IT Security Advisor Remote Position
South Africa
Listed on 2026-03-06
-
IT/Tech
Cybersecurity, IT Consultant
Vera Safe is an innovative and successful U.S. headquartered privacy and cybersecurity compliance consulting firm and law firm. Due to rapid growth and increased demand for our international privacy and technology compliance and legal services, Vera Safe is seeking creative, motivated, and collaborative IT security experts to join our team. This is a fully remote position.
Watch / listen to learn more about Vera Safe:Check out our podcast!
Apple Podcast
:
You Tube
:
Vera Safe’s mission:
Provide the world’s best data protection advice, with a human touch. Right now, we are seeking an IT Security Advisor to join our growing team and help us pursue this mission.
Our clients vary in size, location, industry, and service needs, and they love the way we advise on privacy compliance. They love our work so much, in fact, that there is a growing demand for our cybersecurity consulting (hence the need for you!).
This is an excellent opportunity for anyone who wants to join a team working on the cutting edge of privacy, data protection, and cybersecurity, and is excited about assisting a wide range of clients with fractional CISO-type support, including IT security program design, implementation, and management.
Key Responsibilities Practice Development:- Serve as an integral part of Vera Safe’s cybersecurity consulting practice area through the management of client relationships and both individual and team projects/deliverables.
- Expand on Vera Safe’s security consulting offerings, including—but certainly not limited to—Microsoft 365 hardening, configuration auditing, and risk assessment.
- Further develop internal service delivery methodologies, documentation, templates, and quality control processes.
- Handle consulting projects, including fractional-CISO-type engagements, with a strong focus on securing Microsoft 365 environments.
- Conduct detailed cybersecurity risk assessments, including analysis of current security controls, vulnerabilities, and threat landscape.
- Provide oversight and strategic direction for incident response, including breach containment, investigation, and post-incident review.
- Lead and execute security assessments, architecture reviews, IT security policy drafting and implementation, and remediation planning.
- Communicate findings and recommendations to clients clearly and professionally either through written reports and executive briefings or execution of hands‑on implementation.
- Build trusted relationships with client stakeholders, including CISOs, IT directors, and compliance teams.
- Collaborate with project managers and privacy‑focused project teams to determine and meet client requirements and specific project needs. Analyze practical situations and develop solutions to specialized needs.
Collaboration:
- Stay current on evolving security threats and technologies.
- Represent our IT security practice internally and externally, including contributions to client alerts and conference talks.
- Collaborate with Vera Safe’s Professional Services team to ensure tight integration between our IT security and privacy advisory services.
- At least four years of hands‑on experience in IT security consulting, IT security engineering, or equivalent.
- At least one relevant certification (e.g., CISA, CISSP, CISM, CRISC, CCSP, SC-100 Cybersecurity Architect).
- Deep technical expertise in Microsoft Defender XDR, Crowd Strike Falcon, Sentinel One, or other similar technologies.
- Proficiency with IT security standards and frameworks (e.g., NIST CSF, ISO/IEC 27001, NIST 800-53, NIST 800-171, CIS Controls).
- Experience performing audit readiness assessments for frameworks, laws, and regulations (e.g., POPIA, HIPAA, ISO, NIST, GLBA).
- Technical background in scripting, automation, or security tooling (e.g., Power Shell, Sentinel, Defender for Endpoint).
- Experience developing and conducting tabletop exercises such as Business Continuity and Disaster Recovery scenarios.
- Strong understanding of email security (e.g., DKIM, DMARC, SPF).
- Familiarity with security stacks (e.g., SIEM/SOAR, IAM, EDR, CASB).
- Strong understanding of cloud security posture…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: