UJ | Information Security Officer (P7)

UJ | Information Security Officer (P7)

 8 March 2021

Position Summary

Remuneration: Market Related
EE position: Yes


The University of Johannesburg (UJ) is a vibrant and cosmopolitan university anchored in Africa and intent on global excellence and stature. With an emphasis on independent thinking, sustainable development, and multiple partnerships, UJ is an international university of choice. In a major shift towards aspiring to greater heights and Global Excellence and Stature, UJ has committed an additional R700 million over the next seven years towards enriching and deepening our academic profile and developing UJ as the pan-African epicenter of critical intellectual inquiry.

Job description


  • Manage information Security-related incidents and breaches, errors, and complaints on UJ systems.
  • Working with Qualys Vulnerability Management, Web Application Scanning, and Forti analyzer critical information on threats across the entire attack surface.
  • Implement Endpoint Protection and Encryption.
  • Conduct annual security reviews (Penetration testing, IT audits) to determine the security posture of UJ systems and ensure implementation of remediation actions and plans.
  • Maintain the UJ Continuity and Disaster recovery plans.
  • Conduct regular disaster recovery testing to provide assurance.
  • Ensure that all Information Security policies and procedures are followed according to the UJ requirement.
  • Provide sound security advice to our clients.
  • Report on security incidents and threat outlook for the university.
  • Prepares reports on internal and external service provider security-related services.
  • Assist departments that are struggling to remediate vulnerabilities.
  • Creation of hardening Standards for the ICS department.
  • Work as part of the cyber team to ensure Cybersecurity awareness campaigns, and the ICT risk registers are maintained.


Minimum requirements


  • Relevant Information Technology Qualification (NQF Level 7). (B-Tech or Degree)
  • 3 – 6 years of experience in the Information Security field.
  • Relevant Security Courses is an advantage.
  • Security, SSCP, CEH, CISM, CISSP, or similar information security professional certifications
  • Working experience in the Higher Education sector
  • Good understanding of complex IT systems and stay up to date with the latest security standards, systems, and protocols, as well as best practice security products.
  • Excellent knowledge of cloud technologies, information security technology such as firewalls, intrusion detection systems (IDS), data leakage protection (DLP), access management, anti-malware, and SIEM technologies.
  • Knowledge of various Information security domains
Experience and Knowledge:
  • Information Security Management (3 Years)
  • Working in the IT Field (5 Years)
  • Dealing with a diverse client base
  • Supervise and Direct IT personnel
  • Endpoint Protection and management
  • Patch management and vulnerability assessment
  • ICT Governance frameworks and implementation
  •  ITIL Knowledge
  • Working knowledge of Internet technologies including routers and switches
  • Working knowledge of Audio Visual and End-User Computer Technologies
  • Working knowledge of Enterprise Systems and IT Infrastructure
  • Working knowledge of Qualys, Cofense,
Competencies and Behavioural Attributes:
Essential Skills/Competencies
  • Good analytical and problem-solving skills
  • Knowledge of current cybersecurity threat landscape, risks, and protocols
  • Willingness to work after-hours when necessary
  • Ability to work independently
  • Ability to see the bigger picture
  • Excellent interpersonal and communication skills – both verbal and written.
  • Ability to effectively document solutions, processes, and procedures.
  • Demonstrated ability to work in teams with a collaborative interpersonal style.
  • Strong problem-solving ability/logical thinker.
  • Pay attention to detail and solution orientated.
  • Strong desire to learn and deploy new security technologies and processes.
  • Complete own training and development objectives as per agreed timelines in the personal development plan.
  • Analyzing and optimizing existing security problems.
  • Ability to understand security requirements.
  • Self-confident and assertive.
  • Able to multi-task and able to cope under pressure.
  • Must be organized and able to prioritize duties and responsibilities
Behavioral Attributes:
  • Working together
  • Demonstrates and Proactively enables and encourages teamwork
  • Communication & influencing
  • Proactively builds relationships and generates effective discussion and mutual support for plans and ideas
  • Managing Knowledge
  • Proactively seeks out new knowledge sources Uses and shares knowledge effectively
  • Striving for excellence
  • Sets and measures challenging objectives for self and others
  • Gives evidence-based feedback that helps others to excel
  • Managing Resources
  • Finds creative and innovative ways to allocate and utilize resources.
  • Thinking Strategically
  • Decisive, Takes a big picture view, Coaches others to consider the long-term impact, and consult within and beyond ICS.
  • Delivering Results
  • Plans and manages appropriately; holds self and team accountable for achieving goals.
  • Critical Thinking
  • The ability to think clearly and rationally about what to do, including the ability to engage in reflective and independent thinking.
  • Service and Task Orientated
  • The ability and desire to anticipate, recognize and meet others’ needs focusing on the completion of particular tasks as a measure of success
Working Hours: All Campuses
Monday – Friday 7:30 to 4:00
ENQUIRIES REGARDING THE JOB CONTENT:  Glaudina Croukamp on 011 559-3467 or at glaudinac@uj.ac.za




Leave a Reply

Your email address will not be published. Required fields are marked *