69 Cybersecurity Analysts jobs in South Africa

Information Security Analyst

Johannesburg, Gauteng Data Centrix

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

Managed Talent Solutions client in the mining sector is looking for a Information Security Analyst on a 12 month fixed term contract. Must have +6 years experience in conducting risk assessments that rely on outside penetration testing support and application of common Information Security Frameworks such as the ISO27000 series, SANS20, NIST and the ISF control framework.

POSITION INFO : Requirements :

  • An undergraduate or postgraduate qualification in computer science, business informatics, / technology or equivalent Â
  • Professional certifications and experience in Information Security from industry standard security frameworks : ISACA, BCS, CIPP, ITIL, Crest, ISC2, COMPTIA and key security vendors including Microsoft, Crowdstrike, Qualys, IBM.
  • Must have experience in appliocation of Information Security frameworks such as the ISO27000 series, SANS20, NIST and the ISF control framework
  • Conducting risk assessments that rely on outside penetration testing support
  • Information security training and awareness concepts and delivery
  • Incident response and crisis management concepts experience

 Key responsibilities :

  • Support and monitor cybersecurity initiatives and controls in the region
  • Collaborate with regional IT and security teams to implement security measures and protocols
  • Conduct security assessments and risk analyses for regional assets and systems
  • Facilitate security awareness training for regional employees
  • Respond to and investigate security incidents in the region
  • Stay updated with regional cybersecurity regulations and compliance requirements
Create a job alert for this search

Security Analyst • Johannesburg, South Africa

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Johannesburg, Gauteng University of Fort Hare

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Managed Talent Solutions client in the mining sector is looking for a Information Security Analyst on a 12-month fixed-term contract. Must have more than 6 years of experience in conducting risk assessments that rely on outside penetration testing support and application of common Information Security Frameworks such as the ISO27000 series, SANS20, NIST, and the ISF control framework.

Requirements:

  • An undergraduate or postgraduate qualification in computer science, business informatics, engineering/technology, or equivalent.
  • Professional certifications and experience in Information Security from industry-standard security frameworks: ISACA, BCS, CIPP, ITIL, Crest, ISC2, COMPTIA, and key security vendors including Microsoft, Crowdstrike, Qualys, IBM.
  • Experience in application of Information Security frameworks such as the ISO27000 series, SANS20, NIST, and the ISF control framework.
  • Experience in conducting risk assessments that rely on outside penetration testing support.
  • Knowledge of information security training and awareness concepts and delivery.
  • Experience with incident response and crisis management concepts.

Key responsibilities:

  • Support and monitor cybersecurity initiatives and controls in the region.
  • Collaborate with regional IT and security teams to implement security measures and protocols.
  • Conduct security assessments and risk analyses for regional assets and systems.
  • Facilitate security awareness training for regional employees.
  • Respond to and investigate security incidents in the region.
  • Stay updated with regional cybersecurity regulations and compliance requirements.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst | Grenada | Remote

Western Cape, Western Cape Operations Army

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
Information Security Analyst | Grenada | Remote

OpsArmy St. George's, Saint George, Grenada

Join or sign in to find your next job

Join to apply for the Information Security Analyst | Grenada | Remote role at OpsArmy

Information Security Analyst | Grenada | Remote

OpsArmy St. George's, Saint George, Grenada

1 week ago Be among the first 25 applicants

Join to apply for the Information Security Analyst | Grenada | Remote role at OpsArmy

Get AI-powered advice on this job and more exclusive features.

Information Security Analyst (Sales Enablement Focus)

Fully Remote | Full-Time

Schedule: Monday - Friday, 11:00 AM - 7:00 PM EST

Apply here: The Role

Were looking for an Information Security Analyst with a Sales Enablement focus to drive our customer trust efforts by owning security questionnaires, RFPs, and related documentation. This role connects Information Security with Sales, Legal, and Product teams to ensure timely, accurate, and compelling responses that reflect our security posture.

Key Responsibilities

  • Own and complete customer security questionnaires, including SIG, CAIQ, VSA, and custom formats.
  • Respond to security-related RFPs and RFIs, ensuring submissions are accurate, timely, and aligned with company policies.
  • Collaborate cross-functionally with Sales, Legal, Product, and Engineering to gather and validate responses.
  • Maintain and proactively update a repository of security documentation and standard answers.
  • Act as a subject matter expert on the company's security posture, controls, and certifications (e.g., SOC 2, ISO 27001).
  • Develop scalable processes, templates, and documentation to streamline future submissions.
  • Liaise with prospective customers and InfoSec during security assessments and reviews.
  • Identify trends in customer inquiries to inform internal roadmaps and improve external communications.


Requirements

  • Experience in Information Security, Risk, Compliance, or a related role preferably in SaaS or B2B tech.
  • Hands-on experience completing security questionnaires or contributing to RFP/RFI processes.
  • Strong understanding of security controls, compliance frameworks, and risk management.
  • Excellent written and verbal communication skills, with the ability to explain complex topics clearly.
  • Detail-oriented with strong organizational and project management skills.
  • Familiarity with tools like OneTrust, Whistic, or Vanta is a plus.


Apply here:

Seniority level
  • Seniority level Not Applicable
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Technology, Information and Internet

Referrals increase your chances of interviewing at OpsArmy by 2x

Sign in to set job alerts for “Information Security Analyst” roles.

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Engineer

Sandton, Gauteng LZ Security & Service GmbH

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

A Security Engineer is a crucial member of an organization’s IT team, specializing in safeguarding digital assets and maintaining the security posture of the company. They work to design, implement, and manage security measures to protect against cyber threats, unauthorized access, and data breaches.

Key Responsibilities:

Security Infrastructure Design:

  • Design and implement security infrastructure, including firewalls, intrusion detection systems, and encryption protocols.
  • Evaluate and recommend security products and technologies to enhance the organization’s security posture.

Incident Response and Monitoring:

  • Monitor network traffic for suspicious activity and potential security breaches.
  • Develop and maintain incident response plans and procedures to mitigate security incidents.
  • Investigate security incidents, determine the root cause, and implement corrective actions.

Vulnerability Assessment and Penetration Testing:

  • Conduct regular security assessments to identify vulnerabilities in systems and applications.
  • Perform penetration tests to simulate cyberattacks and assess the organization’s readiness.

Access Control and Authentication:

  • Manage user access controls and authentication mechanisms.
  • Implement and maintain multi-factor authentication (MFA) solutions.

Security Policies and Compliance:

  • Develop and enforce security policies, standards, and procedures.
  • Ensure compliance with industry regulations (e.g., GDPR, HIPAA, PCI DSS) and best practices.

Security Awareness and Training:

  • Conduct security awareness programs and training for employees.
  • Keep the organization informed about emerging threats and security best practices.

Security Patch Management:

  • Manage and coordinate the timely installation of security patches and updates.
  • Maintain an inventory of software and hardware assets.

Encryption and Data Protection:

  • Implement encryption mechanisms to protect sensitive data at rest and in transit.
  • Ensure the confidentiality and integrity of data through encryption and access controls.

Qualifications:

  • Bachelor’s degree in computer science, information security, or a related field (or equivalent experience).
  • Relevant industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), or equivalent.
  • Proven experience in information security roles, including network security, system security, or application security.
  • Strong knowledge of security technologies, protocols, and tools.
  • Understanding of risk management principles and methodologies.
  • Proficiency in scripting and programming languages (e.g., Python, PowerShell) for automation and analysis.
  • Familiarity with cloud security concepts (e.g., AWS, Azure, Google Cloud).
  • Excellent problem-solving and analytical skills.
  • Effective communication and teamwork abilities.

Preferred Skills:

  • Experience with security information and event management (SIEM) systems.
  • Knowledge of threat intelligence and threat hunting techniques.
  • Experience with secure coding practices and application security assessments.
  • Familiarity with network and web application firewalls.
  • Understanding of security-related regulations and compliance standards.
  • Security Engineers typically work in an office environment but may need to respond to security incidents outside regular business hours.
  • The role may involve occasional travel to remote offices or data centers.

Security Engineers play a pivotal role in maintaining the confidentiality, integrity, and availability of an organization’s information assets. They are instrumental in protecting against cyber threats and ensuring compliance with industry regulations and security best practices.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Officer, Information Security

Johannesburg, Gauteng Standard Bank Group

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Company Description

Standard Bank Group is a leading Africa-focused financial services group and an innovative player on the global stage. We offer a variety of career-enhancing opportunities and the chance to work alongside talented, motivated professionals. Our clients range from individuals to businesses of all sizes, high net worth families, and large multinational corporates and institutions. We are passionate about creating growth in Africa, bringing meaningful value to our clients and communities, and creating a sense of purpose for our employees.

Job Description

To implement the Group Cyber Resilience strategy by securing platforms, ecosystems, and third-party integrations; protecting sensitive data, applications, and infrastructure from infiltration or misuse; guiding security capabilities in client segments and solutions. Facilitate security services ensuring policies, standards, and controls are embedded to prevent losses and ensure regulatory compliance. Educate employees about their InfoSec responsibilities.

  • Alert responsible stakeholders of non-compliance with Cyber Resilience Policies and Standards, and collaborate on remediation plans and solutions.
  • Assess information security maturity scores, guide implementation for awareness and prioritization, and monitor compliance with standards.
  • Collaborate with feature teams, product owners, architecture, IT, vendors, and other stakeholders to investigate risk controls.
  • Work with threat intelligence, cybersecurity, security engineering, and other risk functions to develop and maintain a holistic security strategy and remediation plans.
  • Communicate and raise awareness of policies within business, technology, and risk communities.

Qualifications

  • Degree in Business, Commerce, Information Technology, or Risk Management (minimum)
  • Post Graduate Degree in Business, Commerce, or Information Technology (preferred)

Experience Required: Cyber Security

  • 5-7 years in an information security or audit role within banking or financial services. Experience with multi-vendor, outsourced, and multi-system IT environments.
  • 5-7 years of knowledge and experience with implementing and managing information security policies and frameworks in a corporate environment. Management experience with diverse teams.
  • 5-7 years of strong IT understanding, insights into digital and platform operating models, and current cybersecurity trends and solutions.

Behavioural Competencies:

  • Adopting Practical Approaches
  • Articulating Information
  • Checking Things
  • Directing People
  • Examining Information

Technical Competencies:

  • Benefits Management
  • Information Security
  • Internal & External IT Environment
  • IT Risk Management
  • Knowledge of Banking & Financial Services
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Officer

Cape Town, Western Cape Eqplus

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

A highgrowth fintech backed by global investors is building worldclass payment infrastructure across Africa. The company helps global brands succeed in South Africa by reducing payment friction increasing reliability and ensuring regulatory compliance.

Their clients include leading enterprises and globally recognised brands. With scale and security at the heart of their mission theyre shaping how the world does business on the continent.

Role Overview

As the Information Security Officer you will lead the companys information security function as it grows its enterprise and global client base. Youll design and implement fitforpurpose security strategies that support compliance protect data and enable innovation in a fastpaced environment.

Reporting to the VP of Engineering this crossfunctional role supports engineering compliance operations and leadership teams.

Key Responsibilities

  • Own and maintain the information security roadmap and risk register
  • Implement security policies across infrastructure applications and endpoints
  • Support teams in embedding securitybydesign into the SDLC
  • Lead compliance audits and assessments (e.g. PCIDSS ISO 27001 SOC 2)
  • Coordinate vulnerability assessments penetration testing and risk modelling
  • Develop and maintain incident response procedures
  • Promote security awareness across the organisation
  • Manage internal IT security needs (cloud MDM Google Workspace password policies)
  • Support client security reviews and enterprise procurement processes
  • Stay informed on relevant threats and regulatory changes

Challenges Youll Tackle

  • Scaling security in a startup environment without slowing delivery
  • Aligning security across teams and technologies
  • Meeting evolving regulatory and enterprise standards across jurisdictions
  • Ideal Candidate Profile

  • 4 years of experience in information security preferably in fintech
  • Proven experience managing PCIDSS compliance
  • Strong understanding of governance risk and compliance (GRC)
  • Familiarity with ISO 27001 and SOC 2 implementation
  • Cloud infrastructure experience (preferably AWS)
  • Skilled in secure coding and data protection principles
  • Excellent communication and stakeholder engagement skills
  • Handson pragmatic mindset with an interest in building secure systems from the ground up
  • Required Experience :

    Unclear Seniority

    Key Skills

    International Development,Information Systems,Community,Information Technology Sales,Corporate Recruitment

    Employment Type : Contract

    Experience : years

    Vacancy : 1

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Information Security Consultant

    Cape Town, Western Cape iLaunch (Pty) Ltd

    Posted 4 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Job Description

    Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis.

    Responsibilities
    • Security Auditing
    • Responsible for Security tools monitoring
    • Network experience (TCP/IP, Firewalls, IPS, NAC)
    • Operating System management and Hardening
    • Anti-Virus System management and Configuration
    • Logical Access Management
    • Vulnerability Management
    Minimum Requirements
    • Matric and an Information Technology diploma or degree qualification
    • 4+ years experience in the field
    Package & Remuneration

    Salary: Market Related

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Cybersecurity analysts Jobs in South Africa !

    Information Security Specialist

    Johannesburg, Gauteng Kpmg-Southafrica

    Posted 6 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    The KPMG Africa Information Security Specialist is responsible for ensuring the confidentiality, integrity, and availability of all systems across KPMG Africa offices (South Africa, Botswana, Mauritius, Mozambique, Namibia, Zambia, Zimbabwe, Nigeria, Ghana, Kenya, Uganda, Tanzania, and Rwanda). The role involves actively managing and monitoring information security systems to detect, respond to, and remediate security risks and threats across the infrastructure.

    4. Position Specifications

    Educational Requirements (minimum necessary to perform the job):

    • Professional / Tertiary qualification

    Other Requirements:

    Experience (minimum necessary):

    Desired Qualifications and Experience:

    • 3-5 years' experience in Information Technology Support or Information Security, including Microsoft Azure
    • Industry-recognized certifications such as A+, N+, Security+, CySA+, and Cloud Security certifications like:

    o Microsoft Certified: Security Operations Analyst Associate

    o Microsoft Certified: Information Protection and Compliance Administrator Associate

    o Microsoft Certified: Security, Compliance, and Identity Fundamentals

    o Microsoft Certified: Identity & Access Management

    o Microsoft Certified: Azure Security Engineer

    • Professional certifications such as CISM, CISSP, ECIH are preferred but not required
    • Strong knowledge of information security and cloud security concepts
    • Experience in identifying, analyzing, and reporting on security risks and incidents
    • Experience with security tools such as Qualys, Microsoft Defender Endpoint, Microsoft Sentinel, etc.
    • Ability to evaluate vulnerabilities, develop mitigation strategies, and implement remediation
    • Strong knowledge of operating systems, Microsoft Servers, Active Directory, and network protocols and technologies

    5. Core Competencies:

    • Attention to detail and accurate documentation
    • Analytical skills to interpret information
    • Ability to work independently and in a team
    • Organizational and prioritization skills under pressure

    6. Key Responsibilities & KPIs

    Main Responsibilities:

    • Monitoring incident response channels
    • Executing the Information Security Incident Management Process and escalating high-priority issues
    • Tracking and escalating open incidents
    • Producing weekly and quarterly reports for the CISO on incident status and trends

    Security Systems Configuration and Management:

    • Daily monitoring of security systems to ensure proper functioning
    • Configuration and management of security tools such as vulnerability, privileged access, and log management systems
    • Reconciliation of assets to ensure coverage of security systems
    • Reporting and issue resolution support for operational teams

    Patch Management Monitoring:

    • Monitoring patch management performance and identifying risks
    • Addressing challenges to compliance

    Threat and Event Monitoring:

    • Detecting and escalating security threats and events

    Vulnerability Management:

    • Monitoring vulnerabilities daily
    • Monthly asset reconciliation
    • Managing vulnerability remediation with owners
    • Supporting penetration testing activities

    Supporting NITSO projects and other initiatives as required.

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Information Security Architect

    Johannesburg, Gauteng InfyStrat

    Posted 18 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Job title: Information Security Architect

    Contract duration: Start with 6 months

    First preference: EEE candidates

    Location: JHB

    The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

    Key Responsibilities:

    • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
    • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
    • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
    • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
    • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
    • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
    • Define portfolio vision and reusable security patterns aligned with the EA strategy.
    • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
    • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
    • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
    • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
    • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
    • Manage security architects and mentor engineers, developers, and vendors.

    What will you bring?

    • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
    • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
    • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
    • Teamwork and Energy – work across different functional and business teams with effective collaboration.
    • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
    • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
    • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

    Requirements / Skills and Competence

    • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
    • Minimum of 5-10 years of experience in Security Architecture.
    • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
    • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
    • Experience in identifying gaps in existing architectures.
    • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
    • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
    • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
    • Good experience in security architecture design in Cloud and on-prem.
    • Design and implementation of IOT, endpoint protection, and secure IAM.
    • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
    • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
    • Knowledge of web application architectures and threat modelling.
    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.

    Information Security Officer

    Hub71 Ltd

    Posted 18 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    South Africa

    Apply Now and Redefine Digital Payments with Us!

    Why EFT Corporation

    At EFT Corporation, we don’t just enable payments, we empower possibilities. With over 26 years of experience, we’re Africa’s leading payment solutions provider, working with over 100 financial institutions to deliver cutting-edge technology that drives financial inclusion and transforms lives. Operating in dynamic markets across Africa and beyond, our team of 300+ experts spans Mauritius, Ghana, Kenya, South Africa, Zambia, Zimbabwe, and India. We’re on a mission to shape the future of payments across the continent through innovation, collaboration, and a shared vision of progress.

    Why You'll Love Working Here:

    • Purpose-Driven Culture : Make an impact in transforming lives through secure and innovative payment solutions.
    • Global Collaboration : Work alongside diverse, talented teams from across the globe.
    • Continuous Growth : Expand your skills with mentorship, knowledge sharing, and cutting-edge technologies.
    • Inclusive Environment : We value and celebrate diversity, fostering a workplace where everyone thrives.

    Your Role

    • As an Information Security Officer , your job purpose is to be held accountable in respect to assisting the Senior Security and Infrastructure Engineer and the Senior DevOps Engineers in the following:
      • Assisting in maintaining the safety and security of the organisation’s systems and network database to prevent unauthorized access and avoid data breaches.
      • Maintaining the organisation’s systems and networks.
      • Assisting in overseeing the entire software development process, from planning and development to deployment and maintenance.
      • This role requires expertise in both software development and operations, as well as an understanding of the DevOps methodology.
      • This includes CI/CD, Infrastructure management (AWS), Automation, Monitoring, logging and metrics, Collaboration and Security.
      • The role also requires a significant focus on PCI compliance and support and collaboration with the Security and Infrastructure team is required.
    • You will be responsible for owning the Futurex HSM and Thales HSM device management which includes:
      • Yearly Key management/replacement ceremonies.
      • PCI compliance as it relates to the HSM.
    • Assisting with new security compliance:
      • ISO27001.
      • PCI+PIN.

    What You’ll Do Maintain Operational Systems, Networks and Security:

    • Facilitate annual PCI audits.
    • Linux Operating systems are security patched in a timely manner. If patching will affect customers, arrange with operations support, and follow the correct change control process.
    • Maintain Elastic SIEM.
    • Respond to and investigate SIEM alerts.
    • Respond to operational system alerts and/or operational queries across the entire technology stack (Production and QA system issues, infrastructure issues, Databaseissues, Network issues, Security and Firewall issues and any 3rd party or customer integration issues) as they occur.
    • Manage / Deploy system tooling that may be beneficial to the business.
    • Research, POC and deploy new open source or when applicable closed source tooling that is beneficial to the business systems or processes. This can be in supporting Applications, Monitoring, Logging, SIEM, AI/machine Learning, Fraud Detection, Operational Support applications, Authentication systems, BI / Data Analytics, networks, Security or compliance.
    • Create ad hoc Python scripts / Applications to perform various repetitive tasks.
    • Ensure that AWS environments and services are architectured and configured in a secure and redundant manner including all security services from AWS.
    • Maintain AWS services including but not limited to: VPC, EC2, ECS, ECS Fargate, ECR, Guard Duty, Cloudwatch, Cloudtrail, Security groups, VPC Routing, Site to Site VPNs, Application Load balancers / network load balancers, Web application firewalls,etc.
    • Architect, support and maintain connectivity between 3rd parties, Banking partners, integrators and on prem datacentres.
    • Ensure best practice security measures are implemented.
    • Ensure best practices regarding system isolation and scope reduction.
    • Provide support to field engineers on HSMs and key management.
    • Maintain internal HSMs and key management procedures.
    • Provide support to the product and SLDC teams – this includes consulting on design, finding compliant solutions for customer issues, and filling out cyber risk assessments for customers or tenders.
    Regulatory Compliance:
    • Maintain/Improve (PC14) PCI.
    • Stretch: ISO 27001.
    • GDPR.
    Policies:
    • Ensure Security, Infrastructure & Procedures (with supporting team) are comprehensive and kept up to date.Security Tooling:
    • Ensure SSO, Intrusion detection, SIEM, Antivirus, Patch Management and PGP are implanted as per the polices.
    • Stimulation / adoption of user-driven security culture (give security a brand within the org and educate).
    Automation:
    • To increase efficiency and reduce errors for both security and infrastructure management.
    Cost Efficiency:
    • To reduce costs (optimize) without sacrificing performance and security.
    Perform Security Activities & Reporting:
    • Ensure that weekly vulnerability scans results are tracked, and vulnerabilities are remediated within set severity timeframes weekly.
    • Review all daily and weekly BAU PCI Items for signoff monthly.
    • Ensure weekly Internal and External Scans were completed.
    • Perform data analysis reporting monthly.
    • Maintain a strong security posture within the card holder environment.
    • Work with 3rd party to ensure PCI Certification Audit is completed and passed on time.
    • Review Security Commitment to third parties.
    What We’re Looking For Qualification & Experience:
    • Bachelor’s degree in Computer Science or related field.
    • 3 years’ relevant experience.
    • Experience within the payment / banking sector.
    • Experience working with PCI Audits / Security in DevOps, Linux, Mysql, Cloud (AWS).
    • Network experience (particularly cloud based / virtual).
    Skills & Knowledge Required:
    • PCI Audits / Security / Processes.
    • Linux, Mysql, and Cloud (AWS).
    • Experience with automation tools like CloudFormation, Ansible, Puppet, Chef, etc.
    • CI/CD tooling eg. Bitbucket pipelines, Jenkins, etc.
    • Scripting languages: Bash, Python, etc.
    • Cloud knowledge, specifically AWS.
    • Containerisation: Docker, Kubernetes, AWS ECS, etc.
    • Logging Frameworks: ELK stack, cloudwatch, etc.
    • Cloud-based virtual networking eg VPC, subnets, ALB, NLB, WAF, Peering, Transit Gateways, VPN gateways, etc.
    • SIEM experience – Elastic, Splunk, etc.
    • Monitoring and Alerting Framework: Zabbix, Nagios, etc.
    Personal Attributes:
    • Ability to learn new technologies at pace.
    • Problem solving.
    • Ability to work within a high stress & flux environment.
    • Ability to foster & cultivate relationships with internal & external stakeholders.
    • Ability to work autonomously as well as part of a team.
    • Assertiveness – communicating feelings and beliefs; being non-offensive.
    • Detail & deadline oriented.
    • Analytical & critical thinking.

    Our Values

    • Purposeful Impact : Every action drives meaningful change.
    • Client-Centric Excellence : We succeed when our clients do.
    • Integrity : Doing the right thing, always.
    • Teamwork : Together, we achieve the extraordinary.

    Why Now?

    Be part of a pioneering force in digital payments, leading transformative projects across continents. At EFT Corporation, you’re not just joining a company—you’re joining a movement.

    Ready to redefine the future of payments with us?

    Apply now and let’s create the extraordinary together!

    EFT Corporation is an Equal Opportunity Employer. Diversity drives our success, and we welcome passionate individuals from all walks of life to join our team.

    EFT Corporation does not accept unsolicited resumes from search firms/recruiters. EFT Corporation will not pay any fees to search firms/recruiters if a search firm/recruiter submits a candidate unless an agreement has been entered into concerning the specific open position(s). Search firms/recruiters offering resumes to EFT Corporation on an unsolicited basis shall be deemed to accept this condition, regardless of any other provision to the contrary.

    #J-18808-Ljbffr
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Cybersecurity Analysts Jobs