85 Intrusion Detection jobs in South Africa
Information Security Analyst II
Posted today
Job Viewed
Job Description
To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.
Job Responsibilities- We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
- Experience with Email and Web Proxies
- DNS Security knowledge
- Experience with Microsoft O365
- Assist with support of current email and web security tasks
- Liaise with other teams to promote good security practices and explain security procedures
- Experience with Security Technologies
- Building relationships with I&O Teams
- Oversee the implementation of the information security changes and check for the short comings and risks.
- Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
- Participate in the implementation of new products as provided in the selection criteria.
- Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
- Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
- Document and maintain all relevant processes and procedures mindful of current policies and standards.
- Create and maintain information security standards.
- Oversee and monitor the information security environment according to set standards.
- Review and contribute to project documentation including business requirements, designs and implementation.
- Create design documentation according to relevant standards and practices
- Implement specific Information security technologies.
- Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
- Log submit and implement low, medium and high risk changes independently.
- Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
- Oversee and ensure change was successful in certain cases and when required perform unit testing.
- Oversee and ensure back-ups are done, documents are stored and statuses updated.
- Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
- Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
- Ensure job related tasks and processes are in place.
- Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
- Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
- Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
- Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
- Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
- Transfer of knowledge to team members.
- Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
- Strong knowledge of Information Security Principles
- Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
- Knowledge of Email Security
- Experience with Email Security Technologies
- Experience Service Now
- Experience Microsoft O365
- Matric / Grade 12 / National Senior Certificate
- Advanced Diplomas/National 1st Degrees
- CCNA - Security
- Security +
- Network +
- MS Azure Certifications – MS 365
Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks
Technical / Professional Knowledge- Administrative procedures and systems
- Data analysis
- Governance, Risk and Controls
- Principles of project management
- Relevant regulatory knowledge
- Relevant software and systems knowledge
- Cluster Specific Operational Knowledge
- System Development Life cycle(SDLC)
- TCP/IP
- Information Security terms and definitions
- Information Security policies and procedures
- Communication
- Customer Focus
- Initiating Action
- Managing Work
- Technical/Professional Knowledge and Skills
---
Please contact the Nedbank Recruiting Team at +27 860 555 566
If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.
Nedbank Ltd Reg No 1951/0009/06.
Authorised financial services and registered credit provider (NCRCP16).
For assistance please contact the Nedbank Recruiting Team at +27 860 555 566
#J-18808-LjbffrInformation Security Analyst MMH250401-13
Posted today
Job Viewed
Job Description
Join to apply for the Information Security Analyst MMH250401-13 role at Momentum Group Limited .
Role PurposeThis position is responsible for performing various tasks related to IT security. The role requires ongoing research in the IT security arena and assistance in the sales process. The ideal candidate will conduct comprehensive penetration tests, identify vulnerabilities, and recommend improvements to security posture. Experience in technical security assessments of IT systems (including Internet, Intranet, applications, hosts, firewalls, mobile applications, etc.) and related policies is essential. The candidate must be motivated and familiar with industry best practices.
Requirements- 5+ years of experience in penetration testing, vulnerability assessment, or related fields.
- Deep knowledge of security testing methodologies and frameworks (OWASP, NIST, etc.).
- Proficiency with advanced penetration testing tools such as Metasploit, Burp Suite, Nessus, Nmap, etc.
- Strong scripting skills (Python, Bash, PowerShell, etc.) for automation.
- Understanding of network protocols, operating systems, web technologies, and cloud environments.
- CISSP and CEH certifications preferred.
- OSCP, OSEP, CCSP, CRTE, CRTP, or CRTO certifications or equivalents are advantageous.
- Lead and conduct penetration tests to identify security weaknesses.
- Develop and execute security test plans and scripts.
- Perform vulnerability assessments and security analyses using automated tools and manual techniques.
- Document findings and provide actionable recommendations for remediation.
- Collaborate with teams to prioritize and address vulnerabilities.
- Stay updated on emerging security threats and trends.
- Participate in security incident response when needed.
- Assist in developing security policies and standards.
- Mentor junior security staff.
- Perform security assessments including application scans and code reviews to ensure compliance.
- Participate in other security projects as required.
Please verify the legitimacy of this job advert on our company career page.
Seniority level- Mid-Senior level
- Full-time
- Information Technology
Referrals increase your chances of interviewing at Momentum Group Limited by 2x.
Get notified about new Information Security Analyst jobs in Centurion, Gauteng, South Africa .
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Specialist
Posted today
Job Viewed
Job Description
The KPMG Africa Information Security Specialist is responsible for ensuring the confidentiality, integrity, and availability of all systems across KPMG Africa offices (South Africa, Botswana, Mauritius, Mozambique, Namibia, Zambia, Zimbabwe, Nigeria, Ghana, Kenya, Uganda, Tanzania, and Rwanda). The role involves actively managing and monitoring information security systems to detect, respond to, and remediate security risks and threats across the infrastructure.
4. Position Specifications
Educational Requirements (minimum necessary to perform the job):
- Professional / Tertiary qualification
Other Requirements:
Experience (minimum necessary):
Desired Qualifications and Experience:
- 3-5 years' experience in Information Technology Support or Information Security, including Microsoft Azure
- Industry-recognized certifications such as A+, N+, Security+, CySA+, and Cloud Security certifications like:
o Microsoft Certified: Security Operations Analyst Associate
o Microsoft Certified: Information Protection and Compliance Administrator Associate
o Microsoft Certified: Security, Compliance, and Identity Fundamentals
o Microsoft Certified: Identity & Access Management
o Microsoft Certified: Azure Security Engineer
- Professional certifications such as CISM, CISSP, ECIH are preferred but not required
- Strong knowledge of information security and cloud security concepts
- Experience in identifying, analyzing, and reporting on security risks and incidents
- Experience with security tools such as Qualys, Microsoft Defender Endpoint, Microsoft Sentinel, etc.
- Ability to evaluate vulnerabilities, develop mitigation strategies, and implement remediation
- Strong knowledge of operating systems, Microsoft Servers, Active Directory, and network protocols and technologies
5. Core Competencies:
- Attention to detail and accurate documentation
- Analytical skills to interpret information
- Ability to work independently and in a team
- Organizational and prioritization skills under pressure
6. Key Responsibilities & KPIs
Main Responsibilities:
- Monitoring incident response channels
- Executing the Information Security Incident Management Process and escalating high-priority issues
- Tracking and escalating open incidents
- Producing weekly and quarterly reports for the CISO on incident status and trends
Security Systems Configuration and Management:
- Daily monitoring of security systems to ensure proper functioning
- Configuration and management of security tools such as vulnerability, privileged access, and log management systems
- Reconciliation of assets to ensure coverage of security systems
- Reporting and issue resolution support for operational teams
Patch Management Monitoring:
- Monitoring patch management performance and identifying risks
- Addressing challenges to compliance
Threat and Event Monitoring:
- Detecting and escalating security threats and events
Vulnerability Management:
- Monitoring vulnerabilities daily
- Monthly asset reconciliation
- Managing vulnerability remediation with owners
- Supporting penetration testing activities
Supporting NITSO projects and other initiatives as required.
#J-18808-LjbffrInformation Security Officer
Posted 5 days ago
Job Viewed
Job Description
Please select a reason for contacting us* I want to enquire about your services Other
What is your role in your organisation
What is your desired timeframe for the project to go live?
In which region(s) do you plan to offer your product/solution?
What are you interested in?
How did you find out about us?
I accept Terms and Conditions
I would like to receive EFT Corporation News and Updates
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
At EFT Corporation, success starts with people. Our team of 290+ professionals works across the United Kingdom, South Africa, Zambia, Ghana, Kenya, Mauritius, Zimbabwe, and India, bringing together deep local knowledge and shared ambition.With over 25 years of experience, we partner with more than 100 financial institutions to deliver secure, modern payment solutions that improve access and make everyday transactions easier. We're building the future of payments through smart technology, strong partnerships, and a clear focus on progress.
Why You'll Love Working Here:- Career Development: We invest in your future by providing continuous learning, mentorship, and growth opportunities.
- Work-Life Balance: We support flexible work arrangements and wellness programs to ensure you can thrive both professionally and personally.
- Impact-Driven Work: Be part of a company driving innovation and transforming financial services across Africa.
- Diversity, Equity & Inclusion Commitment: Be part of a workplace where everyone feels valued and appreciated
- As an Information Security Officer , your job purpose is to be held accountable in respect to assisting the Senior Security and Infrastructure Engineer and the Senior DevOps Engineers in the following:
- Assisting in maintaining the safety and security of the organisation’s systems and network database to prevent unauthorized access and avoid data breaches.
- Maintaining the organisation’s systems and networks.
- Assisting in overseeing the entire software development process, from planning and development to deployment and maintenance.
- This role requires expertise in both software development and operations, as well as an understanding of the DevOps methodology.
- This includes CI/CD, Infrastructure management (AWS), Automation, Monitoring, logging and metrics, Collaboration and Security.
- The role also requires a significant focus on PCI compliance and support and collaboration with the Security and Infrastructure team is required.
- You will be responsible for owning the Futurex HSM and Thales HSM device management which includes:
- Yearly Key management/replacement ceremonies.
- PCI compliance as it relates to the HSM.
- Assisting with new security compliance:
- ISO27001.
- PCI+PIN.
- Facilitate annual PCI audits.
- Linux Operating systems are security patched in a timely manner. If patching will affect customers, arrange with operations support, and follow the correct change control process.
- Maintain Elastic SIEM.
- Respond to and investigate SIEM alerts.
- Respond to operational system alerts and/or operational queries across the entire technology stack (Production and QA system issues, infrastructure issues, Databaseissues, Network issues, Security and Firewall issues and any 3rd party or customer integration issues) as they occur.
- Manage / Deploy system tooling that may be beneficial to the business.
- Research, POC and deploy new open source or when applicable closed source tooling that is beneficial to the business systems or processes. This can be in supporting Applications, Monitoring, Logging, SIEM, AI/machine Learning, Fraud Detection, Operational Support applications, Authentication systems, BI / Data Analytics, networks, Security or compliance.
- Create ad hoc Python scripts / Applications to perform various repetitive tasks.
- Ensure that AWS environments and services are architectured and configured in a secure and redundant manner including all security services from AWS.
- Maintain AWS services including but not limited to: VPC, EC2, ECS, ECS Fargate, ECR, Guard Duty, Cloudwatch, Cloudtrail, Security groups, VPC Routing, Site to Site VPNs, Application Load balancers / network load balancers, Web application firewalls,etc.
- Architect, support and maintain connectivity between 3rd parties, Banking partners, integrators and on prem datacentres.
- Ensure best practice security measures are implemented.
- Ensure best practices regarding system isolation and scope reduction.
- Provide support to field engineers on HSMs and key management.
- Maintain internal HSMs and key management procedures.
- Provide support to the product and SLDC teams – this includes consulting on design, finding compliant solutions for customer issues, and filling out cyber risk assessments for customers or tenders.
- Maintain/Improve (PC14) PCI.
- GDPR.
- Ensure Security, Infrastructure & Procedures (with supporting team) are comprehensive and kept up to date.Security Tooling:
- Ensure SSO, Intrusion detection, SIEM, Antivirus, Patch Management and PGP are implanted as per the polices.
- Stimulation / adoption of user-driven security culture (give security a brand within the org and educate).
- To increase efficiency and reduce errors for both security and infrastructure management.
- To reduce costs (optimize) without sacrificing performance and security.
- Ensure that weekly vulnerability scans results are tracked, and vulnerabilities are remediated within set severity timeframes weekly.
- Review all daily and weekly BAU PCI Items for signoff monthly.
- Ensure weekly Internal and External Scans were completed.
- Perform data analysis reporting monthly.
- Maintain a strong security posture within the card holder environment.
- Work with 3rd party to ensure PCI Certification Audit is completed and passed on time.
- Review Security Commitment to third parties.
- Bachelor’s degree in Computer Science or related field.
- 3 years’ relevant experience.
- Experience within the payment / banking sector.
- Experience working with PCI Audits / Security in DevOps, Linux, Mysql, Cloud (AWS).
- Network experience (particularly cloud based / virtual).
- PCI Audits / Security / Processes.
- Linux, Mysql, and Cloud (AWS).
- Experience with automation tools like CloudFormation, Ansible, Puppet, Chef, etc.
- Cloud knowledge, specifically AWS.
- Logging Frameworks: ELK stack, cloudwatch, etc.
- Monitoring and Alerting Framework: Zabbix, Nagios, etc.
- Ability to learn new technologies at pace.
- Problem solving.
- Ability to work within a high stress & flux environment.
- Ability to foster & cultivate relationships with internal & external stakeholders.
- Ability to work autonomously as well as part of a team.
- Assertiveness – communicating feelings and beliefs; being non-offensive.
- Detail & deadline oriented.
- Analytical & critical thinking.
- Celebrate Your Special Day: Enjoy a dedicated day off to celebrate your birthday.
- Wellbeing Matters: Maintain a healthy work-life balance with up to 3 days of wellbeing leave annually.
- Family Comes First: Support your loved ones when it matters most with up to 20 days of family responsibility leave.
- Empowerment
We trust our team to lead, make decisions, and drive outcomes. - Financial Inclusion for All
We build payment solutions that broaden access and support diversity. - Technology with Purpose
We design tech that simplifies and improves every transaction. - Customer-Centric
Our customers are at the heart of everything we do.
Join EFTCorporation and help shape simpler, more inclusive payments for millions across Africa.
Ready to make your mark? Apply Now
EFT Corporation is an Equal Opportunity Employer. Diversity drives our success, and we welcome passionate individuals from all walks of life to join our team.
EFT Corporation does not accept unsolicited resumes from search firms/recruiters. EFT Corporation will not pay any fees to search firms/recruiters if a search firm/recruiter submits a candidate unless an agreement has been entered into concerning the specific open position(s). Search firms/recruiters offering resumes to EFT Corporation on an unsolicited basis shall be deemed to accept this condition, regardless of any other provision to the contrary.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
#J-18808-LjbffrInformation Security Architect
Posted 14 days ago
Job Viewed
Job Description
Job title: Information Security Architect
Contract duration: Start with 6 months
First preference: EEE candidates
Location: JHB
The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.
Key Responsibilities:
- Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
- Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
- Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
- Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
- Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
- Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
- Define portfolio vision and reusable security patterns aligned with the EA strategy.
- Lead architecture reviews for high-risk projects, driving recommendations to resolution.
- Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
- Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
- Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
- Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
- Manage security architects and mentor engineers, developers, and vendors.
What will you bring?
- Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
- Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
- Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
- Teamwork and Energy – work across different functional and business teams with effective collaboration.
- Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
- Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
- Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).
Requirements / Skills and Competence
- Tertiary qualification in Computer Science, Engineering, or related field (preferred)
- Minimum of 5-10 years of experience in Security Architecture.
- CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
- Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
- Experience in identifying gaps in existing architectures.
- Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
- Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
- Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
- Good experience in security architecture design in Cloud and on-prem.
- Design and implementation of IOT, endpoint protection, and secure IAM.
- Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
- Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
- Knowledge of web application architectures and threat modelling.
Information Security Consultant
Posted 20 days ago
Job Viewed
Job Description
Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis.
Responsibilities- Security Auditing
- Responsible for Security tools monitoring
- Network experience (TCP/IP, Firewalls, IPS, NAC)
- Operating System management and Hardening
- Anti-Virus System management and Configuration
- Logical Access Management
- Vulnerability Management
- Matric and an Information Technology diploma or degree qualification
- 4+ years experience in the field
Salary: Market Related
#J-18808-LjbffrInformation security consultant
Posted today
Job Viewed
Job Description
Be The First To Know
About the latest Intrusion detection Jobs in South Africa !
Information security consultant
Posted today
Job Viewed
Job Description
Information security architect
Posted today
Job Viewed
Job Description
Officer, Information Security ( ISO)
Posted today
Job Viewed
Job Description
Standard Bank Group is a leading Africa-focused financial services group and an innovative player on the global stage. We offer a variety of career-enhancing opportunities and the chance to work alongside some of the sector’s most talented, motivated professionals. Our clients range from individuals to businesses of all sizes, high net worth families, and large multinational corporates and institutions. We are passionate about creating growth in Africa, bringing true, meaningful value to our clients and communities, and creating a sense of purpose for our employees.
Job DescriptionTo implement the Group Cyber Resilience strategy by securing platform ecosystems, third-party integrations, and protecting sensitive data, applications, and infrastructure from infiltration or misuse. Guide security capabilities in client segments and solutions. Facilitate security services ensuring policies, standards, and controls are embedded to prevent reputational, financial, or other losses and ensure regulatory compliance. Educate employees about their InfoSec responsibilities.
Qualifications- A Degree in Business, Commerce, Information Technology, or Risk Management.
- 5-7 years experience in an information security or audit role within the banking and/or financial services sector. Experience working in a multi-vendor, outsourced, and multi-system IT environment.
- 5-7 years of good working knowledge and experience with the implementation and management of information security policies and frameworks within a corporate environment. Management experience working with individuals and teams from diverse cultures.
- 5-7 years of strong IT understanding, gaining insight into digital and platform operating models, cybersecurity trends, and solutions.
- Adopting Practical Approaches
- Articulating Information
- Checking Things
- Directing People
- Examining Information
- Exploring Possibilities
- Interpreting Data
- Making Decisions
- Providing Insights
- Pursuing Goals
- Showing Composure
- Upholding Standards
- Benefits Management
- Information Security
- Internal & External IT Environment
- IT Risk Management
- Knowledge of Banking & Financial Services
- Stakeholder Management (IT)