Graduate Live Internship Jobs and Bursary
  • Home
  • About Us
  • Contact Us
  • Terms and Conditions
  • Disclaimer
  • Cookie Policy
  • Privacy Policy
  • Home
  • Bursaries
  • Internships
  • Learnerships
  • Jobs
  • Government
  • Retail Jobs

Sunday, July 20, 2025

SECURITY DEFENSE AND OPERATION LEAD

 July 20, 2025     JOBS     No comments   

Closing Date

2025/07/25

Number of Reference

6 AEC250710

The main office of Pillar

Chief of Security Defense and Operations

Permanent Job Type

DU Job Grade

Position count: 1

Town/Site Woodmead is the location.

Province: Gauteng

The Nation of South Africa

Job Description

Job's Objective

To oversee the operational defense of the AECI's digital infrastructure by coordinating incident response, administering vulnerability remediation, and enforcing essential security measures.

The primary responsibility of this position is to guarantee that hazards discovered by the v Security Operations Center (SOC) are immediately addressed, security breaches are handled, and network and endpoint protections are constantly improved.

In addition to assisting in compliance with internal and external security standards, the position is essential to reducing cyber risk exposure and protecting business continuity.

Important Inside Stakeholders

• IT Infrastructure and Operations Teams – for coordinating patching, vulnerability remediation, and endpoint protection.

• Service Desk – used to handle incident response procedures and report security warnings.

• Vulnerability Management and SOC Providers – for threat detection, alert triage, and vulnerability scanning.

• DevSecOps and Application Security Teams: for incorporating response playbooks and promoting safe development methods.

• Risk & Compliance Team – for ensuring that incident response complies with audit and compliance standards.

Important External Stakeholders

• Third-party security providers, such as those that offer vulnerability scanning, SOC, and EDR services.

• Managed Security Service Providers (MSSPs) for outsourced monitoring or incident assistance, where appropriate.

• Regulatory agencies and auditors throughout incident response evaluations or security audits

Input of Key Performance Areas

• Threat intelligence and SOC alerts lead incident remediation for threats identified by the virtual Security Operations Center (SOC), ensuring timely and effective containment and recovery.

• Internal IT coordination and external vulnerability scans Coordinate vulnerability remediation, making sure that vulnerabilities are tracked, prioritized, and addressed in conjunction with IT teams.

Verify the resolution of security events and the completion and efficacy of patching operations by reviewing patch reports and security incident logs.

• Vulnerability management processes Increase response efficiency and minimize false positives by optimizing alert handoffs and reporting procedures.

• Network segmentation tools and endpoint detection and response (EDR) systems Maintain and monitor important security measures, ensuring ongoing protection and adherence to security standards.

• Monitor third-party performance and ensure that service providers fulfill their contractual obligations and service levels in terms of vulnerability management and vSOC.

• Threat situations and operational procedures Create and maintain unified response playbooks for technical teams, allowing for a consistent and quick reaction to events.

Experience and Skills

• A bachelor's degree in computer science, information technology, information security, or a similar subject.

• Well-known cybersecurity credentials, like the one given by the industry:

• Professional Certification in Information Systems Security (CISSP)

• GIAC-certified Incident Handler (GCIH)

• CEH (Certified Ethical Hacker)

• CompTIA Security+ or CySA+

• Microsoft certifications that correspond to threat response and security operations:

• SC-200: Microsoft Security Operations Analyst – with a concentration on utilizing Microsoft Defender and Sentinel to identify, analyze, and respond to threats

• SC-300: Microsoft Identity and Access Administrator – important for IAM and access control integration

• SC-900: Microsoft Security, Compliance, and Identity Fundamentals – Basic understanding of Microsoft security and compliance technologies

• Prior experience with Microsoft Defender for Endpoint, Microsoft Sentinel, and other Microsoft 365 security solutions is quite beneficial.

• More instruction in incident response, vulnerability management, and EDR platforms is advised.

• 6–10 years of progressive experience in cybersecurity operations, including practical incident response and threat mitigation.

• Verified knowledge of managing or collaborating closely with a virtual Security Operations Center (SOC) and vulnerability management systems.

• A solid foundation in vulnerability mitigation and patch management coordination among infrastructure and IT staff.

• Knowledge of managing and enhancing network segmentation controls and endpoint detection and response (EDR) solutions.

• Proven capacity to create and put into practice incident response playbooks and operational processes.

• Experience in managing and assessing the effectiveness of outside security service suppliers.

• Prior exposure to enterprise IT environments, ideally with hybrid cloud infrastructure, Active Directory, and SAP.

Individual Qualities

• Leading the incident response and remediation effort

• Patch lifecycle coordination and vulnerability management

• Implementation and improvement of security controls (such network segmentation and EDR)

• Automating and designing the workflow for handling and reporting SOC alerts

• The creation of technical writing for response strategies and playbooks

• Knowledge of remediation methods and vulnerability scanning tools

• Understanding of network security architecture and endpoint protection systems

• Understanding of cybersecurity frameworks like NIST and MITRE ATT&CK

• Knowledge of how the service desk interacts with the IT infrastructure

• Effective dialogue and cooperation between technical and non-technical groups

• An analytical approach to threat assessment and mitigation, paying close attention to details

• Responsibility and ownership for the results of operational security

• Ongoing commitment to improvement, particularly in streamlining procedures and controls:APPLY

Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 comments:

Post a Comment

Facebook

All Jobs SA - Learnership,Bursaries,Jobs, Apprentiships e.t.c

Labels

  • Assistant Teachers
  • Bursaries
  • Government
  • Graduate
  • Internships
  • JOBS
  • Learnerships
  • Retail jobs

Popular Posts

  • Metro Police Learnership Program 2024/2025
      Metro Police Learnership Program 2024/2025 June Metro Police Vacancies 2024  in South Africa has now become one of the prominent hiring au...
  • Paramedic Learnerships 2023/2024 Application
      Paramedic Learnerships 2023/2024 Application Paramedic Learnerships  – Details of Paramedic Learnerships 2023/2024 Application. Many of th...
  • Traffic Cop Application Forms 2023-2024
      Here are the steps on how to get the Traffic Cop Application Forms 2023-2024. Because a traffic cop is part of the law enforcement officer...

Recent Posts

Blog Archive

  • July 2025 (85)
  • June 2025 (13)
  • September 2024 (1)
  • August 2024 (1)
  • May 2024 (2)
  • April 2024 (1)
  • March 2024 (2)
  • February 2024 (1)
  • January 2024 (1)
  • December 2023 (1)
  • November 2023 (1)
  • October 2023 (3)
  • September 2023 (18)
  • July 2023 (20)
  • May 2023 (6)
  • April 2023 (2)
  • March 2023 (28)
  • February 2023 (45)
  • December 2022 (5)

Copyright (c) 2023 GraduatesLive All Right Reseved

Copyright © Graduate Live Internship Jobs and Bursary | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates