86 Ethical Hacking jobs in South Africa

Information Security Analyst II

Johannesburg, Gauteng nedbank

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.

Job Responsibilities
  • We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
  • Experience with Email and Web Proxies
  • DNS Security knowledge
  • Experience with Microsoft O365
  • Assist with support of current email and web security tasks
  • Liaise with other teams to promote good security practices and explain security procedures
  • Experience with Security Technologies
  • Building relationships with I&O Teams
  • Oversee the implementation of the information security changes and check for the short comings and risks.
  • Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
  • Participate in the implementation of new products as provided in the selection criteria.
  • Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
  • Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
  • Document and maintain all relevant processes and procedures mindful of current policies and standards.
  • Create and maintain information security standards.
  • Oversee and monitor the information security environment according to set standards.
  • Review and contribute to project documentation including business requirements, designs and implementation.
  • Create design documentation according to relevant standards and practices
  • Implement specific Information security technologies.
  • Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
  • Log submit and implement low, medium and high risk changes independently.
  • Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
  • Oversee and ensure change was successful in certain cases and when required perform unit testing.
  • Oversee and ensure back-ups are done, documents are stored and statuses updated.
  • Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
  • Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
  • Ensure job related tasks and processes are in place.
  • Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
  • Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
  • Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
  • Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
  • Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
  • Transfer of knowledge to team members.
  • Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
Technical Knowledge
  • Strong knowledge of Information Security Principles
  • Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
  • Knowledge of Email Security
  • Experience with Email Security Technologies
  • Experience Service Now
  • Experience Microsoft O365
Essential Qualifications - NQF Level
  • Matric / Grade 12 / National Senior Certificate
  • Advanced Diplomas/National 1st Degrees
Preferred Certifications
  • CCNA - Security
  • Security +
  • Network +
  • MS Azure Certifications – MS 365
Minimum Experience Level

Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks

Technical / Professional Knowledge
  • Administrative procedures and systems
  • Data analysis
  • Governance, Risk and Controls
  • Principles of project management
  • Relevant regulatory knowledge
  • Relevant software and systems knowledge
  • Cluster Specific Operational Knowledge
  • System Development Life cycle(SDLC)
  • TCP/IP
  • Information Security terms and definitions
  • Information Security policies and procedures
  • Communication
  • Customer Focus
  • Initiating Action
  • Managing Work
  • Technical/Professional Knowledge and Skills

---

Please contact the Nedbank Recruiting Team at

If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.

Nedbank Ltd Reg No 1951/ /06.
Authorised financial services and registered credit provider (NCRCP16).

For assistance please contact the Nedbank Recruiting Team at

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst - Penetration Testing & Red Teaming

Johannesburg, Gauteng The Legends Agency

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Our client is looking for a talented Security Analyst who is ready to take on a variety of security assessments and grow their career in a high-energy, cutting-edge environment.

Responsibilities:

Penetration Testing:

  • Collaborate within a team of experts to conduct vulnerability assessments and penetration tests across a wide range of technologies.
  • Assess network, application (web and thick client), mobile, wireless, social engineering, and physical security, using both automated and manual techniques.
  • Engage with clients professionally to deliver insights and constructive feedback, ensuring their security needs are met.
  • Dive deep into security topics like network, database, and application security, developing your expertise along the way.
  • Leverage your skills with penetration testing tools to uncover vulnerabilities and improve security measures.

Red Teaming:

  • Become part of an elite Red Team, focusing on reconnaissance using open-source intelligence (OSINT) to gather actionable data.
  • Take the lead in compromising systems by identifying vulnerabilities in people, processes, and technology.
  • Develop and deploy command-and-control servers and custom payloads, establishing persistence within target environments.
  • Evolve your craft by creating new tools, techniques, and procedures to avoid detection by defenders.
  • Work on escalation, maintaining long-term access to compromised networks, and exfiltrating critical data.

Research and Development:

  • Stay ahead of the curve by researching and identifying new vulnerabilities, focusing on high-profile products and systems.
  • Understand and analyze the latest tactics used by threat actors to craft innovative security strategies.
  • Develop and refine attack methodologies that will be used to strengthen future defensive efforts.

Requirements:

Experience:

  • 2-5 years' hands-on Penetration Testing, including a strong background in network, mobile, web, and wireless security assessments.
  • Strong understanding of common vulnerability assessment and penetration testing tools.
  • Ability to think critically and creatively to solve complex security challenges.
  • Strong communication skills for both internal collaboration and client-facing interactions.
  • Passion for continuous learning and staying updated on the latest in cybersecurity.
This advertiser has chosen not to accept applicants from your region.

Network Security Analyst

Optimal Growth Technologies

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Direct message the job poster from Optimal Growth Technologies

Overview

Location: Remote a0 South Africa

We7re looking for a highly skilled Network Security Analyst to join our forward-thinking, security-driven team. In this role, you7ll be the guardian of our digital infrastructured ensuring that firewalls, network rules, and security configurations are robust, compliant, and ready to face emerging threats.

Responsibilities
  • Manage and resolve firewall-related tickets efficiently.
  • Add, modify, and optimize firewall rules in line with security best practices.
  • Configure Palo Alto firewalls confidently and effectively.
  • Implement secure changes without disrupting business operations.
  • Monitor and analyze security systems to proactively prevent breaches.
Required Skills & Qualifications
  • Proven experience managing and configuring Palo Alto firewalls.
  • Strong understanding of firewall rule creation and security change management.
  • Familiarity with common security protocols and network monitoring tools.
  • Excellent troubleshooting and analytical skills.
Nice to Have
  • Experience working with Checkpoint firewalls.
  • Exposure to other enterprise security solutions.
Why Join Us?
  • 100% remote work e operate from anywhere in South Africa.
  • Competitive salary aligned with experience.
  • Join a dynamic, security-focused team with cutting-edge tools and projects.
Job Details
  • Seniority level: Mid-Senior level
  • Employment type: Contract
  • Job function: Information Technology
  • Industries: IT Services and IT Consulting

Referrals increase your chances of interviewing at Optimal Growth Technologies by 2x

Get notified about new Network Security Analyst jobs in South Africa .

Cape Town, Western Cape, South Africa 2 weeks ago

City of Johannesburg, Gauteng, South Africa 1 day ago

Cape Town, Western Cape, South Africa 5 months ago

Cape Town, Western Cape, South Africa 5 months ago

Cape Town, Western Cape, South Africa 2 weeks ago

We7re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

NETSTOCK

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities

  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content

Required Skills and Qualifications

  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders

Preferred Skills and Qualifications

  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Gauteng, Gauteng Teraco – A Digital Realty Company

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Teraco Data Environments

2025/07/24 Gauteng

Job Reference Number: PSA_JB3

Department: Security

Business Unit

Industry: Information Technology

Job Type: Permanent

Positions Available: 1

Salary: Market Related

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting.

Job Description

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

Main Functions Of The Job

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

Job Requirements

Skills Requirement

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

Qualifications And Experience

  • Matric
  • Experience in Vendor Management and related SLA’s
  • Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • A+
  • N+
  • Microsoft Excel

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Finance and Sales
  • Industries Facilities Services

Referrals increase your chances of interviewing at Teraco – A Digital Realty Company by 2x

Get notified about new Investment Analyst jobs in Gauteng, South Africa .

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 5 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Talent Pool: Investment Consultant (Johannesburg) MMH Talent Pool: Investment Consultant (Johannesburg)

Pretoria, Gauteng, South Africa 1 day ago

Johannesburg, Gauteng, South Africa 1 week ago

Pretoria, Gauteng, South Africa 2 weeks ago

Centurion, Gauteng, South Africa 3 months ago

Talent Pool: Investment Regional Manager - Countrywide MMH

Centurion, Gauteng, South Africa 4 months ago

Johannesburg, Gauteng, South Africa 1 day ago

Talent Pool: Investment Regional Manager - Countrywide MMH

Centurion, Gauteng, South Africa 2 days ago

Pretoria, Gauteng, South Africa 2 weeks ago

Johannesburg, Gauteng, South Africa 1 month ago

Senior Lecturer (College of Business & Economics: Department of Finance & Investment Management) Intermediate Business Analyst – Become Senior Business Analyst working for SA’s leading wealth manager – Johannesburg – R650K PA

City of Johannesburg, Gauteng, South Africa 15 hours ago

Springs, Gauteng, South Africa 4 days ago

Senior Business Analyst | Waterfall, Gauteng | Permanent

Johannesburg, Gauteng, South Africa 5 days ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa ZAR60,000.00-ZAR72,000.00 1 month ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa 5 days ago

SPECIALIST ANALYST INVESTMENT PROVIDERS DEPARTMENT

Sandton, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 2 months ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 4 days ago

Business Analyst – Design investment management platform features for SA’s leading wealth manager – Johannesburg – R810K PA

Johannesburg Metropolitan Area 15 hours ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Offensive Security Analyst

Cape Town, Western Cape S-RM

Posted 26 days ago

Job Viewed

Tap Again To Close

Job Description

S-RM Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Offensive Security Analyst role at S-RM

S-RM Cape Town, Western Cape, South Africa

Join to apply for the Offensive Security Analyst role at S-RM

Offensive Security Analysts support our delivery consultants running our offensive security services. They help to interpret client challenges, innovate solutions, and deliver findings. Our aim is to become trusted advisors to our clients.

You will work across the full spectrum of our pentesting services, whether point in time or continuous, as well as participate in larger engagements such as red teams. You will help our clients to build cyber resilience, enhance their understanding of the threat landscape and become better prepared to face dynamic and evolving security risks.

1.1 Main Duties And Responsibilities

Client Engagement and Account Management

  • Engage with clients to understand their cyber security challenges
  • Translate client challenges into solutions that fit S-RM's Offensive Security service offering and value proposition
  • Develop an understanding of delivery timelines, project resourcing requirements and pricing
  • Understand S-RM's proposal process and lead on proposal writing and presentations in some cases
  • Contribute to the expansion of client accounts and winning of new business
  • Gain an understanding of S-RM's target sectors and industries



Offensive Security

  • Penetration testing
    • Vulnerability assessments and monitoring
    • External infrastructure
    • External Attack Surface Management
    • Web application
    • API pentesting
    • Phishing and spear phishing
    • Internal pentesting
    • Mobile application pentesting (Android and iOS)
    • OT Pentesting
    • IOT Pentesting
    • Cloud Pentesting
    • Open-Source Intelligence (OSINT) gathering


  • Configuration Reviews
    • Cloud configuration review
    • Application configuration review
    • Hardware build review
    • Firewall review


  • Delivery & Client communications
    • Deliver findings in a range of formats, including written reports, presentations, and verbal briefings


  • Threat Intelligence
    • Keep abreast of threat intelligence developments, threat actor activity and security industry developments in mitigations and tooling
    • Develop and deliver client threat profiles, threat assessments and dark web analysis
Project Management



  • Support vCISO engagements, accessing the full range of S-RM's resources and expertise
  • Collaborate with incident response, ethical hacking, and digital forensics teams to integrate our services and support to clients
  • Support the delivery of retainer relationships
  • Support the delivery of the Attack Surface Management (ASM) service



Internal Initiatives and Strategy

  • Support internal initiatives on product development, process management, tech enablement, efficiency and exploring different ways to support clients
  • Contribute to the adaption of security frameworks to create innovative products
  • Challenge received wisdom and existing products and services. Suggest alternative approaches where appropriate
    • Develop documentation and evolve the testing methodologies where applicable
Professional Development and Domain Knowledge



  • Commit to continuous professional development and personal knowledge improvement across the full range of cyber security competencies, in line with personal utilisation targets (see Objectives)
  • Complete up to one formal training course over the financial year. This is beyond internal training sessions
  • Share knowledge with the wider team in line with company values, including contributing to internal training initiatives and programmes

Seniority level
  • Seniority level Entry level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Security and Investigations

Referrals increase your chances of interviewing at S-RM by 2x

Sign in to set job alerts for “Security Analyst” roles.

Cape Town, Western Cape, South Africa 3 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Business Intelligence Business Analyst III (BIBA III)

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa ZAR450,000.00-ZAR700,000.00 1 month ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 4 months ago

Cape Town, Western Cape, South Africa 2 weeks ago

L2 Security Operations Centre (SOC) Analyst

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 3 months ago

Cape Town, Western Cape, South Africa 3 weeks ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 3 months ago

Stellenbosch, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 3 months ago

MS Sentinel SIEM Security Engineer (South Africa)

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 3 days ago

Stellenbosch, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

Security Operations Engineer – Identify and Access Management (IAM) Specialist

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Engineer (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Sandton, Gauteng Core Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Overview Support the Cyber Security team in monitoring, remediating, and reporting on security issues across the organisation. This includes handling alerts, engaging users, managing vulnerabilities, supporting awareness training, and assisting with internal reporting. Key Responsibilities Security Incident Handling Resolve cyber security-related support tickets within SLA. Monitor alerts from Slack, email, and security tools. Engage users directly and take full ownership of each incident, ensuring it is thoroughly investigated and resolved without delay. Vulnerability & Endpoint Management Track and drive remediation of vulnerabilities with IT teams and users. Ensure security applications are correctly installed and running on all endpoints. Threat Monitoring Monitor threat intelligence sources for risks to Core Group and escalate where required. Training & Awareness Assist with cyber awareness course creation and reviews. Enrol staff via LMS and manage reminders. Reporting & Presentations Create or contribute to internal presentations (e.g., Cyber Pack Updates, IT meetings). Requirements 3-5 years in a security analyst, SOC, or IT security support role Familiarity with endpoint security, vulnerability tracking, and phishing incident response Strong communication and follow-up skills Comfortable using communication, productivity, and presentation tools Able to work independently and escalate appropriately
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Ethical hacking Jobs in South Africa !

Technical Security Analyst

Gauteng, Gauteng Crayon Technologies Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

How you'll role As a Technical Security Analyst, you will be on the frontline of our cyber defense strategy. Your mission is to safeguard our digital environment by identifying and responding effectively to threats. You'll work collaboratively with cross-functional teams, providing expertise in forensic analysis, vulnerability assessment, and threat intelligence. Your role is essential in interpreting complex server logs and evaluating the impact of vulnerabilities on the business. If you're passionate about cyber forensics and building resilient, secure systems, this is a perfect opportunity for you. What you'll do Collect and preserve forensic evidence from servers, endpoints, and cloud environments Access, read, and interpret server logs, audit trails, and system data Analyze logs for suspicious activity and known attack signatures Evaluate the likelihood and potential consequence of exploitation and provide mitigation recommendations Collaborate with DevOps, IT, and Security teams during incident response Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR) Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns What you'll need Proficiency in forensic tools and techniques Generalist understanding of server infrastructure and core security concepts Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.) Experience with CVE tracking, vulnerability scanners, and mitigation workflows Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.) Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders Preferred experience Hands-on incident response or blue team roles Exposure to SIEM platforms Understanding of chain-of-custody and legal considerations in evidence handling IDS/IPS knowledge Ability to track vulnerabilities through to remediation Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK Ability to perform hypothesis-driven hunts and pivot off findings Knowledge of cloud platforms: AWS, Linode, Hetzner Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Teraco

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

MAIN FUNCTIONS OF THE JOB

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

SKILLS REQUIREMENT

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • li>Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

QUALIFICATIONS AND EXPERIENCE

  • Matric
  • Experience in Vendor Management and related SLA’s
  • li>Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • li>IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • li>A+
  • N+
  • Microsoft Excel
This advertiser has chosen not to accept applicants from your region.

Penetration Tester (Security Analyst)

Johannesburg, Gauteng DataFin

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

ENVIRONMENT

A leading cybersecurity company based in Johannesburg is seeking a skilled and detail-oriented Red Team Penetration Tester /Security Analyst to join their dynamic team. The ideal candidate will have 2-5 years of hands-on experience in Penetration Testing, with a strong background in identifying and mitigating security vulnerabilities across various environments. This role involves conducting comprehensive security assessments, including but not limited to network, mobile, web, thick-client, wireless, social engineering, and physical penetration testing. The successful candidate will be responsible for analysing security risks, providing actionable recommendations, and collaborating with clients and internal teams to enhance overall cybersecurity posture. If you are passionate about ethical hacking, threat analysis, and proactive security measures, this is an excellent opportunity to grow your career in a fast-paced and innovative environment.

DUTIES Penetration Testing Duties
  • Work as part of a vulnerability assessment and /or penetration testing team, taking direction from line managers and executing directives in a thorough and timely fashion
  • Conduct vulnerability assessments on a wide variety of technologies and implementations utilising both automated tools and manual techniques
  • Conduct network penetration tests
  • Conduct application penetration tests (web and thick client)
  • Conduct wireless and mobile security assessments
  • Conduct social engineering assessments
  • Conduct physical security assessments
  • Effectively communicate successes and obstacles with fellow team members and line managers
  • Interface with client contact(s) and staff in a constructive and professional manner
  • Develop subject matter expertise in topics to include network, database, wireless and application security assessments and adversarial network operations
  • Utilise common vulnerability assessment and penetration testing tools
Red Teaming Duties
  • Working as part of a Red Team and assisting with the following duties (but not limited to):
  • Initial reconnaissance – open-source intelligence (OSINT) for collecting information on the targets
  • Initial compromise – gaining a foothold into the target environment through targeting weaknesses in people, process and / or technology.
  • Deploy command-and-control servers (C&C or C2) and custom payloads to establish communication / persistence in the target’s network.
  • Develop tools, techniques and procedures to evade detection by blue team (including the development of custom payloads)
  • Escalate privileges and maintain persistence
  • Exfiltrate and / or complete objectives
Research and Development Duties
  • Research new vulnerabilities with a focus on high-profile products
  • Understand the terminology and tactics employed by threat actors Research new attack methods
REQUIREMENTS
  • Minimum 2-5 years of Penetration Testing experience required Including conducting different types of assessments, such as network, mobile, web, thick, wireless, social engineering, physical, etc.
  • Previous Red Team experience required

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Ethical Hacking Jobs