Account Manager (Cyber Security)
Johannesburg
32 days ago

-

Details            Upload CV & Apply
Cyber Security Specialist, SAP
Johannesburg
32 days ago

-

Details            Upload CV & Apply
Sales Assistant
Johannesburg
3 days ago

Salary: Performance basic salary


Remote working: YesSetting up appointment for the Director

Details            Upload CV & Apply
IT Manager
Johannesburg
4 days ago

Salary: 1 200 000 Annually

Are you a highly experienced IT infrastructure leader with a strong hands‑on background and a passion for building, supporting, and leading large‑scale environments? This role offers breadth, responsibility, and long‑term impact for the right technical leader.

Details            Upload CV & Apply
Interim Head of IT
Capetown
7 days ago

INTERIM HEAD OF IT6-Month Contract | Cape TownGijima Staffing Solutions is recruiting on behalf of a client for a highly strategic interim leadership opportunity within a complex, highly regulated manufacturing environment. We are seeking an accomplished Head of IT with deep experience in pharmaceutical, biotech, life sciences, medical manufacturing, or similarly regulated industries.This is a sen...

Details            Upload CV & Apply
Senior Helpdesk Support L3
Johannesburg
8 days ago

Salary: TBC Annually

Are you a senior IT Support or Cloud Operations professional who thrives in high‑pressure environments? This role is for someone who enjoys solving complex technical issues, building automation, and being the go‑to escalation point across cloud, identity, endpoint, and network services.

Details            Upload CV & Apply
Junior to Intermediate Helpdesk Engineer
Capetown
8 days ago

Salary: TBC Annually

Are you an early‑to‑mid career IT support or cloud operations professional looking to grow your technical depth? This is an ideal opportunity to build hands‑on experience across Microsoft cloud services, identity, endpoint management, and networking while developing automation and escalation skills.

Details            Upload CV & Apply
INVITATION TO SERVE ON THE AUDIT AND RISK COMMITTEE AS ICT SPECIALIST
East London
8 days ago

Amatola Water is a State-owned, water services enterprise established in terms of Water Services Act. As a public utility, its prime function is to provide water services to Municipalities, industry and other communities. Amatola Water’s service area includes Buffalo City, the Amathole District and positions of adjoining districts in the central Eastern Cape.

Details            Upload CV & Apply
Senior Commercial Architect (Sales Executive)
Centurion
10 days ago

Salary: Market related

Sales executive- Cloud, cybersecurity and Managed Services

Details            Upload CV & Apply
Instrument Technician / Electrician
Capetown
4 days ago

Salary: R45 000 per month + 13th cheque

Instrument Technician / Electrician - Paarl, Western Cape

Details            Upload CV & Apply
Position Description:



 

Results page: 1  2  3  4    Next

 

Cyber Security Jobs

 

Cyber security is the process of keeping technological systems, and the information they generate in a business, safe from harmful outside influences. By promising to protect your customers’ sensitive information, you can build trust with them such they will be happy to return and make use of your products and services in the future.

How many types of cyber security jobs are there?

According to Indeed and Payscale, there are more than 10 major cyber security roles for which you can become certified, gain skill in, and move up the perk and salary ranks.

 

See the average salary for each cyber security role required right now in South Africa, within the table below.

 

Job title

Average salary

Forensic computer analyst

R350 000

IT security specialist

R694 032

Cyber security manager

R748 651

Cyber security engineer

R390 000

Information technology consultant

R312 000

Security administrator

R300 000

Information security officer

R694 032

 

Information security manager

R920 000

Chief information security officer

R1 200 000

Network security engineer

R240 000

Machine learning engineer

R2 805 000

Security consultant

R324 000

Junior cyber security engineer

R155 000

Information security specialist

R523 810

Security analyst

R326 972

Security architect

R840 000

Certified ethical hacker

R375 000

What is the basic description of each major cyber-security role?

See these, adapted from Indeed and other sources, bulleted below:

  • A machine learning engineer: designs, creates and implements algorithms for artificial intelligence (AI).
  • A network security engineer: focuses on how devices and computers connect to one another using the internet.
  • A chief information officer: provides guidance and leadership to technology specialists and managers within their department, by creating regulations for organisational security procedures.
  • A security specialist: dedicates their time to monitoring their company’s current security measures, and curtailing any potential breaches.
  • An information security analyst: gathers and assesses data related to an organisation's security profile, and collaborates with other security and information technology professionals to implement security measures.
  • A security administrator, often referred to as a security manager: manages security solutions by creating plans and developing training documents to help all those in an organisation adhere to security policies.
  • A director of security: leads both information technology staff and managers of security, by providing leadership and guidance, creating and implementing regulations, and communicating with company executives about the state of security in the organisation.
  • A highly knowledgeable security consultant: is called on to identify ways in which an organisation can beef up their security measures – say, by suggesting new security systems/products for the organisation to implement.
  • A security engineer: is a technical professional with a highly developed understanding of computer networking and operating systems, who focuses on
  • troubleshooting new security measures; coordinating a response to any breaches ; and helping the IT team develop cutting-edge solutions for future attempted breaches.
  • A security manager: oversees security measures within an organisation, by focusing on cybersecurity rules and regulations; managing IT teams; and developing strategies for cybersecurity efforts.
  • An IT security specialist: works alongside a team of IT professionals, to develop strategies that help to protect devices and systems within an organisation from potential cyber attacks.
  • A forensic computer analyst: assesses devices and systems, and finds methods for recovering data. He/she often helps to gather the information that is needed by the authorities for use during a cyber-crime-related criminal investigation.

See cyber-security jobs on Executive Placements, by clicking here.

Which five companies are considered to be at the forefront of the local/regional IT landscape in South Africa?

According to Westech, these are:

  • BCX, a leading IT solutions provider that specialises in cloud computing, cybersecurity, and data analytics;
  • Gijima, a well-known IT solutions company that focuses on government and enterprise solutions – particularly digital transformation;
  • Westech (of course), which offers IT support and solutions, including managed IT services and cybersecurity;
  • Esquire, which is apparently known for its software development and IT consulting services, as a result of helping businesses implement and optimise their IT infrastructure;
  • Frontosa Information Technology, which specialises in IT solutions and services – most especially cloud computing, data analytics, and cybersecurity. 
What is the entry-level annual salary at each of the cyber-security companies listed on Payscale?

The table below provides a good guide, as you work your way up in the cuber-security niche:

Company

Entry-level annual salary

Websphere Portal Server

R330 000

Microsoft Dynamics 365

R330 000

Intellij IDEA

R330 000

Apache Maven

R330 000

JBOSS

R330 140

Knowledge Management

R334 123

Solaris

R335 526

Ionic

R335 526

Storage Systems Engineer

R335 996

Bash

R336 000

Amazon Redshift

R338 976

Java Script

R339 341

Progress 4GL RDBMS –  MFG

R339 706

PBX

R340 000

Cognos

R340 000

System Testing

R340 909

Lotus (IBM) Domino

R341 053

Natural Language Processing

R341 439

SAP Exchange Infrastructure (SAP XI)

R341 835

Microsoft Exchange

R343 049


We suggest that you aim high – because the higher you start, the higher you will be able to rise!

What can we learn from any of the major data breaches that have occurred in South Africa in recent times?

According to Werkmans Attorneys, the two most important lessons that we should learn from the major data breaches that have occurred in South Africa are as follows:

  • The reputational and financial harm resulting from a data breach is not to be underestimated – it will also adversely affect an organisation’s ongoing operations;
  • All organisations should ensure that they have an adequate level of data-breach-response in place – by consulting with the relevant external professionals, and training and equipping their in-house staff members on a regular and ongoing basis.
Which cyber security conferences should we attend?

According to Infosec-Conferences.com, it is wise to investigate the costs and requirements to attend at least a few of the below conferences each year:

  • ITWeb Security Summit, Johannesburg;
  • BSides Cape Town, Cape Town
  • CyberCon Africa, Johannesburg;
  • Africa Cyber Defence Summit, Pretoria
  • ISACA South Africa Chapter Events, Johannesburg;
  • Cape Town Cybersecurity Conference, Cape Town;
    and
  • South African Cybersecurity Conference, Durban.
For interest, what happened in the latest two major data security breaches in South Africa?

There was a ransomware attack on the South African Department of Defence back in 2023, which claimed 200 tetrabytes of data exfiltration; and port operations were halted following the 2021 ransomware attack on Transnet. Read more, here.