Cyber Security & Firewall Administrator
Johannesburg
20 days ago
cyber security & Firewall Administrator- Gauteng Based (Hybrid)
Details
Upload CV & Apply
Penetration Tester (Cyber Security)
Johannesburg
75 days ago
-
Details
Upload CV & Apply
Cyber Security Solutions Engineer
Midrand
84 days ago
-
Details
Upload CV & Apply
Cloud Security Engineer
Sandton
4 days ago
Salary: Annually
The candidate is part of the
cybersecurity function in the organisation mandated to actively protect Company’s information and technology assets from external or internal threats; ensuring compliance with statutory and regulatory requirements regarding information access,
security and privacy. The role is responsible for analysing
security requirements for Company cloud environments, impleme...
Details
Upload CV & Apply
Business Development Manager (Hunter)
Johannesburg
4 days ago
Salary: Negotiable
We are seeking a Enterprise Software Business Development Manager (Hunter)Â with a proven track record of driving revenue growth by managing key client relationships, identifying new business opportunities, and overseeing the end-to-end sales cycle for enterprise software solutions. This role requires a strategic thinker with a ...
Details
Upload CV & Apply
Senior Security Architect
Johannesburg
6 days ago
Our client is looking for Senior
security Architectto assist the Company with defining, designing and implementing the
security architecture initiatives in line with leading practices
Details
Upload CV & Apply
Chief Digitalization Officer
Johannesburg
12 days ago
Salary: 625 Hourly
Exiting new opportunity for Digitalization Officer / Project Manager and IT Management - Experience gained form Manufacturing industry - Project Management - Business Process Optimization BPO - Digitalization - AI Artificial Intelligence implemented into Digitalization - Management of IT Department - Experience in
cyber security and qualification / certification
Details
Upload CV & Apply
IT Manager - East Africa
Johannesburg
12 days ago
Salary: R600 000 Annually
My automotive client, a dealer group operating across East Africa, is seeking an experienced IT Manager to join their powerhouse in Johannesburg. This is a full day onsite / in-office position.As the IT Manager, you will be the gatekeeper of all things tech within the organisation, ensuring everything runs smoothly from servers to networks, cloud systems to data governance, while also leading stra...
Details
Upload CV & Apply
Internal Account Manager â Bryanston, Johannesburg
Johannesburg
17 days ago
Salary: Monthly
Our client in the IT and
cyber security Industry based in Bryanston, Johannesburg and Surrounds is currently looking to employ Internal Account Manager.
Details
Upload CV & Apply
Pre-Sales Specialist Johannesburg
Johannesburg
17 days ago
Salary: Monthly
Our client in the IT and
cyber security Industry based in Bryanston, Johannesburg and Surrounds is currently looking to employ Pre-Sales Specialist.
Details
Upload CV & Apply
Position Description:
Results page:
1 2 3 4 5 Next
Cyber Security Jobs
Cyber security is the process of keeping technological systems, and the information they generate in a business, safe from harmful outside influences. By promising to protect your customers’ sensitive information, you can build trust with them such they will be happy to return and make use of your products and services in the future.
How many types of cyber security jobs are there?
According to Indeed and Payscale, there are more than 10 major cyber security roles for which you can become certified, gain skill in, and move up the perk and salary ranks.
See the average salary for each cyber security role required right now in South Africa, within the table below.
Job title
|
Average salary
|
Forensic computer analyst
|
R350 000
|
IT security specialist
|
R694 032
|
Cyber security manager
|
R748 651
|
Cyber security engineer
|
R390 000
|
Information technology consultant
|
R312 000
|
Security administrator
|
R300 000
|
Information security officer
|
R694 032
|
Information security manager
|
R920 000
|
Chief information security officer
|
R1 200 000
|
Network security engineer
|
R240 000
|
Machine learning engineer
|
R2 805 000
|
Security consultant
|
R324 000
|
Junior cyber security engineer
|
R155 000
|
Information security specialist
|
R523 810
|
Security analyst
|
R326 972
|
Security architect
|
R840 000
|
Certified ethical hacker
|
R375 000
|
What is the basic description of each major cyber-security role?
See these, adapted from Indeed and other sources, bulleted below:
- A machine learning engineer: designs, creates and implements algorithms for artificial intelligence (AI).
- A network security engineer: focuses on how devices and computers connect to one another using the internet.
- A chief information officer: provides guidance and leadership to technology specialists and managers within their department, by creating regulations for organisational security procedures.
- A security specialist: dedicates their time to monitoring their company’s current security measures, and curtailing any potential breaches.
- An information security analyst: gathers and assesses data related to an organisation's security profile, and collaborates with other security and information technology professionals to implement security measures.
- A security administrator, often referred to as a security manager: manages security solutions by creating plans and developing training documents to help all those in an organisation adhere to security policies.
- A director of security: leads both information technology staff and managers of security, by providing leadership and guidance, creating and implementing regulations, and communicating with company executives about the state of security in the organisation.
- A highly knowledgeable security consultant: is called on to identify ways in which an organisation can beef up their security measures – say, by suggesting new security systems/products for the organisation to implement.
- A security engineer: is a technical professional with a highly developed understanding of computer networking and operating systems, who focuses on
- troubleshooting new security measures; coordinating a response to any breaches ; and helping the IT team develop cutting-edge solutions for future attempted breaches.
- A security manager: oversees security measures within an organisation, by focusing on cybersecurity rules and regulations; managing IT teams; and developing strategies for cybersecurity efforts.
- An IT security specialist: works alongside a team of IT professionals, to develop strategies that help to protect devices and systems within an organisation from potential cyber attacks.
- A forensic computer analyst: assesses devices and systems, and finds methods for recovering data. He/she often helps to gather the information that is needed by the authorities for use during a cyber-crime-related criminal investigation.
See cyber-security jobs on Executive Placements, by clicking here.
Which five companies are considered to be at the forefront of the local/regional IT landscape in South Africa?
According to Westech, these are:
- BCX, a leading IT solutions provider that specialises in cloud computing, cybersecurity, and data analytics;
- Gijima, a well-known IT solutions company that focuses on government and enterprise solutions – particularly digital transformation;
- Westech (of course), which offers IT support and solutions, including managed IT services and cybersecurity;
- Esquire, which is apparently known for its software development and IT consulting services, as a result of helping businesses implement and optimise their IT infrastructure;
- Frontosa Information Technology, which specialises in IT solutions and services – most especially cloud computing, data analytics, and cybersecurity.
What is the entry-level annual salary at each of the cyber-security companies listed on Payscale?
The table below provides a good guide, as you work your way up in the cuber-security niche:
Company
|
Entry-level annual salary
|
Websphere Portal Server
|
R330 000
|
Microsoft Dynamics 365
|
R330 000
|
Intellij IDEA
|
R330 000
|
Apache Maven
|
R330 000
|
JBOSS
|
R330 140
|
Knowledge Management
|
R334 123
|
Solaris
|
R335 526
|
Ionic
|
R335 526
|
Storage Systems Engineer
|
R335 996
|
Bash
|
R336 000
|
Amazon Redshift
|
R338 976
|
Java Script
|
R339 341
|
Progress 4GL RDBMS – MFG
|
R339 706
|
PBX
|
R340 000
|
Cognos
|
R340 000
|
System Testing
|
R340 909
|
Lotus (IBM) Domino
|
R341 053
|
Natural Language Processing
|
R341 439
|
SAP Exchange Infrastructure (SAP XI)
|
R341 835
|
Microsoft Exchange
|
R343 049
|
We suggest that you aim high – because the higher you start, the higher you will be able to rise!
What can we learn from any of the major data breaches that have occurred in South Africa in recent times?
According to Werkmans Attorneys, the two most important lessons that we should learn from the major data breaches that have occurred in South Africa are as follows:
- The reputational and financial harm resulting from a data breach is not to be underestimated – it will also adversely affect an organisation’s ongoing operations;
- All organisations should ensure that they have an adequate level of data-breach-response in place – by consulting with the relevant external professionals, and training
and equipping their in-house staff members on a regular and ongoing basis.
Which cyber security conferences should we attend?
According to Infosec-Conferences.com, it is wise to investigate the costs and requirements to attend at least a few of the below conferences each year:
- ITWeb Security Summit, Johannesburg;
- BSides Cape Town, Cape Town
- CyberCon Africa, Johannesburg;
- Africa Cyber Defence Summit, Pretoria
- ISACA South Africa Chapter Events, Johannesburg;
- Cape Town Cybersecurity Conference, Cape Town;
and
- South African Cybersecurity Conference, Durban.
For interest, what happened in the latest two major data security breaches in South Africa?
There was a ransomware attack on the South African Department of Defence back in 2023, which claimed 200 tetrabytes of data exfiltration; and port operations were halted following the 2021 ransomware attack on Transnet. Read more, here.