Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Information Security Management System (ISMS) Specialist.
South Africa Jobs Expertini

Urgent! Information Security Management System (ISMS) Specialist Job Opening In Midrand – Now Hiring Vector Logistics Limited

Information Security Management System (ISMS) Specialist



Job description

Information Security Management System (ISMS) Specialist

Employment Type: Permanent
Location: Midrand

Overview

We are a Supply Chain and Sales & Merchandising partner adding value to your business through a fully integrated, temperature-controlled network in Southern Africa.

But we are also more than that.

We are people serving people.

While we boast the best in tech and infrastructure, our people are our greatest resource.

With our skilled, curious, can-do people at the forefront, our assets become your assets, our service your solutions.

Vector’s vehicle fleet includes a food industry first in ‘multi-temperature’ vehicles enabling the company to service business across frozen, chilled and ambient temperature zones on a single delivery.

Job Purpose

Job Purpose Information Security Management System (ISMS) Specialist is responsible for the end-to-end implementation, maintenance, and continuous improvement of the Information Security Management System (ISMS) in accordance with ISO/IEC 27001 standards.

The incumbent will play a pivotal role in ensuring the confidentiality, integrity, and availability of our information assets, while also ensuring compliance with legal and regulatory requirements.

Key Responsibilities

ISMS Development and Implementation

  • Lead the design, implementation, and continuous improvement of an ISMS aligned with ISO/IEC 27001 and other relevant frameworks (e.g., NIST, POPIA, CIS, CSA etc.).

  • Develop, implement, and maintain information security policies, procedures, and guidelines.

  • Assess existing information security practices and recommend improvements.

  • Ensure the organization’s ISMS aligns with business needs, regulatory requirements, and industry best practices.

Risk Assessment and Management

  • Perform risk assessments to identify potential security risks to the organization’s information assets in alignment to ISO 31000.

  • Develop risk treatment plans and assist in the implementation of risk mitigation strategies.

  • Conduct ongoing risk assessments and audits to ensure the effectiveness of the ISMS.

Compliance and Audits

  • Ensure compliance with ISO/IEC 27001 and other industry standards and regulations.

  • Prepare the organization for certification audits and support the audit process.

  • Coordinate with auditors and certification bodies.

  • Maintain records and documentation to ensure traceability and compliance with ISMS requirements.

Training and Awareness

  • Provide training to staff and management on information security best practices, policies, and compliance requirements.

  • Promote a culture of information security awareness across the organization.

  • Support the creation of an internal security awareness program.

Incident Response and Management

  • Assist in the development and testing of incident response plans.

  • Provide guidance and support in handling information security incidents.

  • Ensure incidents are documented and reported in accordance with regulatory and contractual obligations and assist in post-incident analysis to determine the cause and recommend preventive actions.

Continuous Improvement

  • Define and monitor ISMS-related KPIs and metrics.

  • Monitor and report on the performance of the ISMS, identifying areas for improvement.

  • Monitor compliance with security policies and procedures.

  • Lead regular internal audits to assess the effectiveness of the ISMS.

  • Recommend and implement improvements based on audit findings, risk assessments, and evolving industry practices.

  • Keep up-to-date with emerging threats, vulnerabilities, and regulatory changes.

Vendor and Third-Party Risk Management

  • Assess and monitor third-party vendors and service providers for information security compliance.

  • Assist in the integration of ISMS controls into third-party contracts and SLAs.

Key Relationships

  • This role plays a critical role in managing and maintaining relationships with both internal and external stakeholders.

  • These interactions are essential for ensuring the organization’s security posture is robust and aligned with its strategic objectives.

Qualifications and Experience

  • Bachelor’s Degree in information security, Computer Science, Information Technology, or a related field.

  • ISO27001 Lead Implementer required; preferred ISO27001 Lead Auditor, CISM, CISA.

  • Minimum of 7-10 years of experience in information security or cybersecurity, with 1-3 years in a managerial role.

  • Experience in ISO/IEC 27001 certification projects and maintenance.

  • Familiarity with data protection laws, industry regulations, and tools such as Microsoft Sentinel, CyberReason, and Microsoft Defender.

  • Strong knowledge of ISO/IEC 27001, NIST, CIS Controls, COBIT, ITIL, POPIA, and the Cybercrimes Act.

Skills and Competencies

  • Strategic Thinking – align security strategies with business objectives.

  • Technical Expertise – deep understanding of security frameworks, threat analysis, and mitigation.

  • People Management – build and lead cross‑functional teams.

  • Decision-Making and Judgment – balance immediate needs with long‑term goals.

  • Collaboration and Communication – engage stakeholders at all levels.

  • Problem-Solving and Analytical Skills – resolve complex security challenges.

  • Compliance and Regulatory Knowledge – ensure ongoing adherence to laws and standards.

  • Adaptability and Resilience – thrive in a changing security landscape.

  • Ethical Integrity – uphold the highest ethical standards.

We look forward to hearing from you!

#J-18808-Ljbffr


Required Skill Profession

Quality Management



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your Information Security Potential: Insight & Career Growth Guide