Threat Intelligence Lead

Cape Town, Western Cape Canonical

Posted 20 days ago

Job Viewed

Tap Again To Close

Job Description

Canonical Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Threat Intelligence Lead role at Canonical

Continue with Google Continue with Google

Canonical Cape Town, Western Cape, South Africa

Join to apply for the Threat Intelligence Lead role at Canonical

Get AI-powered advice on this job and more exclusive features.

Sign in to access AI-powered advices

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Get notified about new Threat Intelligence Lead jobs in Cape Town, Western Cape, South Africa .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Threat intelligence lead

Cape Town, Western Cape Canonical

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Canonical Cape Town, Western Cape, South Africa Join or sign in to find your next job Join to apply for the Threat Intelligence Lead role at Canonical Continue with Google Continue with Google Canonical Cape Town, Western Cape, South Africa Join to apply for the Threat Intelligence Lead role at Canonical Get AI-powered advice on this job and more exclusive features. Sign in to access AI-powered advices Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.This role will report to the CISO.You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.What you'll do in this roleBuild and own Canonical's threat intelligence strategy Build and maintain OSINT research environments Develop OSINT tradecraft, principals, and techniques Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets Collaborate across teams to inform on activity of interest Coordinate adversary/campaign tracking Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence Identify intelligence gaps and propose new tools and research projects to fill them Conduct briefings for executives, internal stakeholders and external customers The successful Threat Intelligence Lead will beAn experienced threat intelligence leader (or similar) Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.) Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data Experienced using threat intelligence data to influence enterprise architecture or product development decisions An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences Able to travel twice a year, for company events up to two weeks long Desired CharacteristicsA professional portfolio of OSINT related scripts, tools, or frameworks Demonstrated involvement in the larger OSINT community (please share relevant links) Degree qualified, with a bachelor's degree in computer science, information security, or a related field Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, Intel Techniques OSIP, etc) Experience in a tech company or government/military signal intelligence departments What we offer youWe consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues Priority Pass, and travel upgrades for long haul company events About CanonicalCanonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, Io T and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.Canonical is an equal opportunity employerWe are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.Seniority level Seniority level Mid-Senior level Employment type Employment type Full-time Job function Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Get notified about new Threat Intelligence Lead jobs in Cape Town, Western Cape, South Africa . We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Cape Town, Western Cape Globeleq

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

For more than 20 years, Globeleq has been a long-term investor, developer, owner and operator of diversified power projects in Africa, where the company is one of the largest Independent Power Producers. With nearly 1,800MW of generation capacity in operation across 17 power plants in 7 countries, 485MW of new power projects in construction and 2,000MW in development, Globeleq is one of the largest independent power producers solely focused in Africa. Globeleq is 70% owned by British International Investment and 30% by Norfund, the development finance institutions of the UK and Norway, and has a proven track record for supporting the ongoing development of the African power sector.

Globeleq’s generation technologies include gas, wind, solar PV, battery energy storage (BESS), and geothermal. The company is also actively pursuing new opportunities which are emerging from the energy transition.

The primary purpose of the role will be to support the Group Cyber Security Manager with operational security support. The Cyber Security Analyst will utilise their knowledge of threats and vulnerabilities to operate cyber defence systems against a range of cybersecurity concerns using the Microsoft security suite of products. The role is technical and will be based in Cape Town, South Africa.

Key Responsibilities
  • Threat Detection and Monitoring: Log analysis – Review system logs for suspicious activity. Microsoft Sentinel and Defender XDR platforms.
  • Threat Hunting: Proactively search for hidden cyber threats. KQL.
  • Incident Response: Investigate and respond to cyber incidents alerted by the Cyber Defence Centre and SIEM platform. Work with internal IT and OT teams to respond to, remediate, and recover from cyber incidents. Document incident response scenarios.
  • Security Hardening: Drive remediation of security vulnerabilities and misconfiguration with IT and OT teams. Perform access reviews, dormant and unauthorised device reviews, and drive remediation.
  • Cyber Security Assessments: Conduct risk assessments and document action plans in risk registers. Facilitate risk response activities and document outcomes. Report on non-compliance. Facilitate third-party security reviews.
  • Security Awareness: Conduct phishing and other security-related simulations. Perform role-based security awareness. Drive remedial training activities.
  • Red Teaming: Maintain the red-team platform. Conduct attack simulations. Drive remediation with the blue team and IT teams.
  • Reporting and Processes: Document security processes and procedures. Produce weekly, monthly and quarterly security reports for management.
Skills and Competencies
  • Good verbal communication, able to communicate technical information with other technical teams.
  • Good written communication, including being able to write clear, concise emails and reports.
  • Willingness to learn. Proactive attitude. Able to work in a multicultural context. Able to influence others without line authority.
  • Good analytical and problem-solving ability, with a solutions-focused approach. Good facilitation skills and the ability to coordinate with others to achieve objectives.
  • Able to work well under occasional high stress / high-risk situations. Able to handle multiple tasks, prioritise work and work effectively under limited supervision.
Experience & Qualifications

The following experience and qualifications are considered minimum requirements.

  • 2+ years’ experience in a security analyst or operations role with hands-on experience with the Microsoft security suite of products.
  • Any one of the following: CompTIA Security+, Certified in Cybersecurity (CC) – ISC2, ISACA Certified Cybersecurity Operations Analyst (CCOA) or
  • Code B driver’s license.

The following experience and qualifications would be considered an advantage to an applicant.

  • Microsoft Certified: Security Operations Analyst Associate (SC-200).
  • SSCP – Systems Security Certified Practitioner - ISC2.
  • Certified as competent in CompTIA Cyber Security Analyst (CySA) or EC-Council Certified Network Defender (EC-CND).
  • Experience with Defender XDR, Intune, and Red Team platforms.
  • Experience with the KnowBe4 security awareness platform.
  • Experience performing risk assessments and conducting third-party risk assessments.
  • Experience with Operational Technology environments.

We develop, own and operate power plants utilising various technologies across the African continent. With many years of international industry experience, the support of committed shareholders, and long-standing project, technology, finance and government partnerships, we have the financial strength, management and operational expertise to power Africa to realise its potential.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Parow, Western Cape The Foschini Group

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities:
Security Monitoring
  • Perform log ingestion, define use cases, and create alerts for critical assets.
  • Perform daily SIEM health checks and remediate accordingly.
  • Monitor security alerts and events using various tools and technologies.
  • Analyze and investigate security incidents to identify potential threats.
  • Collaborate with team members to develop and implement effective monitoring strategies.
  • Using IOCs and threat intelligence, perform threat hunting across environment.
Incident Response
  • Respond promptly to security incidents, provide initial analysis, conduct business impact assessment, isolate, eradiate and recovery from threats.
  • Document and report incidents, ensuring accurate and comprehensive records.
  • Follow established incident response procedures, playbooks and contribute to their enhancement.
EndPoint Protection
  • Manage and maintain endpoint security and EDR solutions.
  • Perform daily health checks endpoint security and EDR solutions and remediate accordingly.
  • Conduct regular scans and assessments to identify and mitigate potential vulnerabilities.
  • Work with IT teams to ensure endpoint security configurations align with organizational standards.
Vulnerability Management
  • Assist in the identification and prioritization of vulnerabilities within the organization's infrastructure.
  • Collaborate with system owners and IT teams to remediate identified vulnerabilities.
  • Stay informed about the latest security threats and vulnerabilities.
Email Security
  • Monitor and analyze email traffic for potential security threats.
  • Respond to and mitigate email-borne security incidents.
  • Work with email security solutions to enhance protection against phishing and malware attacks.
Qualifications and Experience:
  • Relevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience.
  • One or more certifications in: EC-Council SOC, Security+, AWS Certifications, Microsoft Certifications, Google Certifications
  • Must have 3-6 years' experience in a Cybersecurity related role.
  • Practical experience with system monitoring SIEM, assessment, and reporting tools (ArcSight, IBM QRadar, Splunk, Sentinel, Exabeam, SIEMonster, AlientVault etc.)
  • Practical experience with EDR and XDR tools.
  • Proficiency in network security, operating systems, and security technologies.
  • Experience with common information technologies (Windows, VMware, and Cisco as well as some UNIX, Linux).
  • Experience with Vulnerability and Malware Analysis (threat and attack analysis).
  • Experience with security tools (WAF, Proxy, DNS, IDS, firewalls, anti-virus, data loss prevention, etc.).
  • Knowledge of Cloud Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Protection
  • Technology experience to be considered; Security+; Microsoft Security Certifications (MS-SC200); Azure Certifications, Recognised SOC certification
Skills:
  • Ability to work in independent environments under aggressive timelines.
  • Ability to develop and maintain working relationships in a global environment.
  • Excellent analytical and problem-solving skills
  • Outstanding written skills for preparing reports and briefings.
Behaviours:
  • Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner
  • Decision Quality - consistently makes timely, well-rounded and informed decisions
  • Ensures Accountability - takes accountability and ensures others are held to account on agreed upon performance targets
  • Manages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problems
  • Tech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growth
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Durbanville, Western Cape R250000 - R450000 Y GVW Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Description
Position at Aculocity, LLC
Join the dynamic and fast-paced world of Aculocity, a global technology consulting company dedicated to revolutionizing business processes through cutting-edge technology solutions. Since our formal inception in 2006 (and informal in 1999), we've been at the forefront of delivering tailor-made software development solutions, seamless software system implementations, powerful business intelligence, and innovative business process solutions.

As a proud member of the GVW Group, LLC portfolio of companies, we are a premier provider of technology services for GVW's extensive portfolio and a rapidly growing external client base. Join a team that is driving innovation and transforming businesses worldwide. Elevate your career with us at Aculocity.

Job Summary:

We seek an experienced Cybersecurity Analyst to join our team and enhance the cybersecurity posture of our global manufacturing, distribution, and software development operations. This role is based in South Africa and offers the opportunity to work flexible hours to overlap with the US-based Infrastructure and Security team to which this role will report. The successful candidate will be responsible for monitoring, analyzing, and responding to security incidents, ensuring compliance with industry standards, and proactively addressing emerging threats in a dynamic international environment. A customer-oriented ultimate team player is a must.

Key Responsibilities:

  • Monitor and Analyze Security Incidents:

  • Collaborate with the team to continuously monitor security alerts and events to identify potential threats and vulnerabilities.

  • Work with security engineers to analyze security incidents, determine their impact, and develop appropriate response strategies.

  • Support Implementation and Maintenance of Security Solutions:

  • Assist in the design, implementation, and maintenance of security solutions, including firewalls, intrusion detection systems, and endpoint protection.

  • Ensure alignment with business objectives and industry best practices.

  • Collaborate with Cross-Functional Teams:

  • Work closely with IT and business leaders to align security practices with organizational goals.

  • Support secure manufacturing and business operations.

  • Conduct Security Assessments and Audits:

  • Perform regular security assessments and audits to identify vulnerabilities and ensure compliance with industry regulations (e.g., ISO 27001, NIST, GDPR).

  • Develop risk mitigation strategies and oversee threat intelligence processes.

  • Contribute to the Development and Implementation of Security Policies and Standards:

  • Collaborate with the team to establish and enforce security policies, standards, and procedures to protect systems, data, and intellectual property.

  • Provide expertise in incident response and drive continuous improvement post-incident.

  • Training and Awareness:

  • Develop and deliver cybersecurity training and awareness programs for employees.

  • Promote a culture of security awareness across the organization.

Qualifications:

  • Education: Bachelor's degree in Computer Science, Information Security, or related field (Master's preferred).
  • Experience: 5+ years of experience in cybersecurity, with a focus on security monitoring, incident response, and vulnerability management.
  • Certifications: Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are strongly preferred.
  • Technical Skills: Expertise in security frameworks (e.g., NIST, ISO 27001), network and cloud security, incident response, threat intelligence, and security operations.
  • Analytical Skills: Strong problem-solving and risk assessment skills, with an ability to manage complex projects and meet critical deadlines.
  • Communication: Clear and effective communicator with the ability to present security topics to technical and non-technical audiences at all levels of the organization.

Why Join Us?

  • Impact: Play a key role in securing the operations of an international manufacturing organization.
  • Innovation: Drive and implement cutting-edge cybersecurity solutions in a dynamic industry.
  • Growth: Benefit from continuous learning opportunities, professional development, and career growth.
  • Collaborate: Join a unique and growing international team of IT professionals operating around the clock across three continents.
  • Flexibility: We offer flexible work hours to collaborate closely with the US-based team.
  • Global presence: We have work sites on four continents, with plans to expand further.
This advertiser has chosen not to accept applicants from your region.

Cybersecurity analyst

Parow, Western Cape The Foschini Group

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Key Responsibilities: Security Monitoring Perform log ingestion, define use cases, and create alerts for critical assets. Perform daily SIEM health checks and remediate accordingly. Monitor security alerts and events using various tools and technologies. Analyze and investigate security incidents to identify potential threats. Collaborate with team members to develop and implement effective monitoring strategies. Using IOCs and threat intelligence, perform threat hunting across environment. Incident Response Respond promptly to security incidents, provide initial analysis, conduct business impact assessment, isolate, eradiate and recovery from threats. Document and report incidents, ensuring accurate and comprehensive records. Follow established incident response procedures, playbooks and contribute to their enhancement. End Point Protection Manage and maintain endpoint security and EDR solutions. Perform daily health checks endpoint security and EDR solutions and remediate accordingly. Conduct regular scans and assessments to identify and mitigate potential vulnerabilities. Work with IT teams to ensure endpoint security configurations align with organizational standards. Vulnerability Management Assist in the identification and prioritization of vulnerabilities within the organization's infrastructure. Collaborate with system owners and IT teams to remediate identified vulnerabilities. Stay informed about the latest security threats and vulnerabilities. Email Security Monitor and analyze email traffic for potential security threats. Respond to and mitigate email-borne security incidents. Work with email security solutions to enhance protection against phishing and malware attacks. Qualifications and Experience: Relevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience. One or more certifications in: EC-Council SOC, Security+, AWS Certifications, Microsoft Certifications, Google Certifications Must have 3-6 years' experience in a Cybersecurity related role. Practical experience with system monitoring SIEM, assessment, and reporting tools (Arc Sight, IBM QRadar, Splunk, Sentinel, Exabeam, SIEMonster, Alient Vault etc.) Practical experience with EDR and XDR tools. Proficiency in network security, operating systems, and security technologies. Experience with common information technologies (Windows, VMware, and Cisco as well as some UNIX, Linux). Experience with Vulnerability and Malware Analysis (threat and attack analysis). Experience with security tools (WAF, Proxy, DNS, IDS, firewalls, anti-virus, data loss prevention, etc.). Knowledge of Cloud Security Operations (Saa S, Paa S, Iaa S), Mobile Architecture, Network and Application Security and/or Data Protection Technology experience to be considered; Security+; Microsoft Security Certifications (MS-SC200); Azure Certifications, Recognised SOC certification Skills: Ability to work in independent environments under aggressive timelines. Ability to develop and maintain working relationships in a global environment. Excellent analytical and problem-solving skills Outstanding written skills for preparing reports and briefings. Behaviours: Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner Decision Quality - consistently makes timely, well-rounded and informed decisions Ensures Accountability - takes accountability and ensures others are held to
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Consultant iKapa

Cape Town, Western Cape Xcede Group

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Security Specialist

My client in the financial industry is looking for a Cyber Security Specialist.

The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.

What will you be responsible for?

* On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of:

  • Anti-Virus Infrastructure
  • Data Leakage Prevention system, rules, and reports
  • Privileged Account Management process
  • Network Access Control - process and exception handling
  • Vulnerability Scanning, reporting, proposing remediation actions, and tracking compliance
  • Security hardening baseline compliance scanning, reporting, and remediation

* On an ad hoc basis, the consultant will support businesses in:

  • Issuing, renewing, and revoking PKI digital certificates.
  • Assessing internet and email use on request of Forensics or HR departments.
  • Performing scheduled tasks like reviewing Firewall rule configuration and reporting.

* The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.
* The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.
* The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or through interaction with experts.

Qualifications
* Matric
* Information Technology diploma or degree
* Information Security certification (preferable)

Experience
At least 3 - 5 years of hands-on technical experience which includes:

  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Anti-Virus System management and Configuration
  • Data Leakage Prevention tool configuration
  • Logical Access Management (AD, PAM)
  • Information Security Operations (Security+, CISSP will be beneficial)
  • Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores)


Required Skills

  • Security Auditing
  • Reporting and Administration
  • Security tools monitoring
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity Jobs in Bellville !

Cybersecurity consultant ikapa

Cape Town, Western Cape Xcede Group

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Cyber Security Specialist My client in the financial industry is looking for a Cyber Security Specialist.The role of the Cyber Security Consultant: Operations will form part of the team which focuses on Cyber Security Operations services to businesses on the Shared Network. This team is responsible for management of the PKI, Anti-Virus, Vulnerability Management, Security Configuration Management, Firewall compliance, and Web and Email content filtering environments. The team also manages the Data Leakage Prevention, Network Access Management, and Privileged Account Management infrastructure and processes.What will you be responsible for?* On a day-to-day basis, the Consultant will be involved with the configuration, monitoring, and management of: Anti-Virus Infrastructure Data Leakage Prevention system, rules, and reports Privileged Account Management process Network Access Control - process and exception handling Vulnerability Scanning, reporting, proposing remediation actions, and tracking compliance Security hardening baseline compliance scanning, reporting, and remediation * On an ad hoc basis, the consultant will support businesses in: Issuing, renewing, and revoking PKI digital certificates. Assessing internet and email use on request of Forensics or HR departments. Performing scheduled tasks like reviewing Firewall rule configuration and reporting. * The consultant will be required to report on the status of the cyber security control environments on a weekly, monthly, and quarterly basis.* The consultant will continuously consider ways to improve the effectiveness and efficiency of monitoring and response controls.* The consultant will contribute to the knowledge and skills of the team by sharing lessons learned and knowledge gained through research, conferences, training courses, or through interaction with experts.Qualifications * Matric* Information Technology diploma or degree* Information Security certification (preferable)Experience At least 3 - 5 years of hands-on technical experience which includes: Network experience (TCP/IP, Firewalls, IPS, NAC) Anti-Virus System management and Configuration Data Leakage Prevention tool configuration Logical Access Management (AD, PAM) Information Security Operations (Security+, CISSP will be beneficial) Vulnerability Management (use of well-known vulnerability scanning tools and interpretation of CVSS scores) Required Skills Security Auditing Reporting and Administration Security tools monitoring #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Specialist (CPT Hybrid)

Cape Town, Western Cape DataFin

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

ENVIRONMENT: A reputable Financial Services Group seeks the technical expertise of a Cybersecurity Specialist with at least 5-10 years’ experience in a technical hands-on administrative or engineering role responsible for Cybersecurity toolsets. Your role will include specifying the parameters that the security solutions require to function properly, contributing to the engineering of the security solutions, carrying out operations with the support of the security solutions, operating the security solutions in functional and technical terms, and providing help and support to users. Your Cybersecurity toolset knowledge should include IAM, PAM, Firewall, NAC, WAF, DDoS, MFA, MDM, Endpoint Protection, DLP, Vulnerability Scanning, AD, Windows OS, Linux OS, Network and Wi-Fi Administration.

Duties
  • Implementation of business enablement through securing IoT, 5G and Edge Computing.
  • Develop and implement security architecture strategies encompassing traditional network and micro segmentation, defence-in-depth, remote access, encryption technologies, backup and replication, Software Defined Networking (SDN), network function virtualization, zero trust models, Secure Access Service Edge (SASE)/Secure Service Edge (SSE), and overlay networks and secure enclaves.
  • Management of risk by conducting risk assessments and Penetration Testing.
  • Ensure security operations resilience through threat prevention involving network and application firewalls, assess management, SaaS detection, and encryption (SSL, PKI).
  • Ensure security operations resilience through threat detection, including log analysis and correlation, threat hunting, insider threat detection, integration with Managed Security Service Providers (MSSP), integration of Threat Intelligence Platform (TIP), utilisation of deception technologies for breach detection, full packet inspection, and detection of misconfigurations.
  • Management of identities by providing oversight of identity credentialing, account creation and deletion, Single Sign On (SSO), and privileged access management (PAM).
  • Timely and proficient handling of security breaches, employing rapid response protocols and comprehensive remediation strategies.
  • Methodically test and assess security products to guarantee alignment with specific operational requirements and standards.
  • Compile comprehensive reports meticulously documenting security incidents and the corresponding course of action.
  • Research cutting-edge security technologies and proactive strategies to ensure current and proactive protection against evolving threats.
Key Competencies
  • Create specifications and conduct technical and operational reviews.
  • Implement and engineer solutions, including deployment, configuration, and testing.
  • Manage operations, changes, and incidents.
  • Conduct operations using security solutions such as IAM, DLP, DSPM, PAM and TPRM.
  • Provide support and guidance to entities for installing and operating security solutions.
  • Design and produce indicators, reporting documents, and reports on the performance of security solutions.
  • Implement warranties such as alerts and controls.
  • Lead working groups.
  • Create user, technical, and operational documentation.
Requirements
  • Qualifications – Grade 12 / Matric.
  • Relevant degree/diploma – desirable.
  • Industry Certification will be advantageous (CompTIA, ISC2, etc.).
  • Vendor Certification will be advantageous (Fortinet, Cisco, Microsoft, etc.).
Experience / Skills
  • At least 5-10 years’ experience in a technical hands-on administrative or engineering role responsible for Cybersecurity toolsets including IAM, PAM, Firewall, NAC, WAF, DDoS, MFA, MDM, Endpoint Protection, DLP, Vulnerability Scanning, AD, Windows OS, Linux OS, Network and Wi-Fi administration.
  • IT knowledge.
  • IT infrastructure
  • IT development
  • Production operations steering.
  • IT Security and Cybersecurity.
  • Ability to manage/facilitate meetings, seminars, committees, and training.
  • Can setup relevant performance indicators.
Attributes
  • Creativity & Innovation/Problem Solving.
  • Ability to collaborate/Teamwork.
  • Adaptability.
  • Able to share/pass on knowledge.
  • Analytical ability.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

(Fluent English, Cybersecurity) Technical Support Consultant (remotely)

Bellville, Western Cape SupportYourApp

Posted today

Job Viewed

Tap Again To Close

Job Description

Passionate about the world of tech?

What if you had a chance to be a part of the world’s leading SaaS, Software, or Hardware solutions?

Join our team as a Technical Support Consultant today and thrive in a multicultural and multilingual environment while enjoying your home office. Unlock your potential by mastering new skills and achieving challenging goals with our People First management approach.

Excited? Let’s see what it takes

What you will do :

  • Provide exceptional customer support via emails
  • Troubleshoot technical products and applications
  • Provide product information and assist with sales-related questions
  • Build positive and long-lasting relationships with customers
  • Meet team KPIs
  • Always be up-to-date with cutting-edge technology
  • Securely work with customers’ sensitive information
  • Apply the latest and greatest customer happiness practices
  • Maintain working knowledge of our client’s products and services
  • Communicate with developers and other departments of various IT companies

What you need to succeed in this role :

  • Excellent English skills (at least C1 for both spoken and written)
  • Experience in customer service within a SaaS or cybersecurity company
  • Comfortable with technology and eager to learn new tools
  • KPI-driven, with a clear understanding of performance metrics
  • Hands-on experience with CRM (Zendesk preferred)
  • Creative thinker, able to propose alternate solutions when needed
  • Patience and resilience when handling complex cases or difficult customers.
  • Positive and responsible attitude
  • Personal laptop or computer (at least 8Gb of RAM) and a stable internet connection (minimum 50 Mbps–download and 40 Mbps–upload)
  • The items listed in this section may vary depending on the terms of your engagement. Certain benefits and conditions typically apply to employees; independent contractors may not be eligible for all of these. The specific terms, including compensation, benefits, and work conditions, will be clearly defined in your agreement if selected.

Who we are :

SupportYourApp is a Support-as-a-Service company that provides secure technical, customer support, and CX services for tech companies around the globe.

We work with clients from over 30 countries and speak over 60 languages.

Since 2010, we’ve become an industry leader in premium outsourced customer support and turned global with 8 hubs around the world.

We treat our team like our clients, surrounding them with unlimited care, an individual approach, and a wholesome positive experience.

We welcome people with various backgrounds and experiences. Grab the chance to join us and send your CV in English , pointing out your outstanding skills!

Visit our website :

DISCLAIMER

We are a multinational company with unbiased views. The assessment of candidates is not affected by such characteristics as race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity, or any other reason prohibited by law in provision of opportunities and benefits.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs View All Jobs in Bellville