The Security Engineer L3 is a high level in the Engineer series and may be assigned to function as a supervisor, expert or leader.
when assigned as an expert, performs work requiring a very high level of technical knowledge of a specic area or ability to integrate at a high level the knowledge of several areas, manages and provides technical leadership of projects involving large-scale, complex and highly analytical tasks.
Positions at this level are distinguished from Senior Engineers, in that the latter performs more specic and small-scale, though complex, analytical tasks.
Work is performed within a broad framework of general policy and requires creativity and resourcefulness to accomplish goals and objectives, and in applying concepts, plans and strategies which may deviate from traditional methods and practices.
Serves as a lead technical contact and systems integrator for large complex deployments, with a focus on securing vulnerabilities and reducing risk of system and / or asset compromises.
engages, interacts and coordinates with third-party incident responders, including law enforcement. Oversees the administration of authentication and access controls, including provisioning, changes, and deprovisioning of user and system accounts, security / access roles, and access permissions to information assets.
oversees risk and compliance self-assessments, and engages and coordinates third-party risk and compliance assessments.
Analyses and oversees the development of information security governance, including organizational policies, procedures, standards, baselines and guidelines with respect to information security and use and operation of information systems.
Oversees the development and administration of information security training and awareness programs. Co-ordinate activities of engineers The Security Engineer L3 displays leadership and team management ability and delegates lower complexity tasks to engineers and technicians.
They assume responsibility for the co-ordination of the activities of the engineers, in line with performance targets. They lead by example and monitor the quality of engineer's and technician's work when required.
Mentorship of engineers and technicians is expected on this role.
Produce and use reports Security Engineer L3 Overbaakens Road, Overbaakens, Port Elizabeth, South Africa The individual demonstrates good administration ability in the form of proposal and report writing, and general project documentation development.
The individual may be required to serve periodically on the customer service desk, providing third line telephonic, remote and on-site support and problem management.
Take ownership of relevant technologies Focusing on Cisco, Fortinet, Palo Alto and other network security related technologies the Security Engineer is expected to take ownership of implementations, maintenance and operations of information system security controls and countermeasures People management As corporate citizens they are good team players and exhibit the required level of management skills required from junior level managers.
He or she practices two-way communication and listens to understands other’s point of view
Key Roles and Responsibilities :
Certication, both in vendor, technology and product is elevated to a specialized level and activities continue to progress towards an expert level.
Academic Qualications and Certications : Computer Science / Information Technology Degree or equivalent together with specialised training in new technologies and legacy systems or equivalent Network security certications (vendor certications) Competence and certication in other technologies, Fortinet, Palo Alto, Checkpoint.
Microsoft Azure Fundamentals (AZ-900) Microsoft Azure Security Technologies (AZ-500) a plus Fortinet NSE certications Palo Alto Networks Certied Network Security Administrator (PCNSE) a plus Industry certications (CISSP, CISM, S+) a plus
Required Experience :
10 - 15 years solid work experience in a technical implementation engineering or similar role Experience engaging with clients and conducting presentations End to end deployment and support of above mentioned technologies