1. NATURE OF THE TASKS
• Perform market evaluation to identify appropriate solutions to business requirements
• Evaluate security solutions through Proof of concepts
• Design solutions including service aspects (cf. ITIL Service design activities)
• Contribute to the definition of the security architectural blueprint
• Integrate new solutions with existing framework based on a security architectural blueprint
• Transition solutions to teams in charge of daily operations
• Balances technological opportunities with business processes requirements
• Maintains a holistic view of the organisation’s strategy, processes, information and ICT assets
• Links the business mission, strategy and processes to the ICT and Cyber Defence strategies
• Lead development and integration of components
• Acts as a team leader for developers, system engineers and technical experts
• Lead and/ or conduct system integration
• Designs, integrates and implements complex Cyber Security solutions from a technical perspective
• Security events collection architecture design
• Align Cyber Security strategy and planning with the organisation’s business goals
• Streamline business processes, functions, procedures and workflows and apply a consistent implementation approach
• Manage stakeholder engagement in the development of new processes and systems and verifies feasibility
• Conduct post-implementation reviews to evaluate benefits accrued from new processes and systems
• Recommend resolutions and improvements
• Ensures, that technical solutions, procedures and models for development are up-to-date and comply with standards
• Watches technology development and integrates into new solutions
2. KNOWLEDGE AND SKILLS
Specific Requirements (Experience in and/or l Knowledge of):
• Network security engineering
• System security engineering
• Network security administration
• System security administration
• Security testing (functional and non-functional)
• Cryptography
Specific Skills (Experience in and/or Knowledge of):
• Networking (TCP/IP, SNMP, DNS, Syslog-ng etc.)
• Defence-in-depth Security Architecture
• Enterprise Security Architectures
Certifications
Examples of desirable certification(s):
• CISSP (Certified Information Systems Security Professional)
• CISA (Certified Information Systems Auditor)
• CISM (Certifi+F31ed Information Security Manager)
• SABSA Chartered Security Architect – Foundation Certificate (SCF)
• TOGAF Foundation
• TOGAF Certified
• CNDA (EC-Council Certified Network Defense Architect)
• SCPA (SABSA Certified Security Architecture Design & Development Practitioner)
• SCMA (SABSA Certified Security Architecture Design & Development Specialist)
• GSNA (GIAC Certified Systems and Network Auditor)
• GCCC (GIAC Certified Critical Controls)
• GPPA (GIAC Certified Perimeter Protection Analyst)