Information Security Analyst II

Johannesburg, Gauteng nedbank

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.

Job Responsibilities
  • We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
  • Experience with Email and Web Proxies
  • DNS Security knowledge
  • Experience with Microsoft O365
  • Assist with support of current email and web security tasks
  • Liaise with other teams to promote good security practices and explain security procedures
  • Experience with Security Technologies
  • Building relationships with I&O Teams
  • Oversee the implementation of the information security changes and check for the short comings and risks.
  • Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
  • Participate in the implementation of new products as provided in the selection criteria.
  • Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
  • Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
  • Document and maintain all relevant processes and procedures mindful of current policies and standards.
  • Create and maintain information security standards.
  • Oversee and monitor the information security environment according to set standards.
  • Review and contribute to project documentation including business requirements, designs and implementation.
  • Create design documentation according to relevant standards and practices
  • Implement specific Information security technologies.
  • Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
  • Log submit and implement low, medium and high risk changes independently.
  • Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
  • Oversee and ensure change was successful in certain cases and when required perform unit testing.
  • Oversee and ensure back-ups are done, documents are stored and statuses updated.
  • Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
  • Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
  • Ensure job related tasks and processes are in place.
  • Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
  • Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
  • Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
  • Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
  • Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
  • Transfer of knowledge to team members.
  • Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
Technical Knowledge
  • Strong knowledge of Information Security Principles
  • Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
  • Knowledge of Email Security
  • Experience with Email Security Technologies
  • Experience Service Now
  • Experience Microsoft O365
Essential Qualifications - NQF Level
  • Matric / Grade 12 / National Senior Certificate
  • Advanced Diplomas/National 1st Degrees
Preferred Certifications
  • CCNA - Security
  • Security +
  • Network +
  • MS Azure Certifications – MS 365
Minimum Experience Level

Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks

Technical / Professional Knowledge
  • Administrative procedures and systems
  • Data analysis
  • Governance, Risk and Controls
  • Principles of project management
  • Relevant regulatory knowledge
  • Relevant software and systems knowledge
  • Cluster Specific Operational Knowledge
  • System Development Life cycle(SDLC)
  • TCP/IP
  • Information Security terms and definitions
  • Information Security policies and procedures
  • Communication
  • Customer Focus
  • Initiating Action
  • Managing Work
  • Technical/Professional Knowledge and Skills

---

Please contact the Nedbank Recruiting Team at

If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.

Nedbank Ltd Reg No 1951/ /06.
Authorised financial services and registered credit provider (NCRCP16).

For assistance please contact the Nedbank Recruiting Team at

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst - Penetration Testing & Red Teaming

Johannesburg, Gauteng The Legends Agency

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Our client is looking for a talented Security Analyst who is ready to take on a variety of security assessments and grow their career in a high-energy, cutting-edge environment.

Responsibilities:

Penetration Testing:

  • Collaborate within a team of experts to conduct vulnerability assessments and penetration tests across a wide range of technologies.
  • Assess network, application (web and thick client), mobile, wireless, social engineering, and physical security, using both automated and manual techniques.
  • Engage with clients professionally to deliver insights and constructive feedback, ensuring their security needs are met.
  • Dive deep into security topics like network, database, and application security, developing your expertise along the way.
  • Leverage your skills with penetration testing tools to uncover vulnerabilities and improve security measures.

Red Teaming:

  • Become part of an elite Red Team, focusing on reconnaissance using open-source intelligence (OSINT) to gather actionable data.
  • Take the lead in compromising systems by identifying vulnerabilities in people, processes, and technology.
  • Develop and deploy command-and-control servers and custom payloads, establishing persistence within target environments.
  • Evolve your craft by creating new tools, techniques, and procedures to avoid detection by defenders.
  • Work on escalation, maintaining long-term access to compromised networks, and exfiltrating critical data.

Research and Development:

  • Stay ahead of the curve by researching and identifying new vulnerabilities, focusing on high-profile products and systems.
  • Understand and analyze the latest tactics used by threat actors to craft innovative security strategies.
  • Develop and refine attack methodologies that will be used to strengthen future defensive efforts.

Requirements:

Experience:

  • 2-5 years' hands-on Penetration Testing, including a strong background in network, mobile, web, and wireless security assessments.
  • Strong understanding of common vulnerability assessment and penetration testing tools.
  • Ability to think critically and creatively to solve complex security challenges.
  • Strong communication skills for both internal collaboration and client-facing interactions.
  • Passion for continuous learning and staying updated on the latest in cybersecurity.
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

InfyStrat is seeking a motivated Cyber Security Analyst to join our team and contribute to our mission of safeguarding our digital assets and infrastructure. In this role, you will monitor, detect, and respond to security threats, vulnerabilities, and incidents across our systems. You'll perform risk assessments, analyze security breaches, and provide remediation recommendations while collaborating with various teams to enhance our security posture. This is a fantastic opportunity to grow your skills in a fast-paced environment while playing a critical role in protecting our organization from cyber threats.

Key Responsibilities:
  • Monitor security alerts and events from various sources, including SIEM tools, to identify and respond to security threats.
  • Conduct thorough investigations of security incidents, documenting findings and coordinating response actions.
  • Assist in the development and implementation of security policies, procedures, and guidelines to protect sensitive information.
  • Perform vulnerability assessments and penetration testing to identify security weaknesses.
  • Analyze trends and patterns in security incidents and provide recommendations for improving defense mechanisms.
  • Stay updated on the latest cybersecurity threats, vulnerabilities, and best practices.
  • Work with IT and development teams to ensure secure configurations and practices across all systems.
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 2+ years of experience in cybersecurity, information security, or a related role.
  • Strong understanding of security principles, concepts, and technologies.
  • Experience with security monitoring tools, SIEM platforms, and incident response procedures.
  • Familiarity with network security, firewalls, intrusion detection/prevention systems, and secure coding practices.
  • Knowledge of security frameworks and regulatory standards (e.g., NIST, ISO 27001, GDPR).
  • Strong analytical and problem-solving skills, with attention to detail.
  • Excellent communication skills to effectively collaborate with cross-functional teams.
  • CERT, CISSP, CISM, or equivalent security certifications are a plus.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Sandton, Gauteng Core Group

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Overview Support the Cyber Security team in monitoring, remediating, and reporting on security issues across the organisation. This includes handling alerts, engaging users, managing vulnerabilities, supporting awareness training, and assisting with internal reporting. Key Responsibilities Security Incident Handling Resolve cyber security-related support tickets within SLA. Monitor alerts from Slack, email, and security tools. Engage users directly and take full ownership of each incident, ensuring it is thoroughly investigated and resolved without delay. Vulnerability & Endpoint Management Track and drive remediation of vulnerabilities with IT teams and users. Ensure security applications are correctly installed and running on all endpoints. Threat Monitoring Monitor threat intelligence sources for risks to Core Group and escalate where required. Training & Awareness Assist with cyber awareness course creation and reviews. Enrol staff via LMS and manage reminders. Reporting & Presentations Create or contribute to internal presentations (e.g., Cyber Pack Updates, IT meetings). Requirements 3-5 years in a security analyst, SOC, or IT security support role Familiarity with endpoint security, vulnerability tracking, and phishing incident response Strong communication and follow-up skills Comfortable using communication, productivity, and presentation tools Able to work independently and escalate appropriately
This advertiser has chosen not to accept applicants from your region.

Penetration Tester (Security Analyst)

Johannesburg, Gauteng DataFin

Posted today

Job Viewed

Tap Again To Close

Job Description

ENVIRONMENT

A leading cybersecurity company based in Johannesburg is seeking a skilled and detail-oriented Red Team Penetration Tester /Security Analyst to join their dynamic team. The ideal candidate will have 2-5 years of hands-on experience in Penetration Testing, with a strong background in identifying and mitigating security vulnerabilities across various environments. This role involves conducting comprehensive security assessments, including but not limited to network, mobile, web, thick-client, wireless, social engineering, and physical penetration testing. The successful candidate will be responsible for analysing security risks, providing actionable recommendations, and collaborating with clients and internal teams to enhance overall cybersecurity posture. If you are passionate about ethical hacking, threat analysis, and proactive security measures, this is an excellent opportunity to grow your career in a fast-paced and innovative environment.

DUTIES Penetration Testing Duties
  • Work as part of a vulnerability assessment and /or penetration testing team, taking direction from line managers and executing directives in a thorough and timely fashion
  • Conduct vulnerability assessments on a wide variety of technologies and implementations utilising both automated tools and manual techniques
  • Conduct network penetration tests
  • Conduct application penetration tests (web and thick client)
  • Conduct wireless and mobile security assessments
  • Conduct social engineering assessments
  • Conduct physical security assessments
  • Effectively communicate successes and obstacles with fellow team members and line managers
  • Interface with client contact(s) and staff in a constructive and professional manner
  • Develop subject matter expertise in topics to include network, database, wireless and application security assessments and adversarial network operations
  • Utilise common vulnerability assessment and penetration testing tools
Red Teaming Duties
  • Working as part of a Red Team and assisting with the following duties (but not limited to):
  • Initial reconnaissance – open-source intelligence (OSINT) for collecting information on the targets
  • Initial compromise – gaining a foothold into the target environment through targeting weaknesses in people, process and / or technology.
  • Deploy command-and-control servers (C&C or C2) and custom payloads to establish communication / persistence in the target’s network.
  • Develop tools, techniques and procedures to evade detection by blue team (including the development of custom payloads)
  • Escalate privileges and maintain persistence
  • Exfiltrate and / or complete objectives
Research and Development Duties
  • Research new vulnerabilities with a focus on high-profile products
  • Understand the terminology and tactics employed by threat actors Research new attack methods
REQUIREMENTS
  • Minimum 2-5 years of Penetration Testing experience required Including conducting different types of assessments, such as network, mobile, web, thick, wireless, social engineering, physical, etc.
  • Previous Red Team experience required

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Penetration Tester (Security Analyst)

Johannesburg, Gauteng DataFin

Posted today

Job Viewed

Tap Again To Close

Job Description

ENVIRONMENT

A leading cybersecurity company based in Johannesburg is seeking a skilled and detail-oriented Red Team Penetration Tester / Security Analyst to join their dynamic team. The ideal candidate will have 2-5 years of hands-on experience in Penetration Testing, with a strong background in identifying and mitigating security vulnerabilities across various environments. This role involves conducting comprehensive security assessments, including but not limited to network, mobile, web, thick-client, wireless, social engineering, and physical penetration testing. The successful candidate will be responsible for analysing security risks, providing actionable recommendations, and collaborating with clients and internal teams to enhance overall cybersecurity posture. If you are passionate about ethical hacking, threat analysis, and proactive security measures, this is an excellent opportunity to grow your career in a fast-paced and innovative environment.

DUTIES Penetration Testing Duties
  • Work as part of a vulnerability assessment and /or penetration testing team, taking direction from line managers and executing directives in a thorough and timely fashion
  • Conduct vulnerability assessments on a wide variety of technologies and implementations utilising both automated tools and manual techniques
  • Conduct network penetration tests
  • Conduct application penetration tests (web and thick client)
  • Conduct wireless and mobile security assessments
  • Conduct social engineering assessments
  • Conduct physical security assessments
  • Effectively communicate successes and obstacles with fellow team members and line managers
  • Interface with client contact(s) and staff in a constructive and professional manner
  • Develop subject matter expertise in topics to include network, database, wireless and application security assessments and adversarial network operations
  • Utilise common vulnerability assessment and penetration testing tools
Red Teaming Duties
  • Working as part of a Red Team and assisting with the following duties (but not limited to):
  • Initial reconnaissance – open-source intelligence (OSINT) for collecting information on the targets
  • Initial compromise – gaining a foothold into the target environment through targeting weaknesses in people, process and / or technology.
  • Deploy command-and-control servers (C&C or C2) and custom payloads to establish communication / persistence in the target’s network.
  • Develop tools, techniques and procedures to evade detection by blue team (including the development of custom payloads)
  • Escalate privileges and maintain persistence
  • Exfiltrate and / or complete objectives
Research and Development Duties
  • Research new vulnerabilities with a focus on high-profile products
  • Understand the terminology and tactics employed by threat actors Research new attack methods
REQUIREMENTS
  • Minimum 2-5 years of Penetration Testing experience required Including conducting different types of assessments, such as network, mobile, web, thick, wireless, social engineering, physical, etc.
  • Previous Red Team experience required
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Senior Information Security Incident Response Analyst

Johannesburg, Gauteng NTT

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

Make an impact with NTT DATA
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

Your day at NTT DATA

The Senior Information Security Incident Response Analyst is an advanced subject matter expert, responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments).

This role acts as the technical second responder for the team and supports the work of technical staff from various business areas, as well as third-party technical experts.

The Senior Information Security Incident Response uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company information assets.

Key responsibilities
  • Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated.
  • Performs access management activities according to the policy.
  • Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses.
  • Interacts with a global team of Cyber Security Analysts and specialists.
  • Manages 2nd level triaging of security alerts, events, and notifications.
  • Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees.
  • Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
  • Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
  • Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
  • Maintains an understanding of current and emerging threats, vulnerabilities, and trends.
To thrive in this role, you need to have
  • Advanced understanding of End Point Protection Software.
  • Advanced understanding of Enterprise Detection and Response software.
  • Advanced knowledge of technological advances within the information security arena.
  • Advanced understanding of inter-relationships in an overall system or process.
  • Advanced knowledge of information security management and policies.
  • Advanced understanding risk management principles and frameworks is crucial for prioritizing and addressing security incidents
  • Advanced understanding of the organization's business operations, goals, and objectives enables the analyst to align incident response efforts with the broader business strategy.
  • Ability to effectively communicate technical information to both technical and non-technical stakeholders, and end-users, as well as working with cross-functional teams during incident response.
  • Ability to think critically, analyze information, and solve medium to complex problems.
Academic qualifications and certifications
  • Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred.
  • SANS GIAC Security Essentials (GSEC) or equivalent preferred.
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
Required experience
  • Advanced experience in a Technology Information Security Industry.
  • Advanced experience or knowledge of SIEM and IPS technologies.
  • Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.

Workplace type: Hybrid Working

About NTT DATA

NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer

NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Third parties fraudulently posing as NTT DATA recruiters

NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters—whether in writing or by phone—in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an @nttdata.com email address. If you suspect any fraudulent activity, please contact us.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Ethical hacking Jobs in Johannesburg !

Senior Information Security Incident Response Analyst

Johannesburg, Gauteng NTT America, Inc.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Senior Information Security Incident Response Analyst is an advanced subject matter expert, responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments).
This role acts as the technical second responder for the team and supports the work of technical staff from various business areas, as well as third-party technical experts.
The Senior Information Security Incident Response uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company information assets.
**Key responsibilities:**
+ Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated.
+ Performs access management activities according to the policy.
+ Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses.
+ Interacts with a global team of Cyber Security Analysts and specialists.
+ Manages 2nd level triaging of security alerts, events, and notifications.
+ Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees.
+ Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
+ Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
+ Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
+ Maintains an understanding of current and emerging threats, vulnerabilities, and trends.
**To thrive in this role, you need to have:**
+ Advanced understanding of End Point Protection Software.
+ Advanced understanding of Enterprise Detection and Response software.
+ Advanced knowledge of technological advances within the information security arena.
+ Advanced understanding of inter-relationships in an overall system or process.
+ Advanced knowledge of information security management and policies.
+ Advanced understanding risk management principles and frameworks is crucial for prioritizing and addressing security incidents
+ Advanced understanding of the organization's business operations, goals, and objectives enables the analyst to align incident response efforts with the broader business strategy.
+ Ability to effectively communicate technical information to both technical and non-technical stakeholders, and end-users, as well as working with cross-functional teams during incident response.
+ Ability to think critically, analyze information, and solve medium to complex problems.
**Academic qualifications and certifications:**
+ Bachelor's degree or equivalent in Information Technology, Computer Science or related preferred.
+ SANS GIAC Security Essentials (GSEC) or equivalent preferred.
+ SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
+ SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred
**Required experience:**
+ Advanced experience in a Technology Information Security Industry.
+ Advanced experience or knowledge of SIEM and IPS technologies.
+ Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.
**Workplace type** **:**
Hybrid Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
**Third parties fraudulently posing as NTT DATA recruiters**
NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters-whether in writing or by phone-in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an **@nttdata.com** email address. If you suspect any fraudulent activity, please contact us ( ) .
This advertiser has chosen not to accept applicants from your region.

Associate Information Security Incident Response Analyst

Johannesburg, Gauteng NTT America, Inc.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

**Make an impact with NTT DATA**
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion - it's a place where you can grow, belong and thrive.
**Your day at NTT DATA**
The Associate Information Security Incident Response Analyst is an entry level subject matter expert, responsible for assisting with the detection and monitoring of threats and suspicious activity affecting the organization's technology domain.
This role acts as the technical first responder by supporting the work of technical staff from various business areas as well as third-party technical experts.
This role uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company's information assets.
**Key responsibilities:**
+ Assists with the prevention and resolution of security breaches and ensures incident and problem management processes are initiated.
+ Supports access management activities according to the policy.
+ Assists with the implementation of and discusses security service audit schedules, review access authorization and performs the required access controls and testing to identify security weaknesses.
+ Interacts with a global team of Cyber Security Analysts and specialists.
+ Notifies internal and/or external teams according to agreed alert priority levels, escalation trees, 1st level triaging of security alerts, events, and notifications.
+ Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
+ Ability to follow and update established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
+ Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
**To thrive in this role, you need to have:**
+ Knowledge of technological advances within the information security arena.
+ Understanding of inter-relationships in an overall system or process.
+ Knowledge of information security management and policies.
+ Maintain an understanding of current and emerging threats, vulnerabilities, and trends.
**Academic qualifications and certifications:**
+ Bachelor's degree or equivalent in Information Technology, Computer Science or related preferred.
+ SANS GIAC Security Essentials (GSEC) or equivalent preferred.
+ SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
+ SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred.
**Required experience:**
+ Entry level experience in a Technology Information Security Industry.
+ Experience using End Point Protection Software.
+ Experience using Enterprise Detection & Response software.
+ Experience or knowledge of SIEM and IPS technologies.
+ Experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.
**Workplace type** **:**
Hybrid Working
**About NTT DATA**
NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
**Equal Opportunity Employer**
NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
**Third parties fraudulently posing as NTT DATA recruiters**
NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters-whether in writing or by phone-in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an **@nttdata.com** email address. If you suspect any fraudulent activity, please contact us ( ) .
This advertiser has chosen not to accept applicants from your region.

Information Security Architect

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities:

  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
  • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
  • Define portfolio vision and reusable security patterns aligned with the EA strategy.
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
  • Manage security architects and mentor engineers, developers, and vendors.

What will you bring?

  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
  • Teamwork and Energy – work across different functional and business teams with effective collaboration.
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

Requirements / Skills and Competence

  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture.
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures.
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
  • Good experience in security architecture design in Cloud and on-prem.
  • Design and implementation of IOT, endpoint protection, and secure IAM.
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Ethical Hacking Jobs View All Jobs in Johannesburg