603 Cybersecurity Specialists jobs in South Africa

Threat Intelligence Lead

Cape Town, Western Cape Canonical

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Canonical Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Threat Intelligence Lead role at Canonical

Continue with Google Continue with Google

Canonical Cape Town, Western Cape, South Africa

Join to apply for the Threat Intelligence Lead role at Canonical

Get AI-powered advice on this job and more exclusive features.

Sign in to access AI-powered advices

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Get notified about new Threat Intelligence Lead jobs in Cape Town, Western Cape, South Africa .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Specialist, Threat Intelligence

R180000 - R250000 Y Standard Bank

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview

Business Segment: Group Functions

Location: ZA, GP, Johannesburg, 30 Baker Street

Job Type: Full-time

Job Ref ID: A-0001

Date Posted: 8/22/2025

Job Description

To provide Cyber-InfoSec expertise, professional knowledge, and technical skills to prevent cyber-attacks, significant reputational, financial, or other losses. To implement SBGs Cyber Resilience Programme to prevent cyber-attacks, protect sensitive data and systems from infiltration or misuse and execute the InfoSec capabilities against policies, standards, and controls across relevant functions

Qualifications

A degree in Information Technology or Computer Science.

IT Risk/Security certification such as CISM, CISSP or CISA is required.

A relevant Azure/AWS Cloud Certification is required

Experience Required:

Proficiency in Python is required. Experience with PowerShell, Bash and Ruby is an added advantage.

Experience in implementing machine learning and AI-powered automation workflows.

Design, develop, and maintain robust and scalable automation scripts and applications using Python and other scripting languages.

Experience with API integrations, database management (SQL/NoSQL), cloud infrastructures and cloud serverless technologies (e.g. AWS Lambda, Azure Functions) for implementing scalable cloud applications.

Experience with defensive technologies such as SIEMs, EDR tools, Threat Intelligence Platforms (TIP), OSINT tools and offensive technologies such as Burp Suite, Cobalt Strike, and Metasploit is an added advantage.

Experience within Financial Service Industry developing threat models, risk profiles, cybersecurity risk and incident management, and insight into crime in the financial sector.

Strong IT understanding, gaining insight into digital and platform operating models and cyber security trends and solutions, building cyber security intelligence.

Additional Information

Key Responsibilities:

Evaluate, develop and implement cyber security processes, tools integration and automation workflows for intelligence observation, enrichment, triage and investigations.

Implement machine learning and AI-powered automation workflows to provide intelligence observability and enrichment, enabling automated threat scoring reporting, and analysis of threat observations.

Debug, troubleshoot and optimize existing automation workflows and applications.

Document and present technical designs, specifications, and user manuals for all developed tools and workflows.

Integrate intelligence data from open-source, commercial, and internal sources to create a unified view for actionable intelligence analysis.

Research and stay current on application security threats, vulnerabilities, and emerging tactics, techniques and procedures (TTPs).

Familiarity with the MITRE ATT&CK framework, Cyber Kill Chain, or other security-related frameworks.

Support purple teaming exercises to build cyber resiliency across security teams.

Behavioural Competencies:

Adopting Practical Approaches

Articulating Information

Developing Strategies

Embracing Change

Exploring Possibilities

Generating Ideas

Interpreting Data

Making Decisions

Meeting Timescales

Producing Output

Providing Insights

Team Working

Technical Competencies:

Data Analysis

Debugging and Fixing Software

Information Security Management

IT Risk Management

Software Development Life Cycle (SDLC) methodologies & Tools

Technical Analysis

Use of Build and Test Automation

Write Code

Please note: All our recruitment processes comply with the applicable local laws and regulations. We will never ask for money or any from of payment as part of our recruitment process. If you experience this, please contact our Fraud line on or

This advertiser has chosen not to accept applicants from your region.

Threat intelligence lead

Cape Town, Western Cape Canonical

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Canonical Cape Town, Western Cape, South Africa Join or sign in to find your next job Join to apply for the Threat Intelligence Lead role at Canonical Continue with Google Continue with Google Canonical Cape Town, Western Cape, South Africa Join to apply for the Threat Intelligence Lead role at Canonical Get AI-powered advice on this job and more exclusive features. Sign in to access AI-powered advices Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.This role will report to the CISO.You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.What you'll do in this roleBuild and own Canonical's threat intelligence strategy Build and maintain OSINT research environments Develop OSINT tradecraft, principals, and techniques Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets Collaborate across teams to inform on activity of interest Coordinate adversary/campaign tracking Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence Identify intelligence gaps and propose new tools and research projects to fill them Conduct briefings for executives, internal stakeholders and external customers The successful Threat Intelligence Lead will beAn experienced threat intelligence leader (or similar) Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.) Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data Experienced using threat intelligence data to influence enterprise architecture or product development decisions An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences Able to travel twice a year, for company events up to two weeks long Desired CharacteristicsA professional portfolio of OSINT related scripts, tools, or frameworks Demonstrated involvement in the larger OSINT community (please share relevant links) Degree qualified, with a bachelor's degree in computer science, information security, or a related field Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, Intel Techniques OSIP, etc) Experience in a tech company or government/military signal intelligence departments What we offer youWe consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues Priority Pass, and travel upgrades for long haul company events About CanonicalCanonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, Io T and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.Canonical is an equal opportunity employerWe are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.Seniority level Seniority level Mid-Senior level Employment type Employment type Full-time Job function Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Get notified about new Threat Intelligence Lead jobs in Cape Town, Western Cape, South Africa . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Specialist

Johannesburg, Gauteng SavageOne Pty Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

The Cybersecurity Specialist is responsible for ensuring the security of systems, networks, and data, defending against breaches, vulnerabilities, and cyber-attacks. The role requires an in-depth understanding of security protocols, tools, and best practices to protect the organizations assets from cyber threats. Cybersecurity specialists are tasked with monitoring, detecting, and mitigating potential risks, while ensuring compliance with security regulations and standards. This position is crucial in maintaining the integrity and confidentiality of data and systems, as well as safeguarding against evolving cyber threats in a rapidly changing digital landscape.

Key Skills:
  • Security Tools: Proficient in using security tools and systems such as firewalls , Intrusion Detection Systems (IDS) , Intrusion Prevention Systems (IPS) , and Security Information and Event Management (SIEM) platforms to monitor and protect IT environments.
  • Protocols & Encryption: Strong knowledge of HTTPS , SSL/TLS , and VPN protocols for securing data in transit and protecting user privacy.
  • Scripting: Ability to automate security tasks, data collection, and analysis using scripting languages like Python and PowerShell .
  • Compliance Standards: Knowledge and experience in compliance frameworks such as GDPR , ISO 27001 , PCI-DSS , and HIPAA to ensure that security practices align with legal and regulatory requirements.
  • Threat Analysis: Expertise in performing risk assessments, identifying potential threats, and implementing appropriate mitigation strategies.
  • Incident Response: Understanding of incident detection and response processes, including analyzing logs and network traffic to identify malicious activity.
Responsibilities:
  • Conduct Vulnerability Assessments and Penetration Testing:
    Perform regular vulnerability assessments to identify weaknesses in the system and infrastructure. Conduct penetration testing to simulate cyber-attacks and assess the systems resilience against threats.
  • Develop and Enforce Security Policies:
    Design, implement, and enforce organizational security policies and procedures to safeguard systems and data. Ensure compliance with industry standards and internal guidelines.
  • Monitor and Respond to Security Incidents:
    Continuously monitor network traffic, system logs, and alerts from security tools to detect and respond to potential threats in real-time. Take proactive measures to mitigate any security breaches, from malware outbreaks to unauthorized access.
  • Security Infrastructure Management:
    Configure and manage firewalls, IDS/IPS systems, and other security tools to provide proactive protection against attacks. Optimize security settings for both internal and external communications.
  • Conduct Security Awareness Training:
    Educate employees about best practices for maintaining security hygiene, recognizing phishing attempts, and adhering to organizational security policies.
  • Risk and Threat Analysis:
    Evaluate potential risks to the organizations digital assets and infrastructure. Continuously assess emerging threats and adjust security measures accordingly to stay ahead of evolving attack strategies.
  • Incident Forensics and Reporting:
    Investigate security incidents, identify the root cause, and recommend improvements to prevent future occurrences. Document incidents, responses, and remediation efforts for compliance and reporting purposes.
  • Collaboration with Other Teams:
    Work closely with IT, development, and operational teams to ensure security is integrated into all processes and systems from the outset, particularly in the case of new technology deployments or system updates.
  • Continuous Improvement:
    Stay current with the latest cybersecurity trends, emerging threats, and evolving attack vectors. Recommend and implement improvements to the security infrastructure, tools, and processes.
Preferred Qualifications:
  • Certifications like Certified Information Systems Security Professional (CISSP) , Certified Ethical Hacker (CEH) , Certified Information Security Manager (CISM) , or CompTIA Security+ are highly preferred.
  • Experience with advanced threat detection tools and techniques (e.g., AI/ML-based security systems ).
  • Proficiency in analyzing network traffic using Wireshark or similar tools.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Specialist

R600000 - R1200000 Y technovation

Posted today

Job Viewed

Tap Again To Close

Job Description

Our Client:

A Top Employer Financial Services organisation has taken extensive measures to strengthen the protection of its IT systems and implement a robust Cyber Security programme. To achieve this, the company has implemented and operates several advanced security solutions. The Cyber Security Specialist is responsible for developing and implementing security architecture strategies, ensuring operational resilience, and managing risk by conducting assessments and penetration testing. This role also involves overseeing identity management, responding to security breaches, and continuously improving the cybersecurity framework.

Key Responsibilities:

  • Identifying vulnerabilities in systems, infrastructure, and applications.
  • Implementing effective security controls to protect against threats.
  • Developing and implementing security architecture strategies, including traditional network and micro-segmentation, defense-in-depth, remote access, encryption technologies, backup and replication, Software Defined Networking (SDN), network function virtualization, zero trust models, Secure Access Service Edge (SASE)/Secure Service Edge (SSE), overlay networks, and secure enclaves.
  • Managing risk by conducting risk assessments and penetration testing.
  • Ensuring security operations resilience through:
  • Threat prevention via network and application firewalls, access management, SaaS detection, and encryption (SSL, PKI).
  • Threat detection, including log analysis and correlation, threat hunting, insider threat detection, integration with Managed Security Service Providers (MSSP), integration of Threat Intelligence Platform (TIP), utilization of deception technologies, full packet inspection, and misconfiguration detection.
  • Managing identities by overseeing identity credentialing, account creation and deletion, Single Sign On (SSO), and privileged access management (PAM).
  • Timely and proficient handling of security breaches, employing rapid response protocols and comprehensive remediation strategies.
  • Testing and assessing security products to ensure alignment with specific operational requirements and standards.
  • Monitoring network traffic and user activity to detect potential security breaches and insider threats.
  • Implementing and maintaining firewalls to protect network infrastructures from unauthorized access.
  • Ensuring cloud security by carefully managing access and permissions.
  • Implementing endpoint security measures to secure individual devices.
  • Using intrusion detection and prevention tools to identify and stop potential threats.
  • Preparing detailed reports that document security incidents and response actions.
  • Researching new security technologies and proactive strategies to ensure protection against evolving threats.

Key Competencies:

  • Creating specifications and conducting technical and operational reviews.
  • Implementing and engineering solutions, including deployment, configuration, and testing.
  • Managing security operations, changes, and incidents.
  • Conducting operations using security solutions such as IAM and DLP.
  • Providing support and guidance to business entities for installing and operating security solutions.
  • Designing and producing indicators, reporting documents, and performance reports on security solutions.
  • Implementing security controls, alerts, and monitoring systems.
  • Leading working groups related to cybersecurity initiatives.
  • Creating comprehensive user, technical, and operational documentation.

Experience:

  • At least 10 years of experience in a technical hands-on administrative or engineering role responsible for cybersecurity toolsets, including IAM, PAM, firewall, NAC, WAF, DDoS, MFA, MDM, endpoint protection, DLP, vulnerability scanning, AD, Windows OS, Linux OS, network, and Wi-Fi administration.
  • Proven experience with security architecture, risk management, and security operations.
  • Strong background in security monitoring, threat intelligence, and penetration testing.
  • Expertise in cloud security, endpoint security, and network security frameworks.

Qualifications:

  • Relevant Degree or Diploma in Cybersecurity, Information Technology, or related field.
  • Industry Certifications (e.g., CompTIA Security+, CISSP, CISM, CEH) are advantageous.
  • Vendor Certifications (e.g., Fortinet, Cisco, Microsoft, Palo Alto) are beneficial
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Consultant

Johannesburg, Gauteng Reflex Solutions

Posted today

Job Viewed

Tap Again To Close

Job Description

About Reflex

Established in 2000 in South Africa, Reflex has evolved from modest origins to become a distinguished provider of Information and Communication Technology (ICT) solutions. We specialise in delivering innovative ICT solutions across various industries, earning a sterling reputation for our excellence in the retail sector and beyond. With a robust network of partnerships, we pride ourselves on our ability to swiftly address the technological needs of our clients.

Our portfolio of ICT solutions spans various industries. ReflexCarrier understands what is needed to build, manage, and operate complex backbone networks simply. Our solutions are tailored for Fibre Network Operators (FNO), Internet Service Providers (ISPs), and those looking for comprehensive Managed Connectivity solutions.

On the other hand, our Enterprise Solutions take the complexity out of technology, allowing you to focus on what you do best. We provide seamless, high-performance solutions for connectivity, communications, workplace management, cloud, and cybersecurity services.

Together, both divisions reflect our core values of expertise, clarity, and client-centricity. We take pride in being large enough to offer extensive support while remaining small enough to provide personalised service. At Reflex, our clients are at the centre of everything we do, and we’re committed to delivering reliable, jargon-free solutions that drive your success.

About the role

The Cyber Security Consultant is responsible for assessing, designing, and implementing security measures to protect an organization's digital assets. They work closely with clients to identify vulnerabilities, develop security strategies, and ensure compliance with industry standards and regulations.

Key duties and responsibilities
  • Conduct Security Assessments: Evaluate the existing security measures of an organization and identify vulnerabilities and weaknesses.
  • Develop Security Strategies: Create and implement effective security protocols, policies, and procedures to protect against cyber threats.
  • Perform Penetration Testing: Conduct rigorous testing, including penetration testing, to simulate attacks and test the strength of security measures.
  • Provide Technical Advice: Offer guidance and instruction on best practices for cybersecurity.
  • Keep abreast of all aspects of cybersecurity: Keep up to date with the latest industry trends, threats, and security measures.
  • Respond to Incidents: Lead the incident response process, investigating causes and recommending corrective actions.
  • Train Staff: Educate staff on cybersecurity related principles, best practices and information security procedures.
  • Create Reports: Develop and deliver comprehensive reports on findings and recommendations to management and stakeholders.
  • Advise on Compliance: Ensure that security measures comply with relevant regulations and standards.
Education, Experience and Skills
  • 3-5 years of experience in cybersecurity or a related field.
  • Original Equipment Manufacturer/Vendor technology certifications
  • Strong understanding of security principles, risk management, and relevant technologies.
  • Excellent communication and presentation skills, with the ability to explain complex technical concepts to non-technical audiences.
  • Ability to work collaboratively with clients and internal teams.
  • Strong problem-solving skills and attention to detail.
  • A responsible individual who adopts a result driven approach.
  • Ability to work well under pressure and meet tight deadlines.
  • Positive attitude and a passion for the role.
  • Strong leadership and management skills.
  • Strong analytical and problem-solving skills.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Johannesburg, Gauteng Aspen Pharma Group

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Cybersecurity Engineer role at Aspen Pharma Group .

Aspen TESS is Aspen's technology-enabled shared services business, established to unlock business value through digital innovation and process efficiency. It aims to eliminate repetitive effort and optimize standardized processes by delivering cost-effective services and innovative solutions to Aspen's global business units.

Objective

The Cybersecurity Engineer plays a crucial role in protecting Aspen’s infrastructure by implementing, maintaining, and enhancing security technologies and processes. This role collaborates closely with the SOC, IT, and Compliance teams to ensure systems and data security and to identify and mitigate threats.

Key Responsibilities
  • Act as a Tier 2/3 escalation point for complex security incidents raised by the SOC or IT teams.
  • Lead and support incident response activities, including forensic analysis and root cause investigation.
  • Support red/blue team exercises to test and improve detection, response, and defense capabilities.
  • Manage configurations and policies for the Cyber Security platforms, ensuring optimal performance and alignment with security standards.
  • Analyze vulnerability scan reports to identify and assess security weaknesses.
  • Coordinate remediation efforts with relevant teams and ensure timely closure of vulnerabilities.
  • Collaborate with IT teams to implement secure system and network configurations, following industry best practices and compliance requirements.
  • Provide training and mentorship to junior analysts, fostering their professional development and enhancing team capabilities.
  • Participate in cross-functional IT and business projects to ensure security requirements are identified, integrated, and enforced throughout the project lifecycle.
Skills and Competencies
  • Hands-on experience with Cisco Umbrella, Defender for Endpoint, Identity, Office, and Sentinel.
  • Knowledge of SIEM, SOAR, EDR, vulnerability, and data protection tools.
  • Scripting skills (e.g., PowerShell, Python, KQL) for automation and threat hunting.
  • Strong understanding of networking, authentication, certificates, and cloud security principles.
  • Familiarity with MITRE ATT&CK, NIST CSF, and other industry frameworks.
  • Strong analytical and problem-solving skills.
  • Effective communication skills for incident handling and documentation.
  • Ability to work independently and collaboratively.
  • Ability to multitask under pressure.
Qualifications & Experience
  • Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent experience).
  • Preferred certifications include:
    • Microsoft Certified: Security Operations Analyst Associate
    • Microsoft Security, Compliance, and Identity Fundamentals
    • Cisco Certified CyberOps Associate or CCNP Security
    • CompTIA Security+, CySA+, or similar certifications
Additional Details
  • Seniority level: Associate
  • Employment type: Full-time
  • Job function: Information Technology
  • Industry: Pharmaceutical Manufacturing
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity specialists Jobs in South Africa !

Cybersecurity Analyst

Gauteng, Gauteng GVW Group

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Join the dynamic and fast-paced world of Aculocity, a global technology consulting company dedicated to revolutionizing business processes through cutting-edge technology solutions. Since our formal inception in 2006 (and informal in 1999), we've been at the forefront of delivering tailor-made software development solutions, seamless software system implementations, powerful business intelligence, and innovative business process solutions.

As a proud member of the GVW Group, LLC portfolio of companies, we are a premier provider of technology services for GVW's extensive portfolio and a rapidly growing external client base. Join a team that is driving innovation and transforming businesses worldwide. Elevate your career with us at Aculocity.

Job Summary:

We seek an experienced Cybersecurity Analyst to join our team and enhance the cybersecurity posture of our global manufacturing, distribution, and software development operations. This role is based in South Africa and offers the opportunity to work flexible hours to overlap with the US-based Infrastructure and Security team to which this role will report. The successful candidate will be responsible for monitoring, analyzing, and responding to security incidents, ensuring compliance with industry standards, and proactively addressing emerging threats in a dynamic international environment. A customer-oriented ultimate team player is a must.

Key Responsibilities:

  • Monitor and Analyze Security Incidents: Collaborate with the team to continuously monitor security alerts and events to identify potential threats and vulnerabilities. Work with security engineers to analyze security incidents, determine their impact, and develop appropriate response strategies.
  • Support Implementation and Maintenance of Security Solutions: Assist in the design, implementation, and maintenance of security solutions, including firewalls, intrusion detection systems, and endpoint protection. Ensure alignment with business objectives and industry best practices.
  • Collaborate with Cross-Functional Teams: Work closely with IT and business leaders to align security practices with organizational goals. Support secure manufacturing and business operations.
  • Conduct Security Assessments and Audits: Perform regular security assessments and audits to identify vulnerabilities and ensure compliance with industry regulations (e.g., ISO 27001, NIST, GDPR). Develop risk mitigation strategies and oversee threat intelligence processes.
  • Contribute to the Development and Implementation of Security Policies and Standards: Collaborate with the team to establish and enforce security policies, standards, and procedures to protect systems, data, and intellectual property. Provide expertise in incident response and drive continuous improvement post-incident.
  • Training and Awareness: Develop and deliver cybersecurity training and awareness programs for employees. Promote a culture of security awareness across the organization.

Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or related field (Master’s preferred).
  • Experience: 5+ years of experience in cybersecurity, with a focus on security monitoring, incident response, and vulnerability management.
  • Certifications: Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are strongly preferred.
  • Technical Skills: Expertise in security frameworks (e.g., NIST, ISO 27001), network and cloud security, incident response, threat intelligence, and security operations.
  • Analytical Skills: Strong problem-solving and risk assessment skills, with an ability to manage complex projects and meet critical deadlines.
  • Communication: Clear and effective communicator with the ability to present security topics to technical and non-technical audiences at all levels of the organization.

Why Join Us?

  • Impact: Play a key role in securing the operations of an international manufacturing organization.
  • Innovation: Drive and implement cutting-edge cybersecurity solutions in a dynamic industry.
  • Growth: Benefit from continuous learning opportunities, professional development, and career growth.
  • Collaborate: Join a unique and growing international team of IT professionals operating around the clock across three continents.
  • Flexibility: We offer flexible work hours to collaborate closely with the US-based team.
  • Global presence: We have work sites on four continents, with plans to expand further.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Gauteng, Gauteng GVW Group

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Join the dynamic and fast-paced world of Aculocity, a global technology consulting company dedicated to revolutionizing business processes through cutting-edge technology solutions. Since our formal inception in 2006 (and informal in 1999), we've been at the forefront of delivering tailor-made software development solutions, seamless software system implementations, powerful business intelligence, and innovative business process solutions.

As a proud member of the GVW Group, LLC portfolio of companies, we are a premier provider of technology services for GVW's extensive portfolio and a rapidly growing external client base. Join a team that is driving innovation and transforming businesses worldwide. Elevate your career with us at Aculocity.

Job Summary:

We seek an experienced Cybersecurity Analyst to join our team and enhance the cybersecurity posture of our global manufacturing, distribution, and software development operations. This role is based in South Africa and offers the opportunity to work flexible hours to overlap with the US-based Infrastructure and Security team to which this role will report. The successful candidate will be responsible for monitoring, analyzing, and responding to security incidents, ensuring compliance with industry standards, and proactively addressing emerging threats in a dynamic international environment. A customer-oriented ultimate team player is a must.

Key Responsibilities:

  • Monitor and Analyze Security Incidents: Collaborate with the team to continuously monitor security alerts and events to identify potential threats and vulnerabilities. Work with security engineers to analyze security incidents, determine their impact, and develop appropriate response strategies.
  • Support Implementation and Maintenance of Security Solutions: Assist in the design, implementation, and maintenance of security solutions, including firewalls, intrusion detection systems, and endpoint protection. Ensure alignment with business objectives and industry best practices.
  • Collaborate with Cross-Functional Teams: Work closely with IT and business leaders to align security practices with organizational goals. Support secure manufacturing and business operations.
  • Conduct Security Assessments and Audits: Perform regular security assessments and audits to identify vulnerabilities and ensure compliance with industry regulations (e.g., ISO 27001, NIST, GDPR). Develop risk mitigation strategies and oversee threat intelligence processes.
  • Contribute to the Development and Implementation of Security Policies and Standards: Collaborate with the team to establish and enforce security policies, standards, and procedures to protect systems, data, and intellectual property. Provide expertise in incident response and drive continuous improvement post-incident.
  • Training and Awareness: Develop and deliver cybersecurity training and awareness programs for employees. Promote a culture of security awareness across the organization.

Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or related field (Master’s preferred).
  • Experience: 5+ years of experience in cybersecurity, with a focus on security monitoring, incident response, and vulnerability management.
  • Certifications: Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are strongly preferred.
  • Technical Skills: Expertise in security frameworks (e.g., NIST, ISO 27001), network and cloud security, incident response, threat intelligence, and security operations.
  • Analytical Skills: Strong problem-solving and risk assessment skills, with an ability to manage complex projects and meet critical deadlines.
  • Communication: Clear and effective communicator with the ability to present security topics to technical and non-technical audiences at all levels of the organization.

Why Join Us?

  • Impact: Play a key role in securing the operations of an international manufacturing organization.
  • Innovation: Drive and implement cutting-edge cybersecurity solutions in a dynamic industry.
  • Growth: Benefit from continuous learning opportunities, professional development, and career growth.
  • Collaborate: Join a unique and growing international team of IT professionals operating around the clock across three continents.
  • Flexibility: We offer flexible work hours to collaborate closely with the US-based team.
  • Global presence: We have work sites on four continents, with plans to expand further.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Limpopo, Limpopo GVW Group

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Join the dynamic and fast-paced world of Aculocity, a global technology consulting company dedicated to revolutionizing business processes through cutting-edge technology solutions. Since our formal inception in 2006 (and informal in 1999), we've been at the forefront of delivering tailor-made software development solutions, seamless software system implementations, powerful business intelligence, and innovative business process solutions.

As a proud member of the GVW Group, LLC portfolio of companies, we are a premier provider of technology services for GVW's extensive portfolio and a rapidly growing external client base. Join a team that is driving innovation and transforming businesses worldwide. Elevate your career with us at Aculocity.

Job Summary:

We seek an experienced Cybersecurity Analyst to join our team and enhance the cybersecurity posture of our global manufacturing, distribution, and software development operations. This role is based in South Africa and offers the opportunity to work flexible hours to overlap with the US-based Infrastructure and Security team to which this role will report. The successful candidate will be responsible for monitoring, analyzing, and responding to security incidents, ensuring compliance with industry standards, and proactively addressing emerging threats in a dynamic international environment. A customer-oriented ultimate team player is a must.

Key Responsibilities:

  • Monitor and Analyze Security Incidents: Collaborate with the team to continuously monitor security alerts and events to identify potential threats and vulnerabilities. Work with security engineers to analyze security incidents, determine their impact, and develop appropriate response strategies.
  • Support Implementation and Maintenance of Security Solutions: Assist in the design, implementation, and maintenance of security solutions, including firewalls, intrusion detection systems, and endpoint protection. Ensure alignment with business objectives and industry best practices.
  • Collaborate with Cross-Functional Teams: Work closely with IT and business leaders to align security practices with organizational goals. Support secure manufacturing and business operations.
  • Conduct Security Assessments and Audits: Perform regular security assessments and audits to identify vulnerabilities and ensure compliance with industry regulations (e.g., ISO 27001, NIST, GDPR). Develop risk mitigation strategies and oversee threat intelligence processes.
  • Contribute to the Development and Implementation of Security Policies and Standards: Collaborate with the team to establish and enforce security policies, standards, and procedures to protect systems, data, and intellectual property. Provide expertise in incident response and drive continuous improvement post-incident.
  • Training and Awareness: Develop and deliver cybersecurity training and awareness programs for employees. Promote a culture of security awareness across the organization.

Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or related field (Master’s preferred).
  • Experience: 5+ years of experience in cybersecurity, with a focus on security monitoring, incident response, and vulnerability management.
  • Certifications: Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are strongly preferred.
  • Technical Skills: Expertise in security frameworks (e.g., NIST, ISO 27001), network and cloud security, incident response, threat intelligence, and security operations.
  • Analytical Skills: Strong problem-solving and risk assessment skills, with an ability to manage complex projects and meet critical deadlines.
  • Communication: Clear and effective communicator with the ability to present security topics to technical and non-technical audiences at all levels of the organization.

Why Join Us?

  • Impact: Play a key role in securing the operations of an international manufacturing organization.
  • Innovation: Drive and implement cutting-edge cybersecurity solutions in a dynamic industry.
  • Growth: Benefit from continuous learning opportunities, professional development, and career growth.
  • Collaborate: Join a unique and growing international team of IT professionals operating around the clock across three continents.
  • Flexibility: We offer flexible work hours to collaborate closely with the US-based team.
  • Global presence: We have work sites on four continents, with plans to expand further.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Specialists Jobs