235 Cybersecurity Risk jobs in South Africa

Information Security Analyst II

Johannesburg, Gauteng Nedbank

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Nedbank, Johannesburg, Gauteng, South Africa

Position: Information Security Analyst II

Requisition Details & Talent Acquisition Specialist

REQ - Thembile Ndlovu

Closing Date: 03 September 2025

Available Roles: 2

Career Stream: IT Risk

Leadership Pipeline: Manage Self: Technical

Job Purpose

To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.

Job Responsibilities
  • Capture timesheets timeously and accurately
  • Capture claims timeously and accurately
  • Propose solutions that must be cost effective whilst meeting information security requirements within budget.
  • Participate in negotiations on fair pricing from vendors for new technologies procured.
  • Manage and/or resolve low, medium and high incidents and engage with Specialists to resolve the high complexity incidents.
  • Build relationships with stakeholders to facilitate the flow of knowledge, input and discussion on new products and solutions as required by stakeholders.
  • Facilitate and manage the incident and problem management process when stakeholder environments are affected.
  • Oversee the implementation of the information security changes and check for the shortcomings and risks.
  • Interpret MIS and system logs/reports with the view to analyse and correct any deviations against standards and best practices.
  • Participate in the implementation of new products as provided in the selection criteria.
  • Act as the 1st point of problem resolution for non-routine incidents and 1st line support for problems.
  • Ensure compliance to standards and practices by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
  • Document and maintain all relevant processes and procedures mindful of current policies and standards.
  • Create and maintain information security standards.
  • Oversee and monitor the information security environment according to set standards.
  • Review and contribute to project documentation including business requirements, designs and implementation.
  • Create design documentation according to relevant standards and practices
  • Implement specific information security technologies.
  • Gain further exposure and experience on multiple technologies by job shadowing Information Security Analysts III and Technical Specialist.
  • Log, submit and implement low, medium and high risk changes independently.
  • Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
  • Oversee and ensure change was successful in certain cases and when required perform unit testing.
  • Oversee and ensure back-ups are done, documents are stored and statuses updated.
  • Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
  • Monitor and action Service Manager low, medium and high impact incidents and emails related to Information Security.
  • Ensure job related tasks and processes are in place.
  • Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
  • Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
  • Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
  • Improve personal capability and stay abreast of developments in field of expertise by identifying training courses and career progression opportunities for self through input and feedback from managers.
  • Ensure information is provided correctly to stakeholders by maintaining knowledge sharing with team.
  • Transfer of knowledge to team members.
  • Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
Job Responsibilities Continue
  • Initial focus will be to implement Identity and Access Management (IAM), encryption, and network security in both Azure and AWS.
  • Support and maintain both Azure and AWS across Infrastructure as Code, containers and applications pipelines.
  • Very strong networking skills.
  • Experience with multiple security technologies.
  • Building relationships with I&O Teams.
Essential Qualifications - NQF Level
  • Matric / Grade 12 / National Senior Certificate
  • Advanced Diplomas/National 1st Degrees
Preferred Qualification
  • Degree or certification in computer science or similar field
  • Microsoft and AWS certifications: SC-200, SC-300, SC-400, Azure Security Engineer Associate, Azure Solutions Architect Expert, Cybersecurity Architect, and AWS certifications listed below
  • AWS Certified Solutions Architect – Associate
  • AWS Certified SysOps Administrator – Associate
  • AWS Certified Solutions Architect – Professional
  • AWS Certified DevOps Engineer – Professional
  • Strong knowledge on Linux Operating System
  • Strong knowledge on Linux Networks
  • Strong knowledge in Linux virtualization
  • Knowledge of scripting languages: Python, PowerShell, Bash, JavaScript/TypeScript, Terraform, YAML and JSON
  • SABSA – Sherwood Applied Business Security Architecture would be preferable
  • Good knowledge to ensure compliance with ISO 27001, GDPR, NIST and CSA guidelines
Minimum Experience Level
  • At least 8 years in an IT environment of which at least 5 years in information security
  • Cloud platform knowledge – AWS and Azure
  • Networking knowledge – WAN, LAN and routing
  • Low-level design documentation skills
  • Knowledge of CSA, NIST and ISO frameworks
  • Experience delivering high-quality design for cloud environments including Kubernetes and cloud PaaS services
  • Experience working with large cross-functional teams
  • Experience working in high pressure demanding environments
Technical / Professional Knowledge
  • Administrative procedures and systems
  • Data analysis
  • Governance, Risk and Controls
  • Principles of project management
  • Relevant regulatory knowledge
  • Relevant software and systems knowledge
  • Cluster Specific Operational Knowledge
  • System Development Life Cycle (SDLC)
  • TCP/IP
  • Information Security terms and definitions
  • Relevant Operating System
  • Information Security policies and procedures
  • Vendor Management Principles
Behavioural Competencies
  • Applied Learning
  • Communication
  • Collaborating
  • Customer Focus
  • Initiating Action
  • Managing Work
  • Technical/Professional Knowledge and Skills

Contact: Nedbank Recruiting Team at

Seniority level
  • Associate
Employment type
  • Full-time
Job function
  • Information Technology

Referrals increase your chances of interviewing at Nedbank by 2x

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Gauteng, Gauteng NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Western Cape, Western Cape NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Free State, Free State NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Western Cape, Western Cape NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity risk Jobs in South Africa !

Technical Security Analyst

Gauteng, Gauteng NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Western Cape, Western Cape NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

North West, North West NETSTOCK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Overview

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities
  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Risk Jobs