Search thousands of fresh jobs

×
This job is expired
Recru-it

Information Security Manager

Recru-it

  • R Undisclosed
  • Permanent Senior position
  • South Africa
  • Posted 22 Jan 2026 by Recru-it
  • Expires in 29 days
  • Job 2631463 - Ref PE011465

About the position

The Information Security Manager will lead our client’s cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD risks, securing branch networks, and aligning with globally recognized frameworks such as the NIST Cybersecurity Framework and Joint Security Standards (JSS).
Responsibilities
Strategic Leadership and Governance

  • Develop and maintain the company’s enterprise-wide cybersecurity strategy aligned with business objectives and regulatory requirements.
  • Establish and enforce security governance frameworks, policies, and standards.
  • Ensure alignment with the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover) and Joint Security Standards.
  • Lead the implementation of relevant security compliance initiatives.
  • Collaborate with divisional CIOs and executive leadership to align security posture across business units.
  • Monitor emerging threats, regulatory changes, and industry trends to inform strategic decisions.

 
Architecture & Identity Management

  • Design secure solutions for hybrid environments (on-prem + Azure).
  • Integrate security into infrastructure and application projects.
  • Manage identity and access controls, including Azure AD, MFA, and privileged access management.

 
Security Operations

  • Manage day-to-day security monitoring, incident handling, and threat intelligence.
  • Administer Microsoft 365 security features: Defender for Endpoint, Purview, Sentinel, Conditional Access, etc.
  • Ensure endpoint, network, and cloud security controls are effectively implemented and monitored.
  • Implement and enforce BYOD policies, including mobile device management (MDM), data loss prevention (DLP), and secure access controls.
  • Secure branch office networks, including firewalls, VPNs, segmentation, and remote access protocols.

 
Financial Management

  • Develop and manage the annual cybersecurity budget, including licensing, tools, training, and consulting services.
  • Track and report on security-related expenditures, ROI, and risk mitigation outcomes.
  • Support procurement and vendor management for security solutions.

 
Cyber Security Operations Center (SOC) Oversight

  • Oversee 24/7 SOC operations, ensuring effective threat detection, incident response, and escalation.
  • Define SOC roles, workflows, and incident response playbooks.
  • Integrate SIEM, SOAR, and threat intelligence platforms for proactive defense.
  • Monitor and improve KPIs such as MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond).
  • Coordinate with external threat intelligence providers and law enforcement when necessary.

 
Security Technology Lifecycle Management

  • Oversee the deployment, maintenance, and upgrade of security technologies including Microsoft 365 E3/E5 and Hailstone platforms.
  • Ensure timely patching, configuration updates, and feature adoption.
  • Maintain compatibility and integration of security tools with the company’s hybrid infrastructure.
  • Document system configurations and update operational procedures regularly.

 
Risk Management & Compliance

  • Conduct regular risk assessments, vulnerability scans, and penetration tests.
  • Ensure compliance with POPIA, GDPR, NIST CSF, JSS, and other relevant regulations and frameworks.
  • Maintain a risk register and track mitigation actions.
  • Coordinate internal and external audits and ensure timely remediation of findings.

 
Awareness, Education & Training

  • Lead organization-wide cybersecurity awareness programs.
  • Deliver targeted training for IT, business, and executive teams.
  • Promote secure behavior and incident reporting culture.

 
Team Leadership and Culture

  • Build and lead a high-performing cybersecurity team, leveraging SOC analysts, engineers, and compliance specialists.
  • Define clear roles, responsibilities, and performance expectations.
  • Conduct regular coaching, performance reviews, and career development planning.
  • Foster a culture of accountability, innovation, and continuous improvement.
  • Promote cybersecurity awareness and ownership across all departments.

 
Reporting

  • Prepare operational, executive-level reports on security posture, risk exposure, and compliance status.

 
Minimum requirements:

  • Bachelor’s degree in Computer Science, Information Technology, or related field.
  • 8+ years of IT Security experience, with 5+ years in a leadership role.
  • CISSP, CISM, or equivalent
  • Microsoft Certified: Cybersecurity Architect Expert
  • GIAC Security Operations (GSOM) or equivalent SOC certification
  • Familiarity with scripting (PowerShell, Bash) and automation tools.


Experience in the following technologies and concepts:

  • Microsoft 365 and SharePoint Online
  • Proven experience in cybersecurity leadership within hybrid cloud environments.
  • Deep knowledge of Microsoft 365 E3/E5 security stack and Hailstone technologies.
  • Strong understanding of SIEM, SOAR, threat intelligence, and SOC operations.
  • Experience managing BYOD environments and securing distributed branch networks.
  • Familiarity with ISO/IEC 27001, ISO/IEC 20000, NIST, and CIS controls.
  • Excellent communication, stakeholder engagement, and team leadership skills.
  • Technical documentation

 
Competencies required:

  • Strong leadership and problem-solving skills.
  • Attention to detail
  • Decision making
  • Leadership
  • Attention to detail
  • Resilience
  • Good verbal and written communication skills
  • Time management skills
  • Deadline driven

Desired Skills:

  • IT Security
  • CISSP
  • CISM
  • PowerShell
  • Bash
  • GIAC Security Operations (GSOM

Recru-it

About the agency

Recruit IT Recruitment IT Recruitment and Talent Sourcing Specialists Offices in Cape Town and Port Elizabeth as well as Consultants working remotely across the country Telephone number 087 805 8536 www.recru-it.co.za >recru-it* COMPANY PROFILE Certified at a BEE Procurement Recognition Level of 110% >Introduction* >recru-it*was established in August 2005 & specializes in and focuses on the full spectrum of positions within the IT and other sectors. We focus our approach on delivering a superior service to both our client and candidate, in all portfolios and phases throughout the Recruitment process, supporting real transformation within the IT Industry and other sectors through ethical and transparent business practices >Value added services* • Advertising Client Roles • Screening Applications • CV searches • Head Hunting Candidates • CV Selection • Labour Broking • Pay structure advice for client & candidate >Additional services on request* • Personal Reference checks • Credit checks • Criminal checks • ID checks • Academic checks • Qualification checks >Placements portfolio* • Software Engineering & Development • I.T. Solution Sales and Strategic Sales • Sales & marketing • Finance and Insurance • HR • Engineering • Administration / Office Management • Healthcare • FMCG • Warehousing / Logistics • Telecommunications • Training and Development • Executive and senior level placements • ERP & CRM Consultants • Project Management & Administration • I.T Executive Management • Business Analysis • Business Intelligence • Consulting • Network Engineering • Support • Testing • Product Support Specialists   >Operational structure * >recru-it*uses a flat open structure in our approach  Each consultant takes personal ownership for each client request. The consultants are account managers with their respective clients ensuring professional and personal interaction at all times.  Our team supports each other in an interactive, transparent manner to deliver highest quality candidates on each specification, thus ensuring a fast and effective turnaround time to fulfill your every labour requirement. >recru-it*was established in August 2005. Carbon foot print  We practice a 90% paperless environment as most of our duties are internet and electronic. >BEE Profile*  >recru-it*is owned by 2 individuals with 8 additional staff members • 50 % of the business is owned by a black person. • 50% of the business is women owned.  >recru-it*has been officially & precisely rated according to our company structure. • We have been certified at a BEE Procurement Recognition Level of 110%. • Enterprise development – on site as well as external training courses for staff ensuring continuous skill improvement. • Corporate Social Investment – we do not have a formal CSI policy, but we do annual donations.

Receive a daily digest of all new jobs matching this job. Your information is safe with us and you can cancel any time.

Expires in 28 days

Email me jobs similar to: Information Security Manager

Receive a daily digest of all new jobs matching this job: Senior IT Auditor. Your information is safe with us and you can cancel at any time.