Position Summary

Campus: Auckland Park Kingsway Campus
Remuneration: Market Related
EE position: EE/AA
Level: Senior

Introduction

The University of Johannesburg (UJ) is a vibrant and cosmopolitan university anchored in Africa and intent on global excellence and stature. With an emphasis on independent thinking, sustainable development and multiple partnerships, UJ is an international university of choice. In a major shift towards aspiring to greater heights and Global Excellence and Stature, UJ has committed an additional R700 million over the next seven years towards enriching and deepening our academic profile, and developing UJ as the pan-African epicentre of critical intellectual inquiry.

Job description

  • Manage information Security related incidents and breaches, errors and complaints on UJ systems.
  • Working with Qualys Vulnerability Management, Web Application Scanning and Forti analyser critical information on threats across the entire attack surface.
  • Implement Endpoint Protection and Encryption.
  • Conduct annual security reviews (Penetration testing, IT audits) to determine the security posture of UJ systems and ensure implementation of remediation actions and plans.
  • Maintain the UJ Continuity and Disaster recovery plans.
  • Conduct regular disaster recovery testing to provide assurance.
  • Ensure that all Information Security policies and procedures are followed according to the UJ requirement.
  • Provide sound security advice to our clients.
  • Report on security incidents and threat outlook for the university.
  • Prepares reports on internal and external service provider security related services.
  • Assist departments that are struggling to remediate vulnerabilities.
  • Creation of hardening Standards for ICS department.
  • Work as part of the cyber team to ensure Cyber security awareness campaigns, and the ICT risk registers are maintained. 

Minimum requirements

  • Relevant Information Technology Qualification (NQF Level 7). (B-Tech or Degree)
  • 3 - 6 years of experience in Information Security field.
  • Relevant Security Courses is an advantage.
  • Security , SSCP, CEH, CISM, CISSP or similar information security professional certifications
 
Recommendations:
  • Working experience in the Higher Education sector
  • Good understanding of complex IT systems and stay up to date with the latest security standards, systems and protocols, as well as best practice security products.
  • Excellent knowledge of cloud technologies, information security technology such as firewalls, intrusion detection systems (IDS), data leakage protection (DLP), access management, anti-malware, and SIEM technologies.
  • Knowledge of various Information security domains
 
Experience and Knowledge:
Experience
  • Information Security Management (3 Years)
  • Working in the IT Field (5 Years)
  • Dealing with a diverse client base
  • Supervise and Direct IT personnel
  • Endpoint Protection and management
  • Patch management and vulnerability assessment
  • ICT Governance frameworks and implementation
 
 
Knowledge
  •  ITIL Knowledge
  • Working knowledge of Internet technologies including routers and switches
  • Working knowledge of Audio Visual and End-User Computer Technologies
  • Working knowledge of Enterprise Systems and IT Infrastructure
  • Working knowledge of Qualys, Cofense,
·         
 
Competencies and Behavioural Attributes:
Essential Skills/Competencies
 
  • Good analytical and problem-solving skills
  • Knowledge of current cyber security threat landscape, risks and protocols
  • Willingness to work after-hours when necessary
  • Ability to work independently
  • Ability to see the bigger picture
  • Excellent interpersonal and communication skills – both verbal and written.
  • Ability to effectively document solutions, process and procedure.
  • Demonstrated ability to work in teams with a collaborative interpersonal style.
  • Strong problem-solving ability/logical thinker..  
  • Pay attention to detail and solution orientated.  
  • Strong desire to learn and deploy new security technologies and processes.
  • Complete own training and development objectives as per agreed timelines in the personal development plan.
  • Analysing and optimizing existing security problem.
  • Ability to understand security requirements.
  • Self-confident and assertive.
  • Able to multi-task and able to cope under pressure.
  • Must be organised and able to prioritize duties and responsibilities
  
Behavioural Attributes:
  • Working together
  • Demonstrates and Proactively enables and encourages teamwork
  • Communication & influencing
  • Proactively builds relationships and generates effective discussion and mutual support for plans and ideas
  • Managing Knowledge
  • Proactively seeks out new knowledge sources Uses and shares knowledge effectively
  • Striving for excellence
  • Sets and measures challenging objectives for self and others
  • Gives evidence-based feedback that helps others to excel
  • Managing Resources
  • Finds creative and innovative ways to allocate and utilize resources.
  • Thinking Strategically
  • Decisive, Takes a big picture view, Coaches others to consider long-term impact, and to consult within and beyond ICS.
  • Delivering Results
  • Plans and manages appropriately; holds self and team accountable for achieving goals.
  • Critical Thinking
  • The ability to think clearly and rationally about what to do, including the ability to engage in reflective and independent thinking.
  • Service and Task Orientated
  • The ability and desire to anticipate, recognize and meet others' needs focusing on the completion of particular tasks as a measure of success
         
 
Working Hours: All Campuses
Monday – Friday 7:30 to 4:00
 
ENQUIRIES REGARDING THE JOB CONTENT:  Glaudina Croukamp on 011 559-3467 or at glaudinac@uj.ac.za

 

Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.

If you require technical support / assistance on the UJ e-recruitment website, please contact our service provider PNET on the following contact details: 0861 227337/010 140 3099 or email ujsupport@pnet.co.za

Candidates may be subjected to appropriate psychometric testing and other selection instruments.

In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.

 

Our website uses cookies so that we can provide you with the best user experience. By continuing to use our website, you agree to our use of cookies.