Job title : Cyber Security Engineer
Job Location : Western Cape, Stellenbosch
Deadline : November 24, 2025
Quick Recommended Links
- Jobs by Location
- Job by industries
About The Role
The Cyber Security Engineer role focuses on implementing, configuring, and operating the organization’s identity governance and administration platform. The role sits within the identity and access management function, supporting the bank’s identity governance and administration needs.Our Ideal Candidate
5+ years in Cyber Security Engineering3 years of hands-on experience in IAG implementation and operations, preferably using SailPoint IdentityNow.Proven expertise in configuring and managing IAG platforms, SailPoint IdentityNow is preferred.Strong understanding of identity governance principles and best practices in a banking environment.Familiarity with related cybersecurity technologies, including :Identity Provider (IdP) systemsActive Directory and Azure AD (EntraID)API (REST) integrationsExcellent problem-solving skills and ability to work in a fast-paced, regulated environmentQualifications (Minimum)
Grade 12 National Certificate / VocationalQualifications (Ideal or Preferred)
A relevant tertiary qualification in Information Technology - Computer ScienceWhat You'll Do
Join the team performing the implementation, configuration, and operation of SailPoint IdentityNow for IAG (Identity Administration and Governance)Support the implementation, configuration and maintenance of identity governance processes, policies, and workflows tailored to the banking sector.Collaborate with cross-functional teams to integrate IAG solutions with existing applications and systems.Monitor and enhance security protocols to mitigate risks and ensure compliance with identified regulations.Provide technical expertise and support for IAG-related incidents and improvements.Technical Skills
Active Directory Domain Services (AD DS)Development & Operations (DevOps)Azure Active Directory (Entra ID)Networking (DNS, DHCP)Security & ComplianceIdentity & Access ManagementBackup & Disaster RecoveryHybrid Infrastructure & Operating SystemsPrivileged Access Management (PAM)Zero Trust principles by understanding identity and access management (IAM), implementing least-privilege access, and using (JIT / JEA) to strengthen security.Skills
Analytical SkillsCommunications SkillsConsultation skillsPlanning, organising and coordination skillsProblem solving skillsICT jobs