Information Security Manager
Dimension Data
Johannesburg, South Africa
11d ago

Information Security Manager

Looking for the next step in your career? Enjoy a challenge? Do you have an ambition for innovation? Want to make a difference?

If you join our growing global team, you’ll be working for an industry leader with offices across five continents, in over 47 countries and more than 28 000 employees.

You will work with some of the leading world brands across the Fortune 100 and Fortune 500 companies who are all relying on Dimension Data to help them use the power of technology to achieve their ambition in this digital era.

You’ll be part of a team who’s passionate about making a difference to the way technology shapes how we live and work whether it’s protecting the rhino, connecting the G20 Summit, or revolutionising cycling, giving you the opportunity to do great things.

You’ll be joining a Global Top Employer, recognised for investing in talent because people are at the heart of our success.

You provide the skills, passion and ideas, and we’ll provide the platform to realise your ambitions.Great talent. Great teams.

Great work. Great opportunities.

Want to be part of our team?

The Information Security Manager supports the business and protects the Dimension Data reputation by taking responsibility for overall Information Security Management and aligns IT security with business security.

They ensure that information security is effectively managed in all service and business activities within global or regional, high complexity environments.

The Senior IT Information Security Manager is responsible for business optimisation by ensuring that Confidentiality, Integrity and Availability of the services are maintained at the required levels and conform to all relevant statutory requirements.

They manage a team of Audit / Compliance Managers to ensure effective service delivery and adherence to relevant operational requirements.

What you'll be doing

Define information security management strategy

Senior IT Information Security Managers work closely with business to understand the information security requirements in line with the service design and operation, industry best practice, service level requirements and operational best practice for information security management (ISM).

They ensure that a full security assessment, including a vulnerability scan and penetration test is carried out so that an information security strategy is developed and aligned to service and operational requirements.

They consider technical requirements and implications of service and business levels and develop the information security design criteria, verifying that the solution design meets ISM requirements.

They determine 3rd party capability requirements and internal system integration and standards, developing the information security design template, documenting and posting these in the service catalogue and reviewing the ISM strategy for service impact.

Develop information security policy

The Senior IT Information Security Manager contributes to the review of service level and business requirements to develop service methodologies, information security policy, assessments and other methodologies which define security controls relevant to the service and operational requirements.

They contribute to determining the resource requirements and develop the metrics for measurement against ISM. These individuals advise on the reporting requirements and ensure the overall implementation of the ISM policy in service operation.

3rd party integration

These individuals review the security policy with the relevant 3rd parties, reviewing security controls and ensuring the signing of non-

disclosure agreements and agree on compliance. They ensure that 3rd party SLA’s meet ISM service requirements, integrating into access management and security reporting.

They contribute to ensuring that the security policy and controls are implemented as agreed.

Transition ISM

The Senior IT Information Security Manager logs major service requests for ISM transition including the related sub tasks as follows (but not limited to) :

  • Review requirements for Security service levels and security controls
  • Review customised security policy
  • Review access management and operational security management practices
  • They transition the ISM, 3rd party and technical implementation and ensure service activation and knowledge transfer and the required change management processes.

    They ensure that all access management systems and processes are in place to deal with any breaches of security policy.

    Manage security breaches

    These individuals manage the prevention and resolution of security breaches and ensure that the required incident and problem management processes are initiated to ensure compliance to ISM policy.

    They present their findings to the business and advise on new measures required to prevent reoccurrence of similar breaches.

    Access management

    The Senior IT Information Security Manager ensures that access is logged and tracked and that access is removed and / or restricted as per policy.

    Service reviews

    They ensure that security service audit schedules are developed, scoped, discussed and agreed with the business. They review access authorisation for compliance with policy, administration security controls for effectiveness, security on the operational systems and verify that security monitoring is working.

    They perform penetration tests within the defined scope, finalising their audit, communicating and reporting to the business and ensuring that change control initiatives are initiated to implement corrective measures.

    These individuals review incident and problem management reports to identify potential security weaknesses and perform an impact and risk analysis, developing recommendations for highlighted risks, ensuring that these risks and solutions are presented to the relevant stakeholders.

    They revise technical solutions based on recommendations and ensure that the updated ISM plan is approved and the required change processes are initiated.

    Service improvement

    Senior IT Information Security Managers ensure that continuous service improvements are documented in service design and that the required security plan is developed and reviewed.

    They work closely with the Capacity and Availability management teams to integrate the information security plan with the service continuity and capacity plan, developing a schedule for the plan and initiating change management for plan approval.

    They use their project management skills to develop a project plan for service improvement initiatives and ensure that these are deployed and configured.

    People management

    Senior IT Information Security Managers ensure that employees reporting into them are engaged and understand their career opportunities, by taking responsibility for the development and training of their direct reports.

    He / she ensures that the team is rewarded and remunerated according to their performance. They are responsible for the co-

    ordination of the activities of the team, setting and measuring performance targets. They lead their team by example, and continuously drive for client satisfaction and ensuring that Dimension Data protocol is followed and adhered to.

    Behavioural skills

    Senior IT Information Security Managers display the ability to plan and prioritise their workload. They have sound decision making ability and are process driven and analytical individuals who are proactive in their approach.

    They demonstrate the ability to keep up to date with technological advances within the information security arena and display a solid understanding of business.

    These individuals have excellent interpersonal, verbal and written communication skills and use these to interact professionally with a variety of internal and external stakeholders.

    They are able to engage with business in a consultative way and display good negotiation skills.

    What would make you a good fit for this role?

    Join our growing global team and accelerate your career with Dimension Data. Apply today.

    Diversity in Dimension Data

    Dimension Data is an equal opportunity employer with a global culture that embraces diversity. All qualified applicants will receive consideration for employment and will not be unfairly discriminated against on any arbitrary ground including race, colour, sex, religion, national origin, veteran status, disability, gender identity, sexual orientation, or other protected category.

    Tell us about yourself Sign in, load your CV or simply give us your details directly from LinkedIn and we'll reach out when we have an opportunity that suits your skills and interests

    Apply
    Add to favorites
    Remove from favorites
    Apply
    My Email
    By clicking on "Continue", I give neuvoo consent to process my data and to send me email alerts, as detailed in neuvoo's Privacy Policy . I may withdraw my consent or unsubscribe at any time.
    Continue
    Application form