195 Network Security jobs in Johannesburg
Senior Network Security Engineer
Posted 5 days ago
Job Viewed
Job Description
- Projects & Implementation (35%) Lead network infrastructure projects, coordinate timelines, and evaluate new technologies
- Reporting & Documentation (10%) Generate network performance reports, maintain technical documentation, and create standard operating procedures
- Critical Issue Management (15%) Respond to priority incidents, manage escalations, conduct root cause analysis, and participate in incident response
- Stakeholder Management (10%) Maintain vendor relationships, collaborate with business units, and negotiate technical specification
- Technical Support & Knowledge Transfer (20%) Implement and configure security protocols, provide technical support, troubleshoot issues, mentor team members, and stay current with updates
- Maintenance (10%) Perform daily network health checks, execute routine maintenance, monitor performance, and maintain documentation
- Certifications & Experience: CCNA certification, entry-level PaloAlto qualification, and 4+ years of network and firewall management
- Technical Skills : LAN understanding, WiFi and switching management, PaloAlto firewall configuration, multi-vendor network troubleshooting, and core networking protocols.
- Preferred Skills: VeloCloud SD-WAN management, Cisco certification, server technology expertise, cloud platforms knowledge, and network monitoring tools.
- Professional Skills: Adaptability, analytical and problem-solving capabilities, excellent communication, and strong documentation skills.
- CCNP Enterprise
- PaloAlto PCNSE, PCNSA, PCCSA certification
- CompTIA Security+ or equivalent security certifications
- Cloud certifications (AWS, Azure, or Google Cloud
Technical Experience
- Enterprise network design and implementation
- Multi-vendor environment management
- Security incident response and forensics
- Network automation and scripting (Python, PowerShell)
- SIEM and security monitoring tools
- Previous experience in vendor management or procurement
- Background in cybersecurity or information security
- Experience with enterprise monitoring and management tools
- Project management experience with network implementations
- Position requires ability to work independently and make autonomous decisions
- Occasional after-hours support during incidents or maintenance windows required
- Regular interaction with external vendors and internal stakeholders
- Some travel may be required for vendor meetings, training, or site visits
- On-call rotation participation for critical infrastructure support
Senior network security engineer
Posted today
Job Viewed
Job Description
Senior Network Security (Fortinet) Engineer - (Sandton)
Posted 2 days ago
Job Viewed
Job Description
Are you a highly motivated security specialist with hands-on Fortinet experience looking for your next big challenge?
Our client is building a dynamic, energetic team and needs YOU to help secure cutting-edge networks!
What You'll Do:- Configure & manage top security tech (Fortinet-focused) - Project Management experience is a must!
- Respond to security alerts & analyze reports
- Keep systems updated & patched
- 3-5+ years in network security engineering
- 2+ years hands-on experience with Fortinet products (mandatory)
- Relevant IT security qualifications (Fortinet certs preferred)
- Strong communication, problem-solving & attention to detail
Salary: Negotiable based on experience
Only applicants with the required experience will be considered. Ready to level up your career?
#J-18808-LjbffrSenior network security (fortinet) engineer - (sandton)
Posted today
Job Viewed
Job Description
Cyber Security Specialist
Posted 25 days ago
Job Viewed
Job Description
Join to apply for the Cyber Security Specialist role at ExecutivePlacements.com - The JOB Portal
1 week ago Be among the first 25 applicants
Join to apply for the Cyber Security Specialist role at ExecutivePlacements.com - The JOB Portal
Get AI-powered advice on this job and more exclusive features.
SUMMARY:
Psybergate is an IT company that builds bespoke software solutions and provides highly skilled resources to its clients.
Cyber Security Specialist
Recruiter:
Penny The Recruiter
Job Ref:
PR /RN
Date posted:
Tuesday, June 24, 2025
Location:
Midrand, South Africa
Salary:
Monthly
SUMMARY:
Psybergate is an IT company that builds bespoke software solutions and provides highly skilled resources to its clients.
We are looking for a Cybersecurity Engineer to join our client based in JHB North.
An established AWS-driven technology solutions company is looking for a Cybersecurity Engineer who thrives in both technical execution and client-facing engagement. If you’re passionate about cloud security and enjoy designing and deploying secure environments for real clients, this role is for you. This is a 6-month Contract with the view to go perm.
POSITION INFO:
What you will be doing:
- Collaborate with the sales team as the technical security expert during pre-sales engagements.
- Conduct client workshops, requirements gathering, and security assessments.
- Design, present, and implement cloud-based security architectures on AWS.
- Configure and deploy AWS security services.
- Stay updated with AWS security trends and contribute to continuous improvement of offerings.
Technical Expertise
- 6+ years in IT security, with recent experience in cloud (AWS) security.
- Strong experience with AWS-native tools
- Familiarity with security benchmarks and frameworks (CIS, NIST, ISO 27001, etc.).
- Prior experience supporting pre-sales or working in a client-facing tech role.
- Excellent ability to explain technical solutions to both technical and non-technical audiences.
- Skilled in preparing diagrams, proposals, or solution documentation.
- AWS Security Specialty certification is a strong advantage.
- Other relevant certs like Security+, CEH, CISSP, etc. will be considered.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Engineering and Information Technology
- Industries Advertising Services
Referrals increase your chances of interviewing at ExecutivePlacements.com - The JOB Portal by 2x
Sign in to set job alerts for “Cyber Security Specialist” roles.Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 2 days ago
Talent Pool: Information Security AdministratorJohannesburg Metropolitan Area 2 days ago
Johannesburg, Gauteng, South Africa 8 hours ago
Johannesburg, Gauteng, South Africa 3 days ago
Illovo, Gauteng, South Africa 1 month ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg Metropolitan Area 5 days ago
Johannesburg Metropolitan Area 1 week ago
Johannesburg, Gauteng, South Africa 2 months ago
IT, Network and Cybersecurity Support TechnicianJohannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
Woodmead, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 month ago
Messaging Security Analyst I (Threat Protection)Johannesburg, Gauteng, South Africa 5 days ago
Johannesburg, Gauteng, South Africa 7 months ago
Johannesburg, Gauteng, South Africa 4 days ago
Associate Messaging Security Analyst - Threat ProtectionJohannesburg, Gauteng, South Africa 5 days ago
Johannesburg, Gauteng, South Africa 1 week ago
Customer Success Engineer - Cyber Security Security Analyst - Penetration Testing & Red TeamingJohannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
Randburg, Gauteng, South Africa 8 hours ago
Randburg, Gauteng, South Africa 8 hours ago
Illovo, Gauteng, South Africa 8 months ago
Associate Messaging Security Analyst - Threat ProtectionJohannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 1 week ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrCyber Security Specialist : Networks
Posted 4 days ago
Job Viewed
Job Description
Cyber Security Specialist : Networks at Optimal Growth Technologies. Location: Midrand. Duration: 6 months.
Role purposeRole purpose: Lead the development and implementation of advanced cyber security capabilities and controls across mobile, fixed, satellite, cloud, and IoT networks to protect against evolving threats. Oversee risk assessments, stakeholder engagement, and project delivery in alignment with regulatory requirements. Provide leadership and mentorship to junior team members, fostering innovation and ensuring effective execution of security controls.
Key Accountabilities- Lead security implementation: Drive the design and execution of cyber security implementations for mobile, fixed, satellite, cloud, and IoT networks, ensuring resilience against sophisticated threats.
- Direct workstream delivery: Manage the end-to-end delivery of key security initiatives for Enterprise domains (Enterprise CPE, Core Network, Network Management Systems, Office Connectivity, Cyber Security Controls - Monitoring & Analytics, and Measurement & Assurance). Scope definition, design, deployment, and performance review to prevent lateral attack movement.
- Cyber risk and compliance management: Conduct targeted risk assessments and apply security controls to address vulnerabilities across network infrastructure, maintaining compliance with ISO 27001, NIST, and applicable regulatory frameworks.
- Monitoring and assurance enhancement: Implement near real-time threat detection and continuous security posture assessment, integrating monitoring tools such as SIEM and NetFlow, and ensuring second-line assurance to validate control effectiveness.
- Leadership and capability development: Provide guidance and mentorship to junior cyber security professionals, fostering a culture of innovation, collaboration, and excellence to ensure effective security control execution in line with strategic and operational goals.
- Matric / Grade 12 essential
- 3-year Degree or relevant tertiary qualification in Information Technology
- 8+ years of experience in a Cyber Security role delivering for Enterprise/IP Networks
- Strong understanding of cyber risk management and security frameworks (NIST, ISO 27001, CIS Controls)
- Strong knowledge of Enterprise/Fixed networks
- Excellent problem-solving skills and the ability to analyse complex issues
- Strong communication skills, both written and verbal
- Ability to work collaboratively with cross-functional teams and stakeholders
- Strong leadership skills to lead and manage teams effectively
- Strong organizational skills to manage multiple tasks and priorities
- Experience with monitoring and assurance enhancements (e.g., integrating SIEM and NetFlow)
- ISO 27001 Lead Practitioner, CCIE(Security), CCSP, CGEIT, CRISC, CISA, CISM, CISSP/CSSP or equivalent
- Seniority level: Not Applicable
- Employment type: Contract
- Job function: Engineering and Information Technology
- Industries: IT Services and IT Consulting
Network and Security Engineer JOHANNESBURG NORTH
Posted 3 days ago
Job Viewed
Job Description
Network and Security Engineer JOHANNESBURG NORTH
JHB North, Johannesburg – Gauteng
Network and Security Engineer
Paterson Grade : D-Upper
12 Month Contract Position
Key performance areas :
Overall cybersecurity compliance, management, and training throughout the organization.
Ensures that data integrity, and that information is kept accurate and consistent unless authorized access.
Managing and monitoring all installed systems and infrastructure.
Organization-wide cybersecurity and related document, process, and record management to ensure that systems and products are safe / secure and effective.
Installing, configuring, testing, and maintaining operating systems, application software and system management tools.
Ensuring the highest levels of systems and infrastructure availability.
Proposes design enhancements, capacity changes, contingency and recovery.
Arrangements as required to ensure that service targets are met within the organisation’s planned budget.
Ensures the investigation and diagnosis of operational incidents.
Resolve such incidents, including any capacity and availability management issues to maintain overall performance.
Acts as the technical lead on projects relating to security, data, and voice network management.
Provides advice and guidance on the design and development of new and changed systems to optimize operational efficiency.
Ensures that appropriate software and specialist monitoring tools are used to maintain awareness and control of hardware and software.
Monitors exceptional incidents and conducts or initiates investigations on system performance.
Proposes and implements consequent improvements working towards industry top benchmark targets.
Coach and monitor junior engineers, setting standards of performance and objectives (both collective and individual) in line with service objectives, provides direction and support to all team members ensuring that the highest professional standards are observed.
Monitor and test application and network performance for potential bottlenecks, identify possible solutions, and work with developers to implement those fixes.
Competencies, Knowledge, and Skills :
Knowledge of NIST and other security related frameworks.
Documentation (both process documentation and records management).
Broad knowledge of hardware, networking cyber security, vulnerability management and cloud migration.
In-depth understanding of infrastructure and network architecture and design.
Working knowledge on end points security solutions (firewalls, anti-virus, and network vulnerability assessments
Access control systems
Incidents detection and management.
Excellent analytical and problem-solving skills.
Strong Troubleshooting / problem-solving ability.
Understanding of virtual environments and containers.
Extensive understanding of Networks switching and routing as well as Voice technologies SIP and SBS’s.
Extensive understanding of firewalls, IPS, ACLS, DLP and vulnerability assessment.
Understanding of Enterprise Linus and Windows servers and services.
Experience with monitoring systems.
Experience with automation software.
Minimum Requirements :
Relevant Degree / National Diploma in Information Technology / Computer Science / Information Systems or equivalent
3-4 year’s experience in ICT security : (ie : 4 Years senior systems engineer experience / 3 years as a team lead / 2 Years’ senior security engineer experience / 2 Years’ senior data engineer experience / 2 Years’ senior voice engineer experience)
Certificate or equivalent in Information / IT Security such as CISSP, SISM, CCSP. ITIL would serve as an added advantage.
Closing Date : 6 March 2024
Should you not hear from us within 14 days of the closing date, please consider your application unsuccessful.
Create a job alert for this searchNetwork Engineer • JHB North, Johannesburg - Gauteng
#J-18808-LjbffrBe The First To Know
About the latest Network security Jobs in Johannesburg !
Security Specialist
Posted 2 days ago
Job Viewed
Job Description
Overview
The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre (SOC) team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1, 2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.
Role and delivery responsibilities- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse analysis, as well as the functioning of specific applications or underlying IT infrastructure
- Acts as an incident “hunter,” not waiting for escalated incidents
- Closely involved in developing, tuning, and implementing threat detection analytics
- Acts as the escalation for Tier 1 and 2 SOC Analysts
- Responds to and oversees the remediation of a declared security incident
- Completes the Root Cause Analysis Report for P1 to P4
- Provides guidance to Tier 1 and 2 SOC Analysts
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
- Make recommendations to the SOC Manager
- Oversees the analysis on running processes and configurations on affected systems
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
- Oversees the containment and recovery
- Oversees the deep-dive incident analysis by correlating data from various sources
- Validates if a critical system or data set has been impacted
- Provides support for analytic methods for detecting threats
- Conducts advanced triage based on defined run books of alerts
- Undertakes threat intelligence research if needed
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
- Further analyses alarms by method (e.g., credentials compromised) and by asset class
- Based on correlation rules and alarms within the SIEM and run books, conducts anomaly analysis using the MITRE ATT&CK framework
- Analyses event and process metadata in real-time or retrospectively, and identifies suspicious files/scripts seen for the first time
- Closes tickets in the SIEM platform – generated into ServiceNow
- Manages security incidents using the SIEM platform and defined operational procedures
- Performs a further investigation of potential incidents, and escalates or closes events as applicable
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
- Closes out deeper analysis and review activities
- Assists senior SOC staff with operational responsibilities
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange
- Strong knowledge and experience working with Linux Operating systems
- Good experience working with Nessus or Qualys
- Good understanding of the MITRE ATT&CK framework
- Good understanding of the ITIL Framework
- Brilliant with a support ticketing system and experience in meeting SLA targets
- Familiarity with risk management and quality assurance control
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
- Candidate must be eligible to obtain National Security Clearance
- Grade 12
- SIEM Technology certification
- AZ500, SC100
- ITIL Foundation qualification
- Degree or Diploma in Computer Technology
- CompTIA A+, N+, S+
- CompTIA CySa, CISSP and CASP+ advantageous
- Advanced Microsoft Excel experience, specifically data interpretation
- Good understanding of IT infrastructure
- A high command of the English language both written and verbal is essential
- Self-motivated with the ability to work unsupervised
- Attention to detail
- Punctuality
- Excellent verbal and written communication skills
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
- Proficient analytical and decision-making skills
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
- Proficient relationship building skills – predict customer behavior and respond accordingly
- A strong service-oriented culture, with a strong focus on the internal customer approach
- Good communicator with the customer environment
- Dynamic but aware of the views and feelings of others
- Able to operate as a good team player
- Drive and energy
- Demonstrate clear purpose, enthusiasm, and commitment
Security Specialist
Posted 25 days ago
Job Viewed
Job Description
It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.
Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!
We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
Join us and become a part of something epic!
ROLE PURPOSE
The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events
quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.
ROLE AND DELIVERY RESPONSIBILITIES:
The job role includes actively participating in the incident detection process as follows:
- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure
- Acts as an incident “hunter,” not waiting for escalated incidents
- Closely involved in developing, tuning, and implementing threat detection analytics
- Acts as the escalation for Tier 1 and 2 SOC Analysts
- Responds to and oversees the remediation of a declared security incident
- Completes the Root Cause Analysis Report for P1 to P4
- Provides guidance to Tier 1 and 2 SOC Analysts
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
- Make recommendations to the SOC Manager
- Oversees the analysis on running processes and configs on affected systems.
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
- Oversees the containment and recovery
- Oversees the deep-dive incident analysis by correlating data from various sources
- Validates if a critical system or data set has been impacted
- Provides support for analytic methods for detecting threats
- Conducts advanced triage based on defined run books of alerts
- Undertakes threat intelligence research if need be
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
- Further analyses alarms by method e.g. credentials compromised and by asset class
- Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework
- Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time
- Closes tickets in the SIEM platform – this would be automatically created into Service Now
- Manages security incidents using the SIEM platform and defined operational procedures
- Performs a further investigation of potential incidents, and escalate or close events as applicable
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
- Closes out deeper analysis and review activities
- Assist senior SOC staff with operational responsibilities
PERSON REQUIREMENTS:
EXPERIENCE:
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
- Strong knowledge and experience working with Linux Operating systems
- Good experience working with Nessus or Qualys
- Good understanding of the MITRE ATT&CK framework
- Good understanding of the ITIL Framework.
- Brilliant with a support ticketing system and experience in meeting SLA targets.
- Familiarity with risk management and quality assurance control.
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
- Candidate must be eligible to obtain National Security Clearance
QUALIFICATIONS:
- Grade 12
- AZ500,SC100
- Degree or Diploma in Computer Technology
- CompTIA A+, N+ S+
- CompTIA CySa, CISSP and CASP+ advantageous
ADDITIONAL SKILLS/ATTRIBUTES:
- Advanced Microsoft Excel experience, specifically data interpretation
- Good understanding of IT infrastructure
- A high command of the English language both written and verbal is essential.
- Self-motivated with the ability to work unsupervised.
- Punctuality
- Excellent verbal and written communication skills
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
- Possess proficient analytical and decision-making skills
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
- Proficient relationship building skills – predict customer behavior and respond accordingly
- A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations
- Good communicator with the customer environment
- Dynamic but aware of the views and feelings of others
- Able to operate as a good team player
- Drive and Energy
- Demonstrate clear purpose, enthusiasm, and commitment
If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.
#J-18808-LjbffrSecurity Specialist
Posted today
Job Viewed
Job Description
It’s not just IT solutions, It’s IT global know-how! Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.
Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow
Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!
We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.
Join us and become a part of something epic!
ROLE PURPOSE
The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events
quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.
ROLE AND DELIVERY RESPONSIBILITIES:
The job role includes actively participating in the incident detection process as follows:
- Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructure
- Acts as an incident “hunter,” not waiting for escalated incidents
- Closely involved in developing, tuning, and implementing threat detection analytics
- Acts as the escalation for Tier 1 and 2 SOC Analysts
- Responds to and oversees the remediation of a declared security incident
- Completes the Root Cause Analysis Report for P1 to P4
- Provides guidance to Tier 1 and 2 SOC Analysts
- Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack
- Monitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC Manager
- Make recommendations to the SOC Manager
- Oversees the analysis on running processes and configs on affected systems.
- Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
- Oversees the containment and recovery
- Oversees the deep-dive incident analysis by correlating data from various sources
- Validates if a critical system or data set has been impacted
- Provides support for analytic methods for detecting threats
- Conducts advanced triage based on defined run books of alerts
- Undertakes threat intelligence research if need be
- Validates false positives, policy violations, intrusion attempts, security threats and potential compromises
- Undertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessary
- Further analyses alarms by method e.g. credentials compromised and by asset class
- Based on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK framework
- Analyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first time
- Closes tickets in the SIEM platform – this would be automatically created into Service Now
- Manages security incidents using the SIEM platform and defined operational procedures
- Performs a further investigation of potential incidents, and escalate or close events as applicable
- Validates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysis
- Closes out deeper analysis and review activities
- Assist senior SOC staff with operational responsibilities
PERSON REQUIREMENTS:
EXPERIENCE:
- Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure Sentinel
- Proven experience with Office 365, Active Directory, Azure and Microsoft Exchange.
- Strong knowledge and experience working with Linux Operating systems
- Good experience working with Nessus or Qualys
- Good understanding of the MITRE ATT&CK framework
- Good understanding of the ITIL Framework.
- Brilliant with a support ticketing system and experience in meeting SLA targets.
- Familiarity with risk management and quality assurance control.
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
- Candidate must be eligible to obtain National Security Clearance
QUALIFICATIONS:
- Grade 12
- AZ500,SC100
- Degree or Diploma in Computer Technology
- CompTIA A+, N+ S+
- CompTIA CySa, CISSP and CASP+ advantageous
ADDITIONAL SKILLS/ATTRIBUTES:
- Advanced Microsoft Excel experience, specifically data interpretation
- Good understanding of IT infrastructure
- A high command of the English language both written and verbal is essential.
- Self-motivated with the ability to work unsupervised.
- Punctuality
- Excellent verbal and written communication skills
- Ability to remain flexible and adapt to changing priorities with promptness, efficiency, and ease
- Possess proficient analytical and decision-making skills
- Demonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patterns
- Proficient relationship building skills – predict customer behavior and respond accordingly
- A strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectations
- Good communicator with the customer environment
- Dynamic but aware of the views and feelings of others
- Able to operate as a good team player
- Drive and Energy
- Demonstrate clear purpose, enthusiasm, and commitment
If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.
#J-18808-Ljbffr