are relevant to current business needs.
- Work across the organization to present contextual risk information to business colleagues, influencing strategic and operational decisions.
- Lead and collaborate on lessons learned and root cause activities, including incident response processes until closure with all relevant stakeholders.
- Drive compliance with Cyber security Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non-compliant staff
- Develops security awareness by providing orientation, educational programs, and on-going communication.
- Develop, document and distribute how-to guides and update the internal knowledge base
Adhere to Process and Policy
- Strives for 0 data material breaches and findings in Audits
- Drives any audit findings departmentally providing regular feedback to the Information Security Officer
- Manage internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance
- Create and maintain appropriate standard operating procedures for Information Security, including business continuity plans.
- Establishes system controls by developing a framework for controls and levels of access, recommending improvements.
- Comply with established security configuration standards and best practices.
Drive compliance of the audit framework
- Monitor and drive compliance against the audit framework. Logical access, physical access, change management, security controls (hardware, software and data levels). Implement additional processes, such as Segregation of Duties, Password Safes and Audit trails, to address the risk posed by privileged Technology users.
- Conduct reviews and assessments according to policies and standards set out (across PM Lifecycle and SDLC).
- Conduct internal and external security audits, providing recommendations to close any potential gaps within the process and or system
- Conduct technical security reviews and perform technical risk assessments.
Support the SBV United Ethos
- Act as a coach or guide to new employees within the department, peers and others
- Contribute to building a knowledge sharing culture within the department
- Where applicable, take the opportunity to upskill oneself on future skill sets and other roles with the department/SBV
Lead as an Ambassador and executor of Change.
- Act as a change management architect in periods of change to ensure business continuity.
- Manage the integration of business units into a seamless end to end solution for customers.
- Effectively communicate and embed new processes and procedures as they occur, addressing or escalating matters/ concerns to the SME’s (subject matter experts) when required.
- Facilitate the necessary presentations, workshops, or forums to ensure consistent and accurate communication is given across one’s portfolio.
Requirements
- 5 Years’ experience within either an Information Security position or Cybersecurity, which include protection against social engineering, or security vulnerability remediation, of which:
- 2 Years’ IT administration experience
- 2 Years’ Ethical Hacking experience
- In-depth knowledge of Cloud security platform (MS Intune / O365 Security, etc.)
- In-depth knowledge of Firewalls and Malicious Code Defense including APT
- Knowledge of Cybersecurity technical assessments, standards, tools, and processes
- Knowledge of common attack vectors
- Knowledge of Vulnerability assessment tools (Nessus, Nmap)
- Endpoint and network security tools/techniques
Requirement: Education
- Bachelor’s degree in Information Security or similar.
- Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE, ISO27001 (Candidates with certifications will be given preferential reviews)
go to method of application »
Description
- Responsible for the efficient and accurate end to end processing of cash in compliance with policies and procedures (SOPs). A Cash Processor may perform any one and/or a combination of the functions below.
Receive Cash
- Receive deposits and update on the applicable systems.Comply with all policies and procedures to eliminate any possible risks to the company and the customer.
Prepare Cash on the applicable system
- Check container/Bag for any damages or interferences and report all anomalies to Team Controller.Acknowledge container/bag on applicable system.Process all deposits in line with the agreed upon banks SLAs and SOPs on the applicable system.Prep workstation accurately for effective and efficient note counting.
Note Sorting
- Sort all prepped deposits/notes for (FDP/ACDP) on the same day, within the cut off times.Send rejected notes to the Reject Teller together with the PCD cards, deposit slips and stop loss bag to verify and balanceOperator to write a board (client name, date, denominations & number of bundles & operator name) & show it to the camera.Balance per deposit Report differences to the Team ControllerFill the production sheetThe technician to sign the downtime register on machine breakdownsEnd of day bundles to be verified by Team Controller.Daily balancing\reconciliation by Team controller
Reconciliation of ACDP deposits
- Perform a reconciliation of all notes rejected in order to validate the informationManually check all rejected notes for counterfeits, dye-stained and mutilated notesPerform cash transfers to vaultsPerform end of day balancing/ reconciliation of all cash receivedHandle all transactions including shortages and surpluses according to SOPs
Desktop deposit processing
- Check container/Bag for damage /tamper, report anomalies to Team Controller.Acknowledge container/bag on applicable system.All deposits must be kept separate per customer at all times and all deposits must be processed on the same day received by the customer.All deposits must be processed and balanced on the applicable systemPerform end of day balancing/ reconciliation of all cash receivedAll transactions, including shortages and surpluses must be handled according to SOPSAccurate prepping must be done to enable effective and efficient note counting
Sachet and Process Coin
- Process bulk coin deposits in accordance with SBV’s policies and ProceduresSort and process teller coin transfersWrite a board (client name, date, denomination and the operator names) & show it to the cameraReceive and verify the money(bins), check the seal, denomination and bin registerCount out the bags to balance with the bin page and denominationCut the bags open to fill the wagonClear jams on the machinesBalance the money per client / depositReport differences to the Team ControllerPerform end of day balance/ reconciliation
Bank system integrated deposit processing
- Validate all transactions linked to system integrations as per banks SLAInform client services of account numbers not linked to bank system to avoid delays in crediting the customerVerify deposit account number to eliminate losses or mispostsEscalate system downtime/delayed batches to team controller
Payroll and change
- Payroll / change transactions must be processed in accordance with SLA per customerReport all discrepancies to the Team Controller timeouslyFloats must be sealed in drop safe bags along with float packing slips and placed into trolleys as per client requirementPayroll entries to be processed within the banks SLA timeframesMaintain all equipment by reporting any defects on equipment to the Team ControllerObtain banks authorization prior to despatching as per SOP
Prepack/Treasury
- Assist with the accurate packing and unpacking of Bank and ATM Cash.Manage consumables in line with packing requirements.Confirm that the bag and Seal numbers are properly recorded.
Manage Equipment
- Utilise equipment according to Standard Operating Procedures (SOPS), protecting and taking care of company assets, e.g. cleaning of the machines before the shift starts and after the shift ends
Governance
- Subscribe and align to SBV Services' ISO 9001:2015 Quality Management Standards, ensuring the department’s processes and quality management system is at all times in compliance with the standard.Support SBVs ESG journey, reporting on and managing the ESG requirements to ensure a positive reflection and outcome.
Drive the organisation culture
- Drive the department’s values while inspiring confidence and generating excitement, enthusiasm and commitment towards the mission.
Lead as an Ambassador and executor of Change
- Act as a change management architect in periods of change to ensure business continuity.Manage the integration of business units into a seamless end to end solution for customers.Effectively communicate and embed new processes and procedures as they occur, addressing or escalating matters/ concerns to the SME’s (subject matter experts) when required.Facilitate the necessary presentations, workshops, or forums to ensure consistent and accurate communication is given across one’s portfolio.
Requirements
Minimum Requirements: Work Experience
- 6 months previous cashier/teller experience: Advantageous
Minimum Requirements: Education
- Grade 12 with Maths Literacy
Method of Application
Use the link(s) below to apply on company website.
Build your CV for free. Download in different templates.