Cloud Security Systems Engineer II

IT Company is seeking a Cloud Security Systems Engineer II

Reporting: Technical Operations Manager 

Job Summary

The role of the Cloud Security Systems Administrator II will be to ensure that internal security practices are being adhered to by utilizing security systems that have been put into place. It will be essential for the Security Systems Administrator to understand how these systems are utilized to ensure correct alignment with internal security standards and that they are continuously maintained. A good understanding of security best practices will be required and how these practices are achieved by utilizing technologies such as Active Directory, Firewalls, and Security related applications, appliances, and devices.

The role will require a good understanding of Silicon Sky internal systems from the perimeter network through to back end systems.

The Security Systems Administrator will partner with stakeholders at all levels of the organization, on a variety of initiatives that arise from business, compliance, and technological security needs.

Responsibilities and Duties

  • Ensure Security and Management Systems are functioning according to best practices and reporting the relevant information required for compliance
  • Work with the Compliance Team to ensure the company is compliant with ISO-27001 regulations.
  • Participate in design and implementation reviews of security and infrastructure projects.
  • Create and maintain documentation for security tools and services
    • Utilize security event management tools to identify potential threats
    • Utilize Vulnerability software to identify possible areas of compromise
    • Work with third party security partnersSecurity event analysis and Vulnerability TestingReporting on security posture of internal systems
      • Virtualization Platforms
      • Backup Environments
      • Windows Environments
      • Linux Environments
      • Anti-Virus and Malware protection
      • Network and Security Devices
      • Third party Applications
  • Installation, configuration and systems administration management of the following systems:
    • N-Able N-Central
    • Environmental Asset discovery software
    • LevelBlue USM
    • Vmware vRealize Aria Logs
    • Nessus Professional
    • Hardware Management and Monitoring Software
  • Stay updated on and research current information security topics
  • Installations, configurations and patching according to vendor best practices
    • Understand the different levels of patches that are released (Critical, Security and Feature)
    • Follow and manage Vendor patch release cycles
      • Microsoft
      • Linux (Ubuntu)
  • Document Installations relating to security projects
  • Maintain Internal Security Environment documentation
  • Capacity and performance reporting of security systems
  • Generate reports from Security and management systems for compliance
  • Attend customer meetings/workshops relating to security practices
  • Work closely with CTO, Head of Security Team and Compliance Officer

Requirements / Competencies

  • Attention to detail
  • Meet deadlines
  • Reliability and consistent high standard of work
  • Take ownership and accountability for tasks
  • Excellent communication skills
  • Excellent documentation skills
  • Technical troubleshooting and problem-solving ability
  • Strong customer ethic
  • Ability to work under pressure
  • Willing to work after hours
  • Team player

Qualifications / Experience

  • Five or more years’ work experience as a System Security Engineer or related position
  • Security Certification (S+) or other equivalent security standards
  • Network certification (N+)
  • Experience with log management and event correlation tools
    • SIEM
    • Syslog systems
  • Vulnerability assessment tools
  • Microsoft Active Directory
  • Microsoft Windows Operating Systems
  • Basic Linux Operating System Administration
  • Experience with Visio, Office 365 Applications
  • Basic Office 365 Administration
  • Malware Analysis – ability to perform complex analysis to understand the properties and behaviours of a malware and propose effective countermeasures and mitigation strategies
  • User behaviour Analysis – ability to piece together user activities to recognize patters of malicious behaviours
  • Log Analysis and Correlation
  • Enterprise Endpoint Security and Email Security
  • Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems and intrusion detection and notification systems
  • In-depth knowledge of security protocols and principles
  • June 2, 2025
  • Johannesburg

  • Permanent