22 Feb 2018: Blue Label Telecoms earnings b...  |  14 Feb 2018: Making the cut...


Job Information
Job title
Information Security and Governance Executive
Location / Operation
Blue Label Distribution - Johannesburg Gauteng South Africa
Blue Label Distribution
Job reports to
Chief Technology Officer
Job Purpose

To establish governance required to standardise and embed information security in Blue Label Telecoms to protect information assets. This includes oversight of activities such as Awareness, Communication, Training, Payment Card Industry (PCI) compliance, and overall information security governance amongst others


IT Governance Management

  • Design and develop security measures that support the Information Security to ensure alignment with the organizational strategy
  • Developing information security governance activities related to the availability, integrity, privacy and confidentiality of information
  • Support operational information security governance for all applications, databases, operating systems, networks, infrastructure components and users
  • Develop and implement the risk management process through the implementation of risk mitigation strategies based on Information Security best practice principles
  • Review and provide input to business cases and Technology specification documents
  • Ensure compliance with Information Security Policies, Procedures and Processes
  • Lead the development, implementation and maintenance of Information Security Policies, processes and procedures based on industry standards and best practices
  • Take appropriate measures to safeguard the company, customer and proprietary information from threats and vulnerabilities.
  • Support colleagues in the implementation of security measures for internal customers.
  • Implementation and execution of performance of analysis, advisory services, and the maintenance of Information Security policy(s), standards, guidelines, and procedures that are deployed and or developed in support of computer operating systems and or applications used by the organization.
  • Support and deliver information security administration and provide technical and problem support to internal customers.
  • Define and implement Information Security projects.
  • Monitor information security controls based on changes to the landscape, legislation and governance requirements

IT Risk Management

  • Oversee the management of the Risk Register to ensure that clear mitigation strategies have been defined and that the implementation of the mitigation strategies are effective
  • Review audits, inspections, testing and/or reviews of relevant processes and management controls by various internal groups and external groups
  • Review IT risk management registers and report to the Chief Technology Officer
  • Ensure compliance with the Change and Release Management process
  • Engage with internal and external stakeholders on IT risk management procedures
  • Develop, implement and execution of the risk management tools and risk assessments to ensure accuracy and completeness of information and security practices

IT Disaster Recovery

  • Development, implementation and testing of the Disaster Recovery Strategy
  • Ensure that the Disaster Recovery Plans (DRP) are aligned with the business defined recovery point and recovery time objectives
  • Ensure that Disaster Recovery Plan tests conducted according to the agreed test plan

Management of IT Governance vendors

  • Manage and ensure the supplier/vendor security management process is effective and based best practices and regulatory compliance.
  • Manage security related contracts and non-disclosure agreements with security suppliers, vendors and service providers.
  • Maintain professional relationships with security service providers.
  • Provide customer service to internal and external clients

Work collaboratively

  • Build a culture of respect and understanding across the organisation
  • Recognise outcomes which resulted from effective collaboration between teams
  • Build co-operation and overcome barriers to information sharing, communication and collaboration across the organisation
  • Facilitate opportunities to engage and collaborate with external stakeholders to develop joint solutions


  • Follow through to ensure that personal quality and productivity standards are consistently and accurately maintained
  • Demonstrate consistent application of internal procedures
  • Plan and prioritise, demonstrating abilities to manage competing demands
  • Demonstrate abilities to anticipate and manage change
  • Demonstrate flexibility in balancing achievement of own objectives with abilities to understand and respond to organizational needs
Requirements of the Job
  • Information Security experience, with broad knowledge in all areas of Information Security, including but are not limited to payment technologies, virtualization, cryptography, networking and database security
Minimum qualifications
  • Bachelors’ degree or the equivalent diploma in Computer Science / Information systems / Information technology
  • ITIL Certification


Competencies / Behaviour
  • Ability to work with cross-organizational and cross-functional teams in a global matrix environment.
  • Five years’ experience on security projects for major organisations is desirable
  • Strong written and verbal communication skills, including listening
  • Experience in developing and delivering presentations to management
  • In-depth knowledge of security operations capabilities
  • Maintain knowledge of toolsets, techniques and technologies used
  • Knowledge of client server development techniques
  • Knowledge of database architecture, design and operation
  • Collaboration across organisations
  • Be a Change Agent
Behavioural attributes


  • Evaluating problems
  • Investigate Issues
  • Creating innovation
  • Building Relationships
  • Communicating Information
  • Providing Leadership
  • Showing Resilience
  • Adjusting to change
  • Giving Support
  • Processing Details
  • Structuring Tasks
  • Driving success


  • Judgment
  • Strategy
  • Execution and Results
  • Customer centered
  • Talent
  • Planning and Improvement
  • Influence and Communicate
  • Ethics and Compliance
  • Adaptability
Closing date for applications
Saturday, 25 May 2019

Apply Now
Please fill in all the * mandatory fields
Are you an internal candidate, external candidate or a referral candidate? *
Internal   External   Referral
First name *
Surname *
E-mail *
Are you a South African citizen?
Yes   No
Area you live in
If not a South African citizen do you have a work permit?
Yes   No
ID / Passport / Work Permit number
Date of birth
Expected salary
Current salary
Are you currently working in the same role?
Yes   No
If so, how many years have you spent in the role?
Do you have your own transport?
Yes   No
Do you have a valid driver's licence?
Yes   No
When can you start?
Letter of motivation
Upload your CV:
(Only PDF, Word Doc, Excel and PowerPoint files allowed)
Please confirm the information entered is true and correct.

 Previous page

MEET Our Team

Mark and Brett Levy, Joint CEOs

Our Board


  View all events