109 Conducting Vulnerability Assessments jobs in South Africa

Network Security Analyst

Optimal Growth Technologies

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Direct message the job poster from Optimal Growth Technologies

Overview

Location: Remote a0 South Africa

We7re looking for a highly skilled Network Security Analyst to join our forward-thinking, security-driven team. In this role, you7ll be the guardian of our digital infrastructured ensuring that firewalls, network rules, and security configurations are robust, compliant, and ready to face emerging threats.

Responsibilities
  • Manage and resolve firewall-related tickets efficiently.
  • Add, modify, and optimize firewall rules in line with security best practices.
  • Configure Palo Alto firewalls confidently and effectively.
  • Implement secure changes without disrupting business operations.
  • Monitor and analyze security systems to proactively prevent breaches.
Required Skills & Qualifications
  • Proven experience managing and configuring Palo Alto firewalls.
  • Strong understanding of firewall rule creation and security change management.
  • Familiarity with common security protocols and network monitoring tools.
  • Excellent troubleshooting and analytical skills.
Nice to Have
  • Experience working with Checkpoint firewalls.
  • Exposure to other enterprise security solutions.
Why Join Us?
  • 100% remote work e operate from anywhere in South Africa.
  • Competitive salary aligned with experience.
  • Join a dynamic, security-focused team with cutting-edge tools and projects.
Job Details
  • Seniority level: Mid-Senior level
  • Employment type: Contract
  • Job function: Information Technology
  • Industries: IT Services and IT Consulting

Referrals increase your chances of interviewing at Optimal Growth Technologies by 2x

Get notified about new Network Security Analyst jobs in South Africa .

Cape Town, Western Cape, South Africa 2 weeks ago

City of Johannesburg, Gauteng, South Africa 1 day ago

Cape Town, Western Cape, South Africa 5 months ago

Cape Town, Western Cape, South Africa 5 months ago

Cape Town, Western Cape, South Africa 2 weeks ago

We7re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

NETSTOCK

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities

  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content

Required Skills and Qualifications

  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders

Preferred Skills and Qualifications

  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Gauteng, Gauteng Teraco – A Digital Realty Company

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Teraco Data Environments

2025/07/24 Gauteng

Job Reference Number: PSA_JB3

Department: Security

Business Unit

Industry: Information Technology

Job Type: Permanent

Positions Available: 1

Salary: Market Related

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting.

Job Description

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

Main Functions Of The Job

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

Job Requirements

Skills Requirement

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

Qualifications And Experience

  • Matric
  • Experience in Vendor Management and related SLA’s
  • Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • A+
  • N+
  • Microsoft Excel

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Finance and Sales
  • Industries Facilities Services

Referrals increase your chances of interviewing at Teraco – A Digital Realty Company by 2x

Get notified about new Investment Analyst jobs in Gauteng, South Africa .

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 5 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Talent Pool: Investment Consultant (Johannesburg) MMH Talent Pool: Investment Consultant (Johannesburg)

Pretoria, Gauteng, South Africa 1 day ago

Johannesburg, Gauteng, South Africa 1 week ago

Pretoria, Gauteng, South Africa 2 weeks ago

Centurion, Gauteng, South Africa 3 months ago

Talent Pool: Investment Regional Manager - Countrywide MMH

Centurion, Gauteng, South Africa 4 months ago

Johannesburg, Gauteng, South Africa 1 day ago

Talent Pool: Investment Regional Manager - Countrywide MMH

Centurion, Gauteng, South Africa 2 days ago

Pretoria, Gauteng, South Africa 2 weeks ago

Johannesburg, Gauteng, South Africa 1 month ago

Senior Lecturer (College of Business & Economics: Department of Finance & Investment Management) Intermediate Business Analyst – Become Senior Business Analyst working for SA’s leading wealth manager – Johannesburg – R650K PA

City of Johannesburg, Gauteng, South Africa 15 hours ago

Springs, Gauteng, South Africa 4 days ago

Senior Business Analyst | Waterfall, Gauteng | Permanent

Johannesburg, Gauteng, South Africa 5 days ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa ZAR60,000.00-ZAR72,000.00 1 month ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa 5 days ago

SPECIALIST ANALYST INVESTMENT PROVIDERS DEPARTMENT

Sandton, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 2 months ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 4 days ago

Business Analyst – Design investment management platform features for SA’s leading wealth manager – Johannesburg – R810K PA

Johannesburg Metropolitan Area 15 hours ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Offensive Security Analyst

Cape Town, Western Cape S-RM

Posted 27 days ago

Job Viewed

Tap Again To Close

Job Description

S-RM Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Offensive Security Analyst role at S-RM

S-RM Cape Town, Western Cape, South Africa

Join to apply for the Offensive Security Analyst role at S-RM

Offensive Security Analysts support our delivery consultants running our offensive security services. They help to interpret client challenges, innovate solutions, and deliver findings. Our aim is to become trusted advisors to our clients.

You will work across the full spectrum of our pentesting services, whether point in time or continuous, as well as participate in larger engagements such as red teams. You will help our clients to build cyber resilience, enhance their understanding of the threat landscape and become better prepared to face dynamic and evolving security risks.

1.1 Main Duties And Responsibilities

Client Engagement and Account Management

  • Engage with clients to understand their cyber security challenges
  • Translate client challenges into solutions that fit S-RM's Offensive Security service offering and value proposition
  • Develop an understanding of delivery timelines, project resourcing requirements and pricing
  • Understand S-RM's proposal process and lead on proposal writing and presentations in some cases
  • Contribute to the expansion of client accounts and winning of new business
  • Gain an understanding of S-RM's target sectors and industries



Offensive Security

  • Penetration testing
    • Vulnerability assessments and monitoring
    • External infrastructure
    • External Attack Surface Management
    • Web application
    • API pentesting
    • Phishing and spear phishing
    • Internal pentesting
    • Mobile application pentesting (Android and iOS)
    • OT Pentesting
    • IOT Pentesting
    • Cloud Pentesting
    • Open-Source Intelligence (OSINT) gathering


  • Configuration Reviews
    • Cloud configuration review
    • Application configuration review
    • Hardware build review
    • Firewall review


  • Delivery & Client communications
    • Deliver findings in a range of formats, including written reports, presentations, and verbal briefings


  • Threat Intelligence
    • Keep abreast of threat intelligence developments, threat actor activity and security industry developments in mitigations and tooling
    • Develop and deliver client threat profiles, threat assessments and dark web analysis
Project Management



  • Support vCISO engagements, accessing the full range of S-RM's resources and expertise
  • Collaborate with incident response, ethical hacking, and digital forensics teams to integrate our services and support to clients
  • Support the delivery of retainer relationships
  • Support the delivery of the Attack Surface Management (ASM) service



Internal Initiatives and Strategy

  • Support internal initiatives on product development, process management, tech enablement, efficiency and exploring different ways to support clients
  • Contribute to the adaption of security frameworks to create innovative products
  • Challenge received wisdom and existing products and services. Suggest alternative approaches where appropriate
    • Develop documentation and evolve the testing methodologies where applicable
Professional Development and Domain Knowledge



  • Commit to continuous professional development and personal knowledge improvement across the full range of cyber security competencies, in line with personal utilisation targets (see Objectives)
  • Complete up to one formal training course over the financial year. This is beyond internal training sessions
  • Share knowledge with the wider team in line with company values, including contributing to internal training initiatives and programmes

Seniority level
  • Seniority level Entry level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Security and Investigations

Referrals increase your chances of interviewing at S-RM by 2x

Sign in to set job alerts for “Security Analyst” roles.

Cape Town, Western Cape, South Africa 3 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Business Intelligence Business Analyst III (BIBA III)

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa ZAR450,000.00-ZAR700,000.00 1 month ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 4 months ago

Cape Town, Western Cape, South Africa 2 weeks ago

L2 Security Operations Centre (SOC) Analyst

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 3 months ago

Cape Town, Western Cape, South Africa 3 weeks ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 3 months ago

Stellenbosch, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 3 months ago

MS Sentinel SIEM Security Engineer (South Africa)

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 3 days ago

Stellenbosch, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

Security Operations Engineer – Identify and Access Management (IAM) Specialist

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Engineer (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Gauteng, Gauteng Crayon Technologies Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

How you'll role As a Technical Security Analyst, you will be on the frontline of our cyber defense strategy. Your mission is to safeguard our digital environment by identifying and responding effectively to threats. You'll work collaboratively with cross-functional teams, providing expertise in forensic analysis, vulnerability assessment, and threat intelligence. Your role is essential in interpreting complex server logs and evaluating the impact of vulnerabilities on the business. If you're passionate about cyber forensics and building resilient, secure systems, this is a perfect opportunity for you. What you'll do Collect and preserve forensic evidence from servers, endpoints, and cloud environments Access, read, and interpret server logs, audit trails, and system data Analyze logs for suspicious activity and known attack signatures Evaluate the likelihood and potential consequence of exploitation and provide mitigation recommendations Collaborate with DevOps, IT, and Security teams during incident response Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR) Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns What you'll need Proficiency in forensic tools and techniques Generalist understanding of server infrastructure and core security concepts Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.) Experience with CVE tracking, vulnerability scanners, and mitigation workflows Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.) Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders Preferred experience Hands-on incident response or blue team roles Exposure to SIEM platforms Understanding of chain-of-custody and legal considerations in evidence handling IDS/IPS knowledge Ability to track vulnerabilities through to remediation Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK Ability to perform hypothesis-driven hunts and pivot off findings Knowledge of cloud platforms: AWS, Linode, Hetzner Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This advertiser has chosen not to accept applicants from your region.

Cyber security analyst

Johannesburg, Gauteng InfyStrat

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

permanent
Infy Strat is seeking a motivated Cyber Security Analyst to join our team and contribute to our mission of safeguarding our digital assets and infrastructure. In this role, you will monitor, detect, and respond to security threats, vulnerabilities, and incidents across our systems. You'll perform risk assessments, analyze security breaches, and provide remediation recommendations while collaborating with various teams to enhance our security posture. This is a fantastic opportunity to grow your skills in a fast-paced environment while playing a critical role in protecting our organization from cyber threats. Key Responsibilities: Monitor security alerts and events from various sources, including SIEM tools, to identify and respond to security threats. Conduct thorough investigations of security incidents, documenting findings and coordinating response actions. Assist in the development and implementation of security policies, procedures, and guidelines to protect sensitive information. Perform vulnerability assessments and penetration testing to identify security weaknesses. Analyze trends and patterns in security incidents and provide recommendations for improving defense mechanisms. Stay updated on the latest cybersecurity threats, vulnerabilities, and best practices. Work with IT and development teams to ensure secure configurations and practices across all systems. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 2+ years of experience in cybersecurity, information security, or a related role. Strong understanding of security principles, concepts, and technologies. Experience with security monitoring tools, SIEM platforms, and incident response procedures. Familiarity with network security, firewalls, intrusion detection/prevention systems, and secure coding practices. Knowledge of security frameworks and regulatory standards (e.g., NIST, ISO 27001, GDPR). Strong analytical and problem-solving skills, with attention to detail. Excellent communication skills to effectively collaborate with cross-functional teams. CERT, CISSP, CISM, or equivalent security certifications are a plus. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Teraco

Posted 19 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

MAIN FUNCTIONS OF THE JOB

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

SKILLS REQUIREMENT

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • li>Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

QUALIFICATIONS AND EXPERIENCE

  • Matric
  • Experience in Vendor Management and related SLA’s
  • li>Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • li>IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • li>A+
  • N+
  • Microsoft Excel
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Conducting vulnerability assessments Jobs in South Africa !

Penetration Tester (Security Analyst)

Johannesburg, Gauteng DataFin

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

ENVIRONMENT

A leading cybersecurity company based in Johannesburg is seeking a skilled and detail-oriented Red Team Penetration Tester /Security Analyst to join their dynamic team. The ideal candidate will have 2-5 years of hands-on experience in Penetration Testing, with a strong background in identifying and mitigating security vulnerabilities across various environments. This role involves conducting comprehensive security assessments, including but not limited to network, mobile, web, thick-client, wireless, social engineering, and physical penetration testing. The successful candidate will be responsible for analysing security risks, providing actionable recommendations, and collaborating with clients and internal teams to enhance overall cybersecurity posture. If you are passionate about ethical hacking, threat analysis, and proactive security measures, this is an excellent opportunity to grow your career in a fast-paced and innovative environment.

DUTIES Penetration Testing Duties
  • Work as part of a vulnerability assessment and /or penetration testing team, taking direction from line managers and executing directives in a thorough and timely fashion
  • Conduct vulnerability assessments on a wide variety of technologies and implementations utilising both automated tools and manual techniques
  • Conduct network penetration tests
  • Conduct application penetration tests (web and thick client)
  • Conduct wireless and mobile security assessments
  • Conduct social engineering assessments
  • Conduct physical security assessments
  • Effectively communicate successes and obstacles with fellow team members and line managers
  • Interface with client contact(s) and staff in a constructive and professional manner
  • Develop subject matter expertise in topics to include network, database, wireless and application security assessments and adversarial network operations
  • Utilise common vulnerability assessment and penetration testing tools
Red Teaming Duties
  • Working as part of a Red Team and assisting with the following duties (but not limited to):
  • Initial reconnaissance – open-source intelligence (OSINT) for collecting information on the targets
  • Initial compromise – gaining a foothold into the target environment through targeting weaknesses in people, process and / or technology.
  • Deploy command-and-control servers (C&C or C2) and custom payloads to establish communication / persistence in the target’s network.
  • Develop tools, techniques and procedures to evade detection by blue team (including the development of custom payloads)
  • Escalate privileges and maintain persistence
  • Exfiltrate and / or complete objectives
Research and Development Duties
  • Research new vulnerabilities with a focus on high-profile products
  • Understand the terminology and tactics employed by threat actors Research new attack methods
REQUIREMENTS
  • Minimum 2-5 years of Penetration Testing experience required Including conducting different types of assessments, such as network, mobile, web, thick, wireless, social engineering, physical, etc.
  • Previous Red Team experience required

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

It Security Analyst Umhlanga

Umhlanga Rocks, KwaZulu Natal Careerbox

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

IT Senior Security Analyst

Are you ready to take the lead in transforming cybersecurity landscapes and safeguarding digital frontiers? Our esteemed BPO firm is on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This pivotal role is at the heart of our security operations, offering the chance to shape security architecture, deploy cutting-edge technologies, and spearhead our cyber defense initiatives.

Duties & Responsibilities
  • Practical planning and implementation of effective cyber defense and detection technologies.
  • Work with IT Ops on identified systems vulnerabilities to seek long-term solutions.
  • Formulate and evolve document standards through the use of known best practices.
  • Improved documentation aligned to industry best practices.
  • Enhanced reporting with clear data-driven results for use during security assessments, incident analysis, and root cause investigations.
  • Lead remediation recommendations and ensure incident closure and compliance.
  • Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes.
  • Monitor networks and connected devices for security issues.
  • Proactively respond to and report on DLP, IPS/IDS, ATP, APT detection, help devise remediation actions and improvement plans.
  • Track and help manage remediation efforts ensuring a mature document trail.
  • Use formal and agreed processes, methods, and standards to address incident management in a mature manner, ensuring effective remediation, business impact, and root cause analysis.
  • Investigate all cyber security incidents.
  • Aid in the documentation of security breaches and provide remediation recommendations.
  • Assess security incidents and measure organizational impact.
  • Ensure and improve the organization’s IT Security and regulatory compliance.
  • Development and implementation of effective “first-line of defense” protection solutions.
  • Implement and report against scheduled sensitive data discovery.
  • Stay current on IT security trends and news (Trusted 3rd Party Notifications).
  • Research security enhancements and make recommendations to management.
  • Perform cyber security protection and detection systems design, deployment, and enhancement.
Desired Experience & Qualification
  • Relevant IT Security certification or equivalent.
  • Minimum 5 years’ experience in IT systems engineering.
  • Minimum 3 years’ experience in IT security incident response.
  • Experience with computer network vulnerability testing tools and techniques.
  • Experience with vulnerability remediation in and across various technologies.
  • Good understanding of firewalls, proxies, SIEM, AV, and IDS/IPS concepts.
  • Understanding of Wireless network security and protection mechanisms.
  • Understanding of cyber security centric documentation and evidence collection.
  • Experience with industry standard InfoSec tools and techniques i.e. O365 Security Centre, Mimecast, Qualys, AV, SIEM’s, Qualys and Nessus, unstructured data scanning, rogue detection, etc.
  • Pentest experience and exposure.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

IT Senior Security Analyst

Umhlanga Rocks, KwaZulu Natal Careerbox

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

IT Senior Security Analyst

Are you ready to take the lead in transforming cybersecurity landscapes and safeguarding digital frontiers? Our esteemed BPO firm is on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This pivotal role is at the heart of our security operations, offering the chance to shape security architecture, deploy cutting-edge technologies, and spearhead our cyber defense initiatives.

Duties & Responsibilities
  • Practical planning and implementation of effective cyber defense and detection technologies.
  • Work with IT Ops on identified systems vulnerabilities to seek long term solutions.
  • Formulate and evolve document standards through the use of known best practices.
  • Improved documentation aligned to industry best practices.
  • Enhanced reporting with clear data driven results for use during security assessments, incident analysis and root cause investigations.
  • Lead remediation recommendations and ensure incident closure and compliance.
  • Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes.
  • Monitor networks and connected devices for security issues.
  • Proactively respond to and report on DLP, IPS/IDS, ATP, APT detection, help devise remediation actions and improvement plans.
  • Track and help manage remediation efforts ensuring a mature document trail.
  • Use formal and agreed processes, methods, and standards to address incident management in a mature manner, ensuring effective remediation, business impact and root cause analysis.
  • Investigate all cyber security incidents.
  • Aid in the documentation of security breaches and provide remediation recommendations.
  • Assess security incidents and measure organisational impact.
  • Ensure and improve organisation’s IT Security and regulatory compliance.
  • Development and implementation of effective “first-line of defence” protection solutions.
  • Implement and report against scheduled sensitive data discovery.
  • Stay current on IT security trends and news (Trusted 3rd Party Notifications).
  • Research security enhancements and make recommendations to management.
  • Perform cyber security protection and detection systems design, deployment, and enhancement.
Desired Experience & Qualification
  • Relevant IT Security certification or equivalent.
  • Minimum 5 years’ experience in IT systems engineering.
  • Minimum 3 years’ experience in IT security incident response.
  • Experience with computer network vulnerability testing tools and techniques.
  • Experience with vulnerability remediation in and across various technologies.
  • Good understanding of firewalls, proxies, SIEM, AV, and IDS/IPS concepts.
  • Understanding of Wireless network security and protection mechanisms.
  • Understanding of cyber security centric documentation and evidence collection.
  • Experience with industry standard InfoSec tools and techniques i.e. O365 Security Centre, Mimecast, Qualys, AV, SIEM’s, Qualys and Nessus, unstructured data scanning, rogue detection etc.
  • Pentest experience and exposure.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Conducting Vulnerability Assessments Jobs