239 Cybersecurity jobs in South Africa
Cybersecurity Engineer
Posted 12 days ago
Job Viewed
Job Description
You have a strong technical background in cybersecurity? You feel at home protecting both front-end and back-end environments? You implement secure, scalable, and clean solutions with attention to detail?
Join Elixirr Digital as a Cybersecurity Engineer and help safeguard innovative, scalable web solutions for the future!
As a Cybersecurity Engineer , you’ll be responsible for designing, implementing, and maintaining security measures to protect serverless, web-based applications and infrastructure. Your role will involve securing systems and networks, performing vulnerability assessments, and deploying advanced security tools. You’ll collaborate with cross-functional teams to ensure security best practices are integrated into development processes and infrastructure.
At Elixirr Digital , you’ll have the opportunity to work with cutting-edge tools, grow alongside a team of talented professionals, and make a lasting impact in diverse industries.
What you will be doing as Cybersecurity Engineer at Elixirr Digital?
- Assess and analyze clients' existing cybersecurity controls, regulatory frameworks, and compliance requirements.
- Define and implement security controls and develop target operating models to meet business needs.
- Design and execute a comprehensive cybersecurity strategy, including a detailed expenditure plan for security improvements.
- Develop and maintain security policies, protocols, and procedures aligned with industry standards and best practices.
- Create operational implementation plans and oversee technology transformation projects.
- Lead high-level discussions with clients regarding security posture, focusing on the Microsoft stack, but with the ability to address broader security landscapes.
- Collaborate closely with the consulting team on cybersecurity strategy, and related initiatives.
- Provide guidance and technical leadership to the team.
Technologies we use:
Competencies and skillset we expect you to have to successfully perform your job:
Experience with Azure Security Center and Microsoft Security, including reviewing dashboards, identity, data, and system security controls.
Expertise in Cybersecurity and Network Security, with a focus on protecting infrastructure and applications.
Experience in reviewing and optimizing Wavenet MSSP implementations and use cases.
Familiarity with security consoles and tools, such as Mimecast and Meraki.
Ability to assist with cybersecurity strategy development, leveraging insights from assessments and findings.
Not required but nice to have:
Relevant certifications (e.g., CISSP, CEH, CompTIA Security+, Microsoft Certified: Azure Security Engineer Associate).
Knowledge of cloud security best practices, including IAM and data encryption.
Familiarity with container security (e.g., Docker, Kubernetes).
Experience with DevSecOps practices to streamline secure development and deployment processes.
We could be a perfect fit if you are:
Wonder why Elixirr Digital is the best place to work?
“Not everyone fits the mold.”Therefore, we provide a flexible,custom benefit systemfor our employees. You can choose a perfect combination from a wide range of various benefits. We want you to be a part of our mutual growth since day one, and we created a generousEmployee Stock Options Grantfor you, as well as participation in ourEmployee Share Purchase Plan (ESPP). Maybe you care about your health, and you want to monitor it year-to-year so you can choose afull medical checkup. If you are a sports enthusiast, then aMulti-sport cardis the right benefit for you. To cover your passion for technology, we offer an additional individual budget for theextra equipment.We are trying to assure you are fairly rewarded for your achievements and efforts
#J-18808-LjbffrCybersecurity Specialist
Posted today
Job Viewed
Job Description
The Cybersecurity Specialist is responsible for ensuring the security of systems, networks, and data, defending against breaches, vulnerabilities, and cyber-attacks. The role requires an in-depth understanding of security protocols, tools, and best practices to protect the organizations assets from cyber threats. Cybersecurity specialists are tasked with monitoring, detecting, and mitigating potential risks, while ensuring compliance with security regulations and standards. This position is crucial in maintaining the integrity and confidentiality of data and systems, as well as safeguarding against evolving cyber threats in a rapidly changing digital landscape.
Key Skills:- Security Tools: Proficient in using security tools and systems such as firewalls , Intrusion Detection Systems (IDS) , Intrusion Prevention Systems (IPS) , and Security Information and Event Management (SIEM) platforms to monitor and protect IT environments.
- Protocols & Encryption: Strong knowledge of HTTPS , SSL/TLS , and VPN protocols for securing data in transit and protecting user privacy.
- Scripting: Ability to automate security tasks, data collection, and analysis using scripting languages like Python and PowerShell .
- Compliance Standards: Knowledge and experience in compliance frameworks such as GDPR , ISO 27001 , PCI-DSS , and HIPAA to ensure that security practices align with legal and regulatory requirements.
- Threat Analysis: Expertise in performing risk assessments, identifying potential threats, and implementing appropriate mitigation strategies.
- Incident Response: Understanding of incident detection and response processes, including analyzing logs and network traffic to identify malicious activity.
- Conduct Vulnerability Assessments and Penetration Testing:
Perform regular vulnerability assessments to identify weaknesses in the system and infrastructure. Conduct penetration testing to simulate cyber-attacks and assess the systems resilience against threats. - Develop and Enforce Security Policies:
Design, implement, and enforce organizational security policies and procedures to safeguard systems and data. Ensure compliance with industry standards and internal guidelines. - Monitor and Respond to Security Incidents:
Continuously monitor network traffic, system logs, and alerts from security tools to detect and respond to potential threats in real-time. Take proactive measures to mitigate any security breaches, from malware outbreaks to unauthorized access. - Security Infrastructure Management:
Configure and manage firewalls, IDS/IPS systems, and other security tools to provide proactive protection against attacks. Optimize security settings for both internal and external communications. - Conduct Security Awareness Training:
Educate employees about best practices for maintaining security hygiene, recognizing phishing attempts, and adhering to organizational security policies. - Risk and Threat Analysis:
Evaluate potential risks to the organizations digital assets and infrastructure. Continuously assess emerging threats and adjust security measures accordingly to stay ahead of evolving attack strategies. - Incident Forensics and Reporting:
Investigate security incidents, identify the root cause, and recommend improvements to prevent future occurrences. Document incidents, responses, and remediation efforts for compliance and reporting purposes. - Collaboration with Other Teams:
Work closely with IT, development, and operational teams to ensure security is integrated into all processes and systems from the outset, particularly in the case of new technology deployments or system updates. - Continuous Improvement:
Stay current with the latest cybersecurity trends, emerging threats, and evolving attack vectors. Recommend and implement improvements to the security infrastructure, tools, and processes.
- Certifications like Certified Information Systems Security Professional (CISSP) , Certified Ethical Hacker (CEH) , Certified Information Security Manager (CISM) , or CompTIA Security+ are highly preferred.
- Experience with advanced threat detection tools and techniques (e.g., AI/ML-based security systems ).
- Proficiency in analyzing network traffic using Wireshark or similar tools.
Cybersecurity Analyst
Posted 8 days ago
Job Viewed
Job Description
Security Monitoring
- Perform log ingestion, define use cases, and create alerts for critical assets.
- Perform daily SIEM health checks and remediate accordingly.
- Monitor security alerts and events using various tools and technologies.
- Analyze and investigate security incidents to identify potential threats.
- Collaborate with team members to develop and implement effective monitoring strategies.
- Using IOCs and threat intelligence, perform threat hunting across environment.
- Respond promptly to security incidents, provide initial analysis, conduct business impact assessment, isolate, eradiate and recovery from threats.
- Document and report incidents, ensuring accurate and comprehensive records.
- Follow established incident response procedures, playbooks and contribute to their enhancement.
- Manage and maintain endpoint security and EDR solutions.
- Perform daily health checks endpoint security and EDR solutions and remediate accordingly.
- Conduct regular scans and assessments to identify and mitigate potential vulnerabilities.
- Work with IT teams to ensure endpoint security configurations align with organizational standards.
- Assist in the identification and prioritization of vulnerabilities within the organization's infrastructure.
- Collaborate with system owners and IT teams to remediate identified vulnerabilities.
- Stay informed about the latest security threats and vulnerabilities.
- Monitor and analyze email traffic for potential security threats.
- Respond to and mitigate email-borne security incidents.
- Work with email security solutions to enhance protection against phishing and malware attacks.
- Relevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience.
- One or more certifications in: EC-Council SOC, Security+, AWS Certifications, Microsoft Certifications, Google Certifications
- Must have 3-6 years' experience in a Cybersecurity related role.
- Practical experience with system monitoring SIEM, assessment, and reporting tools (ArcSight, IBM QRadar, Splunk, Sentinel, Exabeam, SIEMonster, AlientVault etc.)
- Practical experience with EDR and XDR tools.
- Proficiency in network security, operating systems, and security technologies.
- Experience with common information technologies (Windows, VMware, and Cisco as well as some UNIX, Linux).
- Experience with Vulnerability and Malware Analysis (threat and attack analysis).
- Experience with security tools (WAF, Proxy, DNS, IDS, firewalls, anti-virus, data loss prevention, etc.).
- Knowledge of Cloud Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Protection
- Technology experience to be considered; Security+; Microsoft Security Certifications (MS-SC200); Azure Certifications, Recognised SOC certification
- Ability to work in independent environments under aggressive timelines.
- Ability to develop and maintain working relationships in a global environment.
- Excellent analytical and problem-solving skills
- Outstanding written skills for preparing reports and briefings.
- Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner
- Decision Quality - consistently makes timely, well-rounded and informed decisions
- Ensures Accountability - takes accountability and ensures others are held to account on agreed upon performance targets
- Manages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problems
- Tech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growth
Cybersecurity Engineer
Posted 7 days ago
Job Viewed
Job Description
Company Description
Aspen TESS is Aspen's technology enabled shared services business, established to be a partner in unlocking business value through digital innovation and process efficiency. Aspen TESS will eliminate repetitive effort and use technology to optimize standardized processes, by delivering cost-effective services and innovative solutions to Aspen business units globally.
OBJECTIVE
The Cybersecurity Engineer plays a crucial role in protecting Aspen’s infrastructure by implementing, maintaining, and enhancing security technologies and processes. This role works closely with the SOC, IT, and Compliance teams to ensure systems and data remain secure and threats are identified and mitigated.
p>Below is a general description of the key responsibilities, qualifications, and skills needed for this role:KEY RESPONSIBILITIES
Incident Response and Escalation
- Act as a Tier 2/3 escalation point for complex security incidents raised by the SOC or IT teams.
- Lead and support incident response activities, including forensic analysis and root cause investigation.
- Support red/blue team exercises to test and improve detection, response, and defense capabilities.
Security Platform Management
- Manage configurations and policies for the Cyber Security platforms, ensuring optimal performance and alignment with security standards.
Vulnerability Management
- Analyze vulnerability scan reports to identify and assess security weaknesses.
- Coordinate remediation efforts with relevant teams and ensure timely closure of vulnerabilities
Secure Systems and Network Configuration
- Collaborate with IT teams to implement secure system and network configurations, following industry best practices and compliance requirements.
Training and Mentorship
- Provide training and mentorship to junior analysts, fostering their professional development and enhancing team capabilities.
Project Involvement
- Participate in cross-functional IT and business projects to ensure security requirements are identified, integrated, and enforced throughout the project lifecycle
SKILLS AND COMPETENCIES:
- Hands-on experience with Cisco Umbrella, Defender for Endpoint, Identity, Office, and Sentinel.
- Working knowledge of SIEM, SOAR, EDR, vulnerability and data protection tools.
- Scripting skills (e.g., PowerShell, Python, KQL) for automation and threat hunting.
- Strong understanding of networking, authentication, certificates and cloud security principles.
- Familiarity with MITRE ATT&CK, NIST CSF, and other industry frameworks.
- Strong analytical and problem-solving skills.
- Clear and concise communication for incident handling and documentation.
- Collaborative mindset with the ability to work independently when required.
- Effective multitasking under pressure.
QUALIFICATIONS & EXPERIENCE
- Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent experience). li>Preferred certifications:
Microsoft Certified: Security Operations Analyst Associate
Microsoft Security, Compliance, and Identity Fundamentals
Cisco Certified CyberOps Associate or CCNP Security
CompTIA Security+, CySA+, or similar
Competence Lead Cybersecurity
Posted today
Job Viewed
Job Description
FULLTIME Amersfoort
Jij + Leadership + Security Visie = Onze Onited Competence Lead Cybersecurity
Locatie: N.t.b. (Amersfoort, Rotterdam, Zwolle hebben de voorkeur)
We groeien hard. Onze klanten vertrouwen op ons voor stabiele, schaalbare én veilige IT-oplossingen. En daar komt steeds meer bij kijken. Daarom zoeken we een Competence Lead Cybersecurity als aanjager van ons cybersecurity Competence Center.
Als Cybersecurity Competence Lead Ben Je Verantwoordelijk Voor Het Doorontwikkelen En Implementeren Van Het Cybersecurity Portfolio Van Onited Voor Onze Klanten. Je Coacht Een Team Van Cybersecurity Professionals In Het Onderhouden, Optimaliseren En Continu Vernieuwen Van Onze Cybersecurity Diensten. Met Deze Diensten Ondersteunen We Onze Klanten Van Begin Tot Eind Bij De Inrichting Van Cybersecurity
Bepaling van governance en strategie aan de hand van frameworks als NIST en ISO27001.
Compliance met geldende wet- en regelgeving als NIS2, de AVG en NEN7510.
Identificatie en mitigatie van kwetsbaarheden in systemen en applicaties.
Uitrol van preventieve beveiligingsmaatregelen als onderdeel van ons complete dienstenportfolio.
Managed Detection & Response voor het detecteren en stoppen van cyberdreigingen.
Effectief en efficiënt herstel van systemen en informatie in geval van issues.
Je werkt als Cybersecurity Competence Lead nauw samen met de Leads van andere Competences (o.a. Cloud, Network en Data & AI) rondom de bepaling en implementatie van best practices en innovatie. Maar ook met commerciële collega’s en onze marketing afdeling voor het promoten van onze cybersecurity diensten.
Belangrijkste Verantwoordelijkheden
- Je ontwikkelt en bewaakt de visie en het portfolio rondom onze cybersecurity diensten.
- Je bouwt aan een sterk team van security professionals (SecOps, consultancy, compliance).
- Je bent sparringpartner voor klanten én collega’s over strategische en technische securityvraagstukken.
- Je vertegenwoordigt security in pre-salestrajecten, assessments en complexe projecten. Je initieert verbeteringen, projecten en innovaties binnen het securitydomein.
- Je borgt kennisontwikkeling binnen het team door middel van trainingen, kennissessies en coaching.
- Je zorgt voor verbinding tussen teams: van Security tot Sales en Customer Support.
- Je verdiept je in de nieuwste trends en best practices op het gebied van cybersecurity.
- Je bouwt en onderhoudt strategische samenwerkingen met leveranciers en partners.
Een uitdagende brede rol, waar je de mogelijkheid krijgt om het cybersecurity team naar een hoger platform te tillen.
Dit Kun Je Verwachten
- Goed salaris op basis van kennis en ervaring.
- De kans om te bouwen aan een eigen team van security professionals.
Solliciteren
Jouw competenties
Wij Zoeken Vooral Enthousiaste Collega's Die Graag Samen Met Ons Aan Arcus IT Willen Bouwen! Daarnaast Zou Het Mooi Meegenomen Zijn Als Je Aan De Volgende Wensen Voldoet
- Ruime ervaring (5+ jaar) in cybersecurity - bijvoorbeeld als senior engineer, consultant of lead.
- Uitstekende communicatie- en interpersoonlijke vaardigheden.
- Je schakelt makkelijk tussen techniek en strategie.
- Vermogen om samen te werken met cross-functionele teams.
- Je hebt ervaring met het coachen, aansturen of begeleiden van professionals.
- Sterke analytische en probleemoplossende vaardigheden.
- Relevante certificeringen als onderbouwing van je expertise (CISSM, CISSP, CISA) zijn een pré, maar niet heilig.
Naast Natuurlijk Mooie Arbeidsvoorwaarden Kun Je Verwachten Dat Je Bij Een Informele En Groeiende Organisatie Komt. Uitdaging? Ontwikkeling? Dat Zal Ook Zeker Niet Bij Ons Ontbreken! Verder Kun Je Het Volgende Verwachten
- Werken bij een club met ambitie, energie en humor.
- Aantrekkelijk salaris tussen de € 5.300 en € 7.300.
- Auto, laptop en telefoon van de zaak.
- Solide pensioenregeling.
- 25 vakantiedagen.
- Standplaats is Amersfoort, Rotterdam of Zwolle en je hebt veel vrijheid om te werken waar je wil.
- Volop opleidingsmogelijkheden door toegang tot trainingen, events en certificering.
- Een rol met veel ruimte, invloed en groeipotentieel.
- Werken in een ambitieus team met korte lijnen en veel vertrouwen.
Senior Cybersecurity Analyst
Posted today
Job Viewed
Job Description
Please note this role is based in the Middle East-Qatar, relocation sponsorship and expatriate benefits apply.
To proactively safeguard the organization's digital infrastructure and sensitive data by analyzing threats, implementing advanced security protocols, leading incident response efforts, and guiding strategic improvements in cybersecurity architecture and compliance.
Key Responsibilities : Monitor and respond to complex cybersecurity incidents across the enterprise.
Lead vulnerability assessments, penetration testing, and security audits.
Design and implement threat detection, prevention, and mitigation strategies.
Provide subject-matter expertise during risk assessments and compliance evaluations.
Drive security architecture improvements aligned with international frameworks (e.g., ISO , NIST, SABSA).
Maintain and optimize SIEM, IDS / IPS, endpoint detection tools, and threat intelligence platforms.
Collaborate with IT, legal, and compliance teams to ensure cybersecurity best practices.
Mentor junior security analysts and support security training initiatives.
Stay updated on evolving cyber threats and emerging technologies.
Minimum Requirements : Bachelor's degree in Computer Science, Information Security, or related field (Master's preferred).
5–8 years of experience in cybersecurity roles, preferably in a senior or lead capacity.
Strong knowledge of threat landscapes, malware analysis, ethical hacking, and cloud security.
Preferred Certifications (any of the following) : Offensive Security : OSCP / OSCE / OSEP CREST CRT or CRTP eCPPT or eCPTX Architecture & Risk : SABSA Foundation / Advanced TOGAF CISSP-ISSAP Cybersecurity & Operations : CISSP, CISM, CRISC (ISACA / ISC2) CompTIA Security+, PenTest+, CySA+ GIAC Certifications (e.g., GCIH, GSEC, GCIA, GICSP) Industrial & Governance : ISA / IEC ISO / IEC Lead Implementer / Lead Auditor SCADA / ICS Security Certifications Key Skills : Threat hunting and incident response SIEM and endpoint protection (e.g., Splunk, SentinelOne, CrowdStrike) Network and system hardening Penetration testing and vulnerability scanning Cloud security (Azure, AWS, or GCP) Risk management and compliance frameworks (ISO, NIST, COBIT) Strong scripting skills (Python, Bash, PowerShell) Security awareness training and documentation Ideal Candidate Profile : Results-driven cybersecurity expert with a proactive mindset.
Demonstrated experience defending against sophisticated cyber threats.
Excellent problem-solving, analytical, and communication skills.
Strong leadership qualities and ability to mentor junior staff.
#J-18808-LjbffrL1 Cybersecurity Analyst
Posted 5 days ago
Job Viewed
Job Description
Aspen TESS is Aspen's technology-enabled shared services business, established to partner in unlocking business value through digital innovation and process efficiency. By delivering cost-effective services and innovative solutions to Aspen business units globally, Aspen TESS will eliminate repetitive effort and use technology to optimize standardized processes.
OBJECTIVE
The L1 Cybersecurity Analyst is an entry-level role within the Cybersecurity Operations team. This position is critical in supporting core security domains such as Vulnerability Management, Incident Response, Email and Internet Filtering, and Endpoint Security. The analyst will be responsible for performing daily operational security tasks, conducting routine system health checks, and responding to security incidents reported by the Security Operations Center (SOC). This role offers a growth opportunity into more advanced cybersecurity positions such as L2 Cybersecurity Analyst, SOC Analyst, or Cybersecurity Engineer, depending on performance and upskilling.
Below is a general description of the key responsibilities, qualifications, and skills needed for this role:
Key Responsibilities
Security Operations and Monitoring
- Support cybersecurity engineers in monitoring and maintaining the cybersecurity platforms.
- Perform daily system operational checks on security tools and infrastructure to ensure ongoing functionality and security posture.
- Monitor and report on phishing simulation outcomes to assess user awareness and improve training efforts.
- Respond to Tier 1 security incidents and escalate complex cases to the respective business units for further investigation and closure.
- Aid in tracking the resolution of open security incidents and maintain accurate records within the incident management system.
- Document incidents, tasks, and operational processes accurately in ticketing systems to ensure traceability and knowledge sharing.
- Assist with the identification and validation of vulnerabilities using tools like Qualys.
- Coordinate remediation efforts by working with appropriate teams to ensure timely resolution of identified vulnerabilities.
- Collaborate with compliance teams to gather evidence for audits.
- Support internal security assessments by providing necessary documentation and assisting in the evaluation of controls.
- Basic knowledge of: Network security fundamentals (firewalls, proxies, IP, DNS, etc.)
Security incident and event monitoring (SIEM tools such as Microsoft Sentinel)
Familiarity with vulnerability scanners and CVSS scoring.
- Basic scripting or query language skills (e.g., PowerShell, KQL) — a plus.
- Excellent attention to detail and accuracy
- Effective verbal and written communication skills
- Ability to prioritize and manage multiple tasks
- Trustworthy and handles sensitive information with discretion
- Diploma or Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or related field (or equivalent practical experience)
- Industry certifications (preferred but not required):
- CompTIA Security+
- Microsoft SC-200 (Security Operations Analyst)
- Cisco CyberOps Associate
- Fortinet NSE1-NSE3 or equivalent
- 0-2 years of experience in IT or Cybersecurity operations
Be The First To Know
About the latest Cybersecurity Jobs in South Africa !
Cybersecurity Operations Manager
Posted 7 days ago
Job Viewed
Job Description
Job title : Cybersecurity Operations Manager
Job Location : Gauteng, Johannesburg Deadline : July 19, 2025 Quick Recommended Links
- Jobs by Location
- Job by industries
Key Roles and Responsibilities :
Operational Oversight
- Manage 24 / 7 cybersecurity operations, including threat detection, incident response, and vulnerability management.
- Our globally centralized SOC requires strong teamwork and leadership skills for a unified response to cyber threats.
- Oversee the development and implementation of security policies, procedures, and standards to safeguard information and assets.
- Lead incident response efforts, coordinating with zone and global teams and external partners to detect, contain, eradicate, and recover from cybersecurity incidents.
- Ensure incidents are handled according to best practices and regulatory requirements.
- Supervise a team of cybersecurity analysts and engineers, providing guidance, training, and performance evaluations.
- Foster a culture of continuous improvement and professional development within the team.
Strategic Planning
- Execute the comprehensive global cybersecurity strategy aligned with zone business objectives.
- Collaborate with senior management to identify risks and implement appropriate mitigation strategies.
Compliance and Risk Management
- Ensure compliance with relevant laws, regulations, and standards (e.g., POPIA, ISO 27001).
- Conduct regular risk assessments and security audits to identify vulnerabilities and recommend improvements.
- Execute regular global routines for data protection, privacy, third-party risk management, and vulnerability management.
Communication
- Serve as the primary liaison between the cybersecurity team and other departments, ensuring effective communication regarding security issues.
- Prepare reports for senior management on security metrics, incidents, and ongoing cybersecurity projects.
Minimum Requirements :
- Bachelor’s degree in Computer Science, Information Technology, or a related field.
- Minimum of 8 years of experience in cybersecurity or IT security roles, with at least 3 years in a managerial position.
- Proven experience leading security operations.
- Relevant certifications such as CISSP, CISM (preferred) or CC (minimum requirement).
- Experience with cloud security platforms and technologies.
- Familiarity with securing on-premises servers and cloud technology. Proficiency in programming / scripting languages (e.g., Python, Bash, PowerShell) for automation tasks.
Cybersecurity Consultant iKapa
Posted 8 days ago
Job Viewed
Job Description
My client in the financial industry is looking for a Cyber Security Specialist.
The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.
What will you be responsible for?
* On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of:
- Anti-Virus Infrastructure
- Data Leakage Prevention system, rules, and reports
- Privileged Account Management process
- Network Access Control - process and exception handling
- Vulnerability Scanning, reporting, proposing remediation actions, and tracking compliance
- Security hardening baseline compliance scanning, reporting, and remediation
* On an ad hoc basis, the consultant will support businesses in:
- Issuing, renewing, and revoking PKI digital certificates.
- Assessing internet and email use on request of Forensics or HR departments.
- Performing scheduled tasks like reviewing Firewall rule configuration and reporting.
* The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.
* The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.
* The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or through interaction with experts.
Qualifications
* Matric
* Information Technology diploma or degree
* Information Security certification (preferable)
Experience
At least 3 - 5 years of hands-on technical experience which includes:
- Network experience (TCP/IP, Firewalls, IPS, NAC)
- Anti-Virus System management and Configuration
- Data Leakage Prevention tool configuration
- Logical Access Management (AD, PAM)
- Information Security Operations (Security+, CISSP will be beneficial)
- Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)
Required Skills
- Security Auditing
- Reporting and Administration
- Security tools monitoring
Cybersecurity Analyst II
Posted 11 days ago
Job Viewed
Job Description
Join to apply for the Cybersecurity Analyst II role at TFG (The Foschini Group)
Join to apply for the Cybersecurity Analyst II role at TFG (The Foschini Group)
- Continuously monitor: Monitor security alerts and events from various sources, including Microsoft Sentinel, Defender for Endpoint and Defender for Cloud.
- Perform log management: Perform log ingestion, define use cases, and create alerts for critical assets.
- Develop Detection Rules: Create, implement, and fine-tune analytical rules, alerts, and queries in Microsoft Sentinel and Defender to detect security incidents and reduce false positives. Behavioural Analytics: Leverage user and entity behaviour analytics (UEBA) to identify abnormal activities and enhance detection capabilities.
- Customize Playbooks: Develop and customize automation playbooks in Sentinel and defender to streamline incident response processes and improve efficiency.
- Threat Hunting: Using IOCs and threat intelligence, perform threat hunting across environment.
- Create and maintain risk profiles for users, systems, and applications.
- Identify patterns, trends, and anomalies in security events to detect threats.
- Analyze and investigate security incidents to identify potential threats.
- Respond promptly to security incidents, provide initial analysis, conduct business impact assessment, isolate, eradicate and recovery from threats.
- Document and report incidents, ensuring accurate and comprehensive records.
- Follow established incident response procedures, playbooks and contribute to their enhancement.
- Manage a Cybersecurity incident from end-to-end including stakeholder engagements, investigations, continuous feedback and report writing.
- Automate repetitive incident response tasks to streamline investigations, accelerate containment, and enhance threat intelligence enrichment.
JOB DESCRIPTION
Security Monitoring
- Continuously monitor: Monitor security alerts and events from various sources, including Microsoft Sentinel, Defender for Endpoint and Defender for Cloud.
- Perform log management: Perform log ingestion, define use cases, and create alerts for critical assets.
- Develop Detection Rules: Create, implement, and fine-tune analytical rules, alerts, and queries in Microsoft Sentinel and Defender to detect security incidents and reduce false positives. Behavioural Analytics: Leverage user and entity behaviour analytics (UEBA) to identify abnormal activities and enhance detection capabilities.
- Customize Playbooks: Develop and customize automation playbooks in Sentinel and defender to streamline incident response processes and improve efficiency.
- Threat Hunting: Using IOCs and threat intelligence, perform threat hunting across environment.
- Create and maintain risk profiles for users, systems, and applications.
- Identify patterns, trends, and anomalies in security events to detect threats.
- Analyze and investigate security incidents to identify potential threats.
- Respond promptly to security incidents, provide initial analysis, conduct business impact assessment, isolate, eradicate and recovery from threats.
- Document and report incidents, ensuring accurate and comprehensive records.
- Follow established incident response procedures, playbooks and contribute to their enhancement.
- Manage a Cybersecurity incident from end-to-end including stakeholder engagements, investigations, continuous feedback and report writing.
- Automate repetitive incident response tasks to streamline investigations, accelerate containment, and enhance threat intelligence enrichment.
- Participate in BlueRedPurple team exercises.
- Participate in Cyber crisis simulations.
- Participate in Table-top exercises.
- Understand the Business value chain.
- Understand key Business processes.
- Understanding the Business architecture and mapping to crown jewels (critical assets)
- Risk management with the ability to conduct risk assessments when required.
- Manage and maintain endpoint security and compliance within agreed thresholds.
- Perform daily health checks endpoint security and EDR solutions and remediate accordingly.
- Conduct regular scans and assessments to identify and mitigate potential vulnerabilities.
- Collaborate with IT teams to ensure endpoint security configurations align with organizational standards.
- Work with threat intelligence teams to enhance EDR threat-hunting capabilities.
- Correlate EDR data with SIEM, XDR, and threat intelligence for deeper insights
- Continuous improvement mindset
- Platform optimization
- Understanding of SaaS based budgeting and licensing models.
- Research and development.
- Deep technical experience
- Incident reporting writing skills
- Create relevant dashboards, with the ability to create relevant KPIsKRIs and present to senior leadership.
- Presentations to senior leadership
- Engage with people from multi-cultural environments.
- Must have 4-6 years’ experience in a SOC or Cybersecurity related role.
- Candidates with the following technology experiences will be preferred: Microsoft Defender XDR, EDR, JAMF, Symantec DCS, DNS, network security, Online Brand Protection platforms, Mimecast, Symantec DLP, Next DLP, FortiAnalyzer, Sophos, CrowdStrike and Azure Sentinel.
- Experience with common information technologies (Windows, VMware, and Cisco as well as some UNIX, Linux).
- Experience with security tools (WAF, Proxy, DNS, IDS, firewalls, anti-virus, data loss prevention, Azure Entra ID, IAM, PAM, MFA, NAC, DLP).
- Knowledge of Cloud Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Protection.
- Communication: Excellent written and verbal communication skills in English, with the ability to effectively communicate technical information to both technical and non-technical audiences.
- Collaboration: Willing and able to share knowledge and learn from colleagues
- Reporting skills: Outstanding written skills for preparing email feedback and incident reports
- Time Management: Ability to work in independent environments under aggressive timelines and pressure.
- Ability to manage stress and pressure.
- Passion for continuous learning and development
- A “go getter” who is willing to go the extra mile to identify problems and recommend innovative solutions.
- Action Oriented - readily takes on new challenges and opportunities with a sense of urgency and eagerness
- Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner
- Courage - confronts and tackles challenging situations with courage
- Decision Quality - consistently makes timely, well-rounded and informed decisions
- Ensures Accountability - takes accountability and ensures others are held to account on agreed upon performance targets
- Manages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problems
- Plans and Aligns - develops plans and prioritises initiatives that align to the organisational goals and objectives
- Tech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growth
About Us
Who we are is because of our people. They are our greatest asset. TFG is an internationally diversified retail portfolio of 34 speciality lifestyle and apparel brands that Inspire our Customers to live their Best Lives and are woven into the lives of millions. Our vision is to create the most remarkable omnichannel experiences for our customers. TFG is more than a workplace, it's a launchpad for your growth. Join us and explore endless growth opportunities across our diverse brands. We’re a purpose-led business, and on this team, you’ll share the pride of making an impact across a whole industry.
We’re the designers, the makers, the shakers and the teams behind the scenes.
Are you with us?
About The Team
At TFG, technology is the silent engine behind fashion, financial services, and our factory floors. Our Infotec team builds the platforms that power over 3,600 stores and millions of customer moments. From cloud-native retail applications to AI/ML deployments, we solve real-world retail problems at scale. Whether you love engineering, data, architecture, or innovation at the edge—we have room for your kind of talent. Let’s build something enduring together.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Retail
Referrals increase your chances of interviewing at TFG (The Foschini Group) by 2x
Get notified about new Cyber Security Analyst jobs in Western Cape, South Africa .
Cape Town, Western Cape, South Africa 5 days ago
City of Cape Town, Western Cape, South Africa 5 days ago
Cape Town, Western Cape, South Africa 3 months ago
Cape Town, Western Cape, South Africa 2 weeks ago
Cape Town, Western Cape, South Africa 4 months ago
Identity & Access Management (IAM) AnalystCape Town, Western Cape, South Africa 2 days ago
City of Cape Town, Western Cape, South Africa 2 weeks ago
International Cybersecurity Sales Partner Manager (Darktrace)City of Cape Town, Western Cape, South Africa 2 weeks ago
Cape Town, Western Cape, South Africa 5 days ago
Senior/Staff Application Security Analyst (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 6 days ago
Cape Town, Western Cape, South Africa 5 days ago
Senior Application Security Engineer (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 6 days ago
City of Cape Town, Western Cape, South Africa 2 days ago
Cape Town, Western Cape, South Africa 1 week ago
Cape Town, Western Cape, South Africa 2 weeks ago
Senior/Staff Application Security Analyst (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 6 days ago
Cape Town, Western Cape, South Africa 3 months ago
Cape Town, Western Cape, South Africa ZAR450,000.00-ZAR700,000.00 1 month ago
Linux Cryptography and Security EngineerCape Town, Western Cape, South Africa 1 month ago
Cape Town, Western Cape, South Africa 5 months ago
Security Operations Engineer – Identify and Access Management (IAM) SpecialistCape Town, Western Cape, South Africa 6 days ago
Cape Town, Western Cape, South Africa 1 week ago
City of Cape Town, Western Cape, South Africa 5 days ago
Cape Town, Western Cape, South Africa 2 weeks ago
Cape Town, Western Cape, South Africa 5 days ago
Cape Town, Western Cape, South Africa 1 week ago
Cape Town, Western Cape, South Africa 6 months ago
Senior Incident Response Specialist, Bangkok Based (Relocation Provided)Cape Town, Western Cape, South Africa 6 days ago
Senior/Staff Application Security Engineer (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 6 days ago
MS Sentinel SIEM Security Engineer (South Africa)Cape Town, Western Cape, South Africa 1 week ago
L2 Security Operations Centre (SOC) AnalystCape Town, Western Cape, South Africa 5 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr