Security Specialists, Digital Security

Corporate Enablement | Digital Services & Solutions | Grade 4

Competencies
Hover on any of the competencies below to view a detailed description.
Core Competencies
Proficiency Levelsicon
Intrapreneurship
Critical Thinking and Data-Driven Decision Making
Facilitates Collaboration and Influence
Learning Agility
Digital Savviness
Results-Driven Outcomes
Public Service Excellence
Leading Change
Technical Competencies
Proficiency Levelsicon
Enterprise and Solution Architecture
Foundational
Emerging Technology Synthesis
Intermediate
IT Governance and Standards
Intermediate
Cyber Risk Management
Intermediate
Data Ethics and Governance
Intermediate
Security Architecture
Intermediate

Potential Movements
Corporate Enablement
Digital Services & Solutions
3
Lateral Arrow
13 Lateral Movements
Lateral Arrow
13 Lateral Movements
Vectical Movement Arrow
4
Lateral Arrow
14 Lateral Movements
Key Accountabilities
  • Analyze technical needs, requirements and current state of infrastructure to support development of offensive and defensive information security and cybersecurity solutions.
  • Collect and perform real-time analysis of security log data and monitoring alerts from digital security systems to produce threat intelligence reports and provide an accurate depiction of the current threat landscape and risks.
  • Develop custom disaster recovery drills and simulation tests and support vulnerability assessments and penetration testing to ensure infrastructure components, systems and applications meet security standards.
  • Provide technical support in the implementation of digital security solutions inclusive of installation, configuration and routine maintenance of security systems and maintain documentation of all activities and findings.
  • Respond, investigate and determine root causes of security incidents and prepare incident reports to document key insights and impact of security incidents and recommended mitigation actions.
  • Conduct research on emerging information and cybersecurity related technologies and best practices to support recommendations for security products, services and procedures to enhance system architecture designs.
Preferred Experience And Exposure
  • Proven working experience in cybersecurity operations with exposure in managing cybersecurity incidents, threats, programs and analytics.
  • Proficient working knowledge in cybersecurity asset protection and familiar with cybersecurity best practices, compliance and cybersecurity regulatory requirements.
  • CISA, CISM, CISSP, CRISC, and / or CGEIT certifications are an added advantage