235 Cybersecurity Risk jobs in South Africa
Information Security Analyst II
Posted 11 days ago
Job Viewed
Job Description
Overview
Nedbank, Johannesburg, Gauteng, South Africa
Position: Information Security Analyst II
Requisition Details & Talent Acquisition Specialist
REQ - Thembile Ndlovu
Closing Date: 03 September 2025
Available Roles: 2
Career Stream: IT Risk
Leadership Pipeline: Manage Self: Technical
Job PurposeTo analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.
Job Responsibilities- Capture timesheets timeously and accurately
- Capture claims timeously and accurately
- Propose solutions that must be cost effective whilst meeting information security requirements within budget.
- Participate in negotiations on fair pricing from vendors for new technologies procured.
- Manage and/or resolve low, medium and high incidents and engage with Specialists to resolve the high complexity incidents.
- Build relationships with stakeholders to facilitate the flow of knowledge, input and discussion on new products and solutions as required by stakeholders.
- Facilitate and manage the incident and problem management process when stakeholder environments are affected.
- Oversee the implementation of the information security changes and check for the shortcomings and risks.
- Interpret MIS and system logs/reports with the view to analyse and correct any deviations against standards and best practices.
- Participate in the implementation of new products as provided in the selection criteria.
- Act as the 1st point of problem resolution for non-routine incidents and 1st line support for problems.
- Ensure compliance to standards and practices by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
- Document and maintain all relevant processes and procedures mindful of current policies and standards.
- Create and maintain information security standards.
- Oversee and monitor the information security environment according to set standards.
- Review and contribute to project documentation including business requirements, designs and implementation.
- Create design documentation according to relevant standards and practices
- Implement specific information security technologies.
- Gain further exposure and experience on multiple technologies by job shadowing Information Security Analysts III and Technical Specialist.
- Log, submit and implement low, medium and high risk changes independently.
- Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
- Oversee and ensure change was successful in certain cases and when required perform unit testing.
- Oversee and ensure back-ups are done, documents are stored and statuses updated.
- Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
- Monitor and action Service Manager low, medium and high impact incidents and emails related to Information Security.
- Ensure job related tasks and processes are in place.
- Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
- Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
- Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
- Improve personal capability and stay abreast of developments in field of expertise by identifying training courses and career progression opportunities for self through input and feedback from managers.
- Ensure information is provided correctly to stakeholders by maintaining knowledge sharing with team.
- Transfer of knowledge to team members.
- Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
- Initial focus will be to implement Identity and Access Management (IAM), encryption, and network security in both Azure and AWS.
- Support and maintain both Azure and AWS across Infrastructure as Code, containers and applications pipelines.
- Very strong networking skills.
- Experience with multiple security technologies.
- Building relationships with I&O Teams.
- Matric / Grade 12 / National Senior Certificate
- Advanced Diplomas/National 1st Degrees
- Degree or certification in computer science or similar field
- Microsoft and AWS certifications: SC-200, SC-300, SC-400, Azure Security Engineer Associate, Azure Solutions Architect Expert, Cybersecurity Architect, and AWS certifications listed below
- AWS Certified Solutions Architect – Associate
- AWS Certified SysOps Administrator – Associate
- AWS Certified Solutions Architect – Professional
- AWS Certified DevOps Engineer – Professional
- Strong knowledge on Linux Operating System
- Strong knowledge on Linux Networks
- Strong knowledge in Linux virtualization
- Knowledge of scripting languages: Python, PowerShell, Bash, JavaScript/TypeScript, Terraform, YAML and JSON
- SABSA – Sherwood Applied Business Security Architecture would be preferable
- Good knowledge to ensure compliance with ISO 27001, GDPR, NIST and CSA guidelines
- At least 8 years in an IT environment of which at least 5 years in information security
- Cloud platform knowledge – AWS and Azure
- Networking knowledge – WAN, LAN and routing
- Low-level design documentation skills
- Knowledge of CSA, NIST and ISO frameworks
- Experience delivering high-quality design for cloud environments including Kubernetes and cloud PaaS services
- Experience working with large cross-functional teams
- Experience working in high pressure demanding environments
- Administrative procedures and systems
- Data analysis
- Governance, Risk and Controls
- Principles of project management
- Relevant regulatory knowledge
- Relevant software and systems knowledge
- Cluster Specific Operational Knowledge
- System Development Life Cycle (SDLC)
- TCP/IP
- Information Security terms and definitions
- Relevant Operating System
- Information Security policies and procedures
- Vendor Management Principles
- Applied Learning
- Communication
- Collaborating
- Customer Focus
- Initiating Action
- Managing Work
- Technical/Professional Knowledge and Skills
Contact: Nedbank Recruiting Team at
Seniority level- Associate
- Full-time
- Information Technology
Referrals increase your chances of interviewing at Nedbank by 2x
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrBe The First To Know
About the latest Cybersecurity risk Jobs in South Africa !
Technical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrTechnical Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Overview
Current job opportunities are posted here as they become available.
Subscribe to our RSS feeds to receive instant updates as new positions become available.
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with usNetstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About usNetstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-Ljbffr