Dimension Data Information Security Manager - Johannesburg Jobs in South Africa

Dimension Data Information Security Manager - Johannesburg Jobs in South Africa

Job Description

Information Security Management has the responsibility to work closely with the Information Security Office (CISO) team to contribute in developing and enhancing the global Information Security Strategy and will have the responsibility and accountability for translating, directing, and implementing the global Information Security strategy across the NTT organisation.

Incumbents within this role are responsible for technical leadership within the Information Security function and liaising closely with other managers on matters of Information Security.

Information Security Management is responsible for safeguarding against current and future security risks. This role collaborates with other NTT key stakeholders and the broader NTT Information Security community to establish the vision, tenets, and comprehensive security strategy to mitigate risks.

They will leverage their technical expertise and strong business acumen to define objectives, priorities, and establish appropriate milestones and actions to ensure the reduction of risk through the implementation of security controls and recommended mitigation strategies are delivered on, as committed to key senior management.


  • Manages the development, deployment and execution of controls and defences to ensure the security and risk mitigation of company infrastructure technology, information systems and digital payment systems.

  • Identifies cybersecurity architecture, goals, objectives and metrics; analyzes business needs and priorities for protection of critical systems.

  • Establishes and implements operational policies and appropriate standards and criteria for hardware, software, email and web firewall, access verification and encryption requirements.

  • Monitors systems for cybersecurity vulnerabilities, threats and events, oversees incident response planning, and leads vulnerability audits and forensic investigations.

  • Evaluates potential business impacts from security breaches and provides strategic and tactical guidance to business decision-makers.

  • Develops and executes security systems compliance policies and procedures. Selects, develops and evaluates personnel to ensure the efficient operation of the function.

    Key Roles and Responsibilities:

  • Provide line management and mentorship of a team of Security Engineers, Security Consultants, Security Architects and DevSecOps Engineers

  • Define the overall strategic security architecture vision in conjunction with the CSO – TPS

  • Provide technical leadership on security initiatives

  • Provide leadership and direction for the TPS Information Security staff embedded and distributed throughout the organisation

  • Lead cross-functional teams in implementing Information Security

  • Liaise with and provide SME advice on Information Security matters such as BAU security activities, emerging security risks and relevant security controls, across the TPS functions (such as Research & Development, Corporate IT Management, Governance, Risk & Compliance Management, HR and Legal, Product Engineering, Product Management and Operations) in addition to senior management, department heads and managers as necessary

  • Work with department heads and other managers to champion the priority of security initiatives

  • Deliver a “Center of Excellence” for Information Security, offering internal consultancy, advice and pragmatic assistance on Information Security risk and control matters throughout the organisation and promoting the advantages of managing Information Security risks more efficiently and effectively

  • Provide leadership and strategic direction for the function, ranging from planning and budgeting to the value of Information Security & Certifications

  • Build a culture of security and create a compelling security vision and strategy for the company

  • Develop a layered defence strategy to protect our assets

  • Function as an internal consulting resource on Information Security issues and incidents

  • Provide strategic security oversight and risk guidance for projects and products, including the evaluation and recommendation of technical controls and solutions

  • Mitigate enterprise vulnerabilities and reduce attack surface vectors identified through Security reviews and controls implementation

  • Oversight of Threat & Risk Assessments, Security Architecture design reviews, and project security reviews, ensuring key applications and products are assessed for risk

  • Help ensure compliance with applicable data security laws, regulations, and customer requirements

  • Develop, manage, and execute the TPS’ Information
    Security budget in collaboration with business stakeholders

    Security Architecture function:

  • Commission Information Security risk assessments and controls selection activities

  • Commission ongoing review and analysis of internal and external security risks/vulnerabilities, and develop/implement cost effective, proactive risk mitigation programs

    Security Engineering (build) function:

  • Commission Information Security controls build processes for Security controls, client-build and new services build activities

    Security Assurance function:

  • Oversight in implementing and maintaining Application Security tools, processes and best practices

  • Commission Security Testing (penetration testing) for new projects, compliance and annual BAU testing

  • Commission Vulnerability Management for new projects, compliance and ongoing BAU activities

  • Use an integrated risk management approach to create executive-level perspectives on, and status reports about, all security risks

  • Work with other members of the TPS management team to establish appropriate priorities for security-related objectives such as resiliency, continuity, recoverability, and defensibility against risks

  • Orchestrate and harmonise security-related business process standardisation, normalisation, documentation, and continuous improvement across services

    Knowledge, Skills and Attributes:

  • Excellent team player and corporate citizen

  • Excellent communication skills – both written and verbal

  • Excellent presentation skills

  • Innovative with a solid client orientation aptitude

  • Ability to train and coach teams

  • Excellent service consulting aptitude focussing on the business, service and sales aspects

  • Technology specialist who provide senior mentorship, thought leadership and technical guidance to stakeholders & solution architects, specialists, developers and business development managers

  • Ability to use previous technical project lead experience to guide successful implementation of a system solution

  • Impeccable attention to detail with the ability to translate internal customer requirements into solutions

  • Resourceful and confident in order to handle pressure in critical situations, ensuring that the client (internal and external) requirements are met

  • Articulate and persuasive leader who can serve as an effective member of the senior management team and who is able to communicate security-related concepts to a broad range of technical and non-technical staff

  • Solid understanding of security practices in a cloud (public/private) world

  • Highly developed technical capability across a broad range of Security products/solutions

  • Ability to map business needs to technology solutions

  • Solid understanding of information technology and Information Security

  • Solid understanding of security risks and preventative controls

  • Solid understanding of security operational processes and controls

  • Interpersonal skills with the ability to develop strong relationships

  • Ardently attuned to security news, trends, risks, and events and be able to understand vulnerabilities and exploit code sufficiently to understand security implications and assess their impacts

  • Ability to remain relevant in security threats, countermeasures, security tools, and network technologies

  • Motivated with the drive to succeed

  • A strong client service orientation

  • Ability to negotiate and influence

  • Good project, analysis, problem-solving, and business relationship skills


  • Bachelor’s degree in Computer Science or a related field required

  • Bachelor’s in Computer Science or equivalent degree together with specialised training in new technologies and legacy systems

  • CISSP or equivalent certification (Highly Desirable)

  • SABSA or TOGAF certification (Highly Desirable)

  • Extensive experience in the Technology Information Security Industry

  • Demonstrable experience in a similar role

  • Demonstrable experience with business continuity planning, auditing, and risk management, as well as contract and vendor negotiation

    How to Apply

    For more information and job application details, see; Dimension Data Information Security Manager - Johannesburg Jobs in South Africa

    Find daily jobs in South Africa. Jobs - South Africa jobs. Search our career portal & find the latest South African job positions, career opportunities & jobs in South Africa.

    Jobs in South Africa - banking jobs, IT jobs, accounting jobs, NGO jobs, business administration, ICT, UN jobs, procurement jobs, education jobs, hospital jobs, human resources jobs, engineering, teaching jobs, and other careers in South Africa.

    Find your dream job from 1000s of vacancies in South Africa posted and updated daily - click here!

  • Click here to post comments

    Join in and write your own page! It's easy to do. How? Simply click here to return to 2 Best Africa Jobs.