421 Security jobs in South Africa

Security Analyst

Springs, Gauteng Objective Personnel

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Qualifications
  • Matric Certificate with Maths
  • B Com in Accountancy or equivalent
  • JDE Common Foundation
  • JDE Technical Foundation
  • AllOut Security Certification
  • CNC Certification (advantageous)
  • AS/400 CL Programming
  • PRINCE2 / Project Management Certification
  • Business or Systems Analysis Certification
  • ITIL or COBIT Framework knowledge.
Requirements
  • Ten (10) + years in IT, with at least 5 years in JD Edwards E1 and World (Functional and Technical)
  • Experience with AllOut Security administration
  • ERP System experience: JD Edwards (mandatory), SAP or Navision (advantageous)
  • Deep knowledge of Active Directory, QlikView, and vulnerability management
  • Experience managing security frameworks on AS/400 systems;
  • CNC and JDE deployment management
  • Business analysis, project implementation, and end-user training
  • Knowledge of compliance standards (SOX, King IV);
  • Process mapping and documentation (Visio, Lucidchart, etc.)
  • Report development and analytics (QlikView, SQL, etc.).
Duties
  • Design and maintain system security protocols (JDE E1 and World)
  • Administer and configure AllOut Security, ensuring segregation of duties and audit readiness
  • Monitor and maintain integrations and support for various systems connected to JD Edwards
  • Perform system analysis, vulnerability assessments, and conduct internal audits in alignment with King III/IV and SOX
  • Lead and support audits, risk assessments, and disaster recovery processes
  • Manage user roles, responsibilities, and access rights across systems
  • Support CNC, AS/400 system management, and I-series server operations
  • Write, update, and maintain technical documentation and user procedures
  • Lead incident responses, forensic analysis, and investigations of breaches
  • Train and support end-users and teams across departments;
  • Provide help desk support and develop end-user documentation
  • Drive and support security awareness campaigns
  • Proactively identify areas of process and security improvement
  • Attend to audit queries as and when required
  • Perform ad hoc duties as and when required within reasonable job scope.
This advertiser has chosen not to accept applicants from your region.

IT Security Analyst

Durban, KwaZulu Natal Carlysle Human Capital

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

The purpose of the mid-level IT Security Analyst position is to ensure the security of the organization's digital assets and protect against cyber threats. This role involves safeguarding network infrastructure, monitoring and analyzing security events, responding to incidents, and implementing security measures and countermeasures. The IT Security Analyst will collaborate closely with Senior IT support colleagues to maintain the organization's security posture. This position can be based at our Durban or Somkhele (Northern KZN) campus, with routine travel between campuses potentially required. The client has a hybrid work policy of two days in the office and the rest from home.

Responsibilities:
  1. Monitor computer networks and systems for security issues or breaches.
  2. Investigate and document security breaches and other cybersecurity incidents.
  3. Install security measures and operating software to protect systems and information infrastructure.
  4. Perform vulnerability scanning, risk analyses, and security assessments.
  5. Assist in developing information security policies and procedures.
  6. Implement and upgrade security measures and controls in collaboration with colleagues.
  7. Stay updated on the latest cybersecurity intelligence, including hackers’ methodologies, to anticipate security breaches.
  8. Train staff on information security procedures and practices.
  9. Report security assessment findings to management and recommend improvements.
  10. Research and implement security best practices, including data security and data loss prevention (DLP).
  11. Manage security tools such as Anti-Malware, Anti-SPAM, Nessus, Firewalls, etc.
  12. Enhance security and compliance through Microsoft 365 and other technologies.
Minimum Qualifications:
  • Professional IT certificates such as A+, N+, MCSE, CompTIA Security+, CySA+, CEH, or GIAC GSEC/GCIH. A diploma or degree is advantageous.
Minimum Experience:
  • Over 3 years of experience in cybersecurity, focusing on blue team activities or similar roles.
  • Hands-on experience with incident response and SIEM management.
  • Strong knowledge of Active Directory and Entra ID.
  • Experience with DHCP, DNS, and general networking.
  • Proficiency with Microsoft Windows and Apple Mac OSX.
  • Knowledge of Microsoft desktop products including Office and Office 365.
Advantageous Skills:
  • Linux skills and scripting experience.
  • CISSP or CISM certification (preferred but not required).
  • Bachelor’s degree in Cybersecurity, IT, or a related field, or equivalent experience.
  • Previous SOC experience.
Desired Skills:
  • Security analyst
  • IT security analyst
  • Cybersecurity
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

ICT Security Analyst

Randburg, Gauteng Mintek Pty Ltd.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Industry: Scientific, Research & Development

Job category: Network Administration and Security

Location: Randburg

Contract: Permanent

Remuneration: Market Related

EE position: Yes

Introduction

Mintek has an exciting career opportunity for an ICT Security Analyst. The successful candidate will ensure the security and integrity of MINTEK’s ICT infrastructure by implementing and managing key security systems, monitoring network traffic, responding to incidents, conducting risk assessment and ensuring compliance with regulations like POPIA. The ideal candidate will have strong cybersecurity skills and experience with various security tools.

System Administration and Security Management
  • Firewall Administration (IPS/IDS): Manage and monitor firewall configurations, ensuring optimal performance and security. Implement intrusion detection and prevention systems to protect against potential threats;
  • Endpoint EDR Administration and Monitoring: Manage and monitor EDR systems by configuring policies, conducting threat hunts, analysing alerts, and ensuring updates. Implement behavioural detection and prevention to identify and mitigate threats, ensuring endpoint security and performance;
  • VPN Management: Administer and secure virtual private network, ensuring secure remote access for users while monitoring for unauthorised access or breaches;
  • Mimecast Administration: Oversee the e-mail security platform, ensuring robust protection against phishing, malware, and other e-mail-based threats;
  • KnowBe4 Security Awareness Training: Manage the security awareness platform, coordinating regular phishing simulations and training sessions to improve staff vigilance against social engineering attacks;
  • SIEM Incident Remediation: Monitor security information and event management (SIEM) systems incidents, analyse security alerts, and respond to incidents promptly to mitigate risks;
  • Active Directory (AD) Security: Ensure the security and integrity of the Active Directory environment by managing access controls, permissions, and group policies;
  • Cloud Security: Implement and manage security measures for cloud-based services, ensuring data protection and compliance with MINTEK’s security policies.
Specialized Security Administration
  • Digital Signature Administration: Manage the digital signature platform, ensuring secure and compliant electronic document signing processes;
  • Data Governance: Develop and enforce data governance policies, ensuring the organization’s data is managed securely, consistently, and in compliance with regulations;
  • Vulnerability Management: Conduct regular vulnerability assessments, applying patches and updates as necessary, and ensuring systems are protected against known vulnerabilities.
Compliance and Governance
  • POPIA Compliance: Ensure all ICT operations and data management practices comply with the Protection of Personal Information Act (POPIA) requirements, implementing necessary controls and processes.
Collaboration and Support
  • Cross-ICT Sections Collaboration: Work closely with other sections in ICT to ensure security measures are integrated into all aspects of the organization’s operations;
  • User Support: Provide technical support and guidance to users regarding security practices and incident response procedures;
  • Monthly Reporting: Prepare regular reports on security status, incidents, and compliance for senior management and regulatory bodies.
EDUCATION:
  • Minimum: Bachelor’s degree in information technology, Computer Science, Information Systems, Cybersecurity, or a related field.
  • Ideal: CompTIA's Security, CISSP or equivalent
EXPERIENCE:
  • Minimum of 3-5 years of experience in IT security, with specific experience in the administration of firewalls, VPNs, and SIEM systems;
  • Hands-on experience with firewalls, EDRs, email security, security awareness training, vulnerability management and AD security.
  • Experience in cloud security and vulnerability management is essential.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Johannesburg, Gauteng Infystrat Software Services

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

InfyStrat is seeking a motivated Cyber Security Analyst to join our team and contribute to our mission of safeguarding our digital assets and infrastructure. In this role, you will monitor, detect, and respond to security threats, vulnerabilities, and incidents across our systems. You'll perform risk assessments, analyze security breaches, and provide remediation recommendations while collaborating with various teams to enhance our security posture. This is a fantastic opportunity to grow your skills in a fast-paced environment while playing a critical role in protecting our organization from cyber threats.

Key Responsibilities:

  • Monitor security alerts and events from various sources, including SIEM tools, to identify and respond to security threats
  • Conduct thorough investigations of security incidents, documenting findings and coordinating response actions
  • Assist in the development and implementation of security policies, procedures, and guidelines to protect sensitive information
  • Perform vulnerability assessments and penetration testing to identify security weaknesses
  • Analyze trends and patterns in security incidents and provide recommendations for improving defense mechanisms
  • Stay updated on the latest cybersecurity threats, vulnerabilities, and best practices
  • Work with IT and development teams to ensure secure configurations and practices across all systems

Requirements

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field
  • 2+ years of experience in cybersecurity, information security, or a related role
  • Strong understanding of security principles, concepts, and technologies
  • Experience with security monitoring tools, SIEM platforms, and incident response procedures
  • Familiarity with network security, firewalls, intrusion detection/prevention systems, and secure coding practices
  • Knowledge of security frameworks and regulatory standards (e.g., NIST, ISO 27001, GDPR)
  • Strong analytical and problem-solving skills, with attention to detail
  • Excellent communication skills to effectively collaborate with cross-functional teams
  • CERT, CISSP, CISM, or equivalent security certifications are a plus
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Gauteng, Gauteng Teraco – A Digital Realty Company

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Teraco Data Environments

2025/07/24 Gauteng

Job Reference Number: PSA_JB3

Department: Security

Business Unit

Industry: Information Technology

Job Type: Permanent

Positions Available: 1

Salary: Market Related

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting.

Job Description

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

Main Functions Of The Job

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

Job Requirements

Skills Requirement

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

Qualifications And Experience

  • Matric
  • Experience in Vendor Management and related SLA’s
  • Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • A+
  • N+
  • Microsoft Excel

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Finance and Sales
  • Industries Facilities Services

Referrals increase your chances of interviewing at Teraco – A Digital Realty Company by 2x

Get notified about new Investment Analyst jobs in Gauteng, South Africa .

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 5 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Talent Pool: Investment Consultant (Johannesburg) MMH230213-21 Talent Pool: Investment Consultant (Johannesburg)

Pretoria, Gauteng, South Africa 1 day ago

Johannesburg, Gauteng, South Africa 1 week ago

Pretoria, Gauteng, South Africa 2 weeks ago

Centurion, Gauteng, South Africa 3 months ago

Talent Pool: Investment Regional Manager - Countrywide MMH230620-20

Centurion, Gauteng, South Africa 4 months ago

Johannesburg, Gauteng, South Africa 1 day ago

Talent Pool: Investment Regional Manager - Countrywide MMH230620-20

Centurion, Gauteng, South Africa 2 days ago

Pretoria, Gauteng, South Africa 2 weeks ago

Johannesburg, Gauteng, South Africa 1 month ago

Senior Lecturer (College of Business & Economics: Department of Finance & Investment Management) Intermediate Business Analyst – Become Senior Business Analyst working for SA’s leading wealth manager – Johannesburg – R650K PA

City of Johannesburg, Gauteng, South Africa 15 hours ago

Springs, Gauteng, South Africa 4 days ago

Senior Business Analyst | Waterfall, Gauteng | Permanent

Johannesburg, Gauteng, South Africa 5 days ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa ZAR60,000.00-ZAR72,000.00 1 month ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa 5 days ago

SPECIALIST ANALYST INVESTMENT PROVIDERS DEPARTMENT

Sandton, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 2 months ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 4 days ago

Business Analyst – Design investment management platform features for SA’s leading wealth manager – Johannesburg – R810K PA

Johannesburg Metropolitan Area 15 hours ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Johannesburg, Gauteng Data Centrix

Posted 15 days ago

Job Viewed

Tap Again To Close

Job Description

Managed Talent Solutions client in the mining sector is looking for a Information Security Analyst on a 12 month fixed term contract. Must have +6 years experience in conducting risk assessments that rely on outside penetration testing support and application of common Information Security Frameworks such as the ISO27000 series, SANS20, NIST and the ISF control framework.

POSITION INFO : Requirements :

  • An undergraduate or postgraduate qualification in computer science, business informatics, / technology or equivalent Â
  • Professional certifications and experience in Information Security from industry standard security frameworks : ISACA, BCS, CIPP, ITIL, Crest, ISC2, COMPTIA and key security vendors including Microsoft, Crowdstrike, Qualys, IBM.
  • Must have experience in appliocation of Information Security frameworks such as the ISO27000 series, SANS20, NIST and the ISF control framework
  • Conducting risk assessments that rely on outside penetration testing support
  • Information security training and awareness concepts and delivery
  • Incident response and crisis management concepts experience

 Key responsibilities :

  • Support and monitor cybersecurity initiatives and controls in the region
  • Collaborate with regional IT and security teams to implement security measures and protocols
  • Conduct security assessments and risk analyses for regional assets and systems
  • Facilitate security awareness training for regional employees
  • Respond to and investigate security incidents in the region
  • Stay updated with regional cybersecurity regulations and compliance requirements
Create a job alert for this search

Security Analyst • Johannesburg, South Africa

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Johannesburg, Gauteng University of Fort Hare

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Managed Talent Solutions client in the mining sector is looking for a Information Security Analyst on a 12-month fixed-term contract. Must have more than 6 years of experience in conducting risk assessments that rely on outside penetration testing support and application of common Information Security Frameworks such as the ISO27000 series, SANS20, NIST, and the ISF control framework.

Requirements:

  • An undergraduate or postgraduate qualification in computer science, business informatics, engineering/technology, or equivalent.
  • Professional certifications and experience in Information Security from industry-standard security frameworks: ISACA, BCS, CIPP, ITIL, Crest, ISC2, COMPTIA, and key security vendors including Microsoft, Crowdstrike, Qualys, IBM.
  • Experience in application of Information Security frameworks such as the ISO27000 series, SANS20, NIST, and the ISF control framework.
  • Experience in conducting risk assessments that rely on outside penetration testing support.
  • Knowledge of information security training and awareness concepts and delivery.
  • Experience with incident response and crisis management concepts.

Key responsibilities:

  • Support and monitor cybersecurity initiatives and controls in the region.
  • Collaborate with regional IT and security teams to implement security measures and protocols.
  • Conduct security assessments and risk analyses for regional assets and systems.
  • Facilitate security awareness training for regional employees.
  • Respond to and investigate security incidents in the region.
  • Stay updated with regional cybersecurity regulations and compliance requirements.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security Jobs in South Africa !

Cyber Security Analyst

Johannesburg, Gauteng InfyStrat

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

InfyStrat is seeking a motivated Cyber Security Analyst to join our team and contribute to our mission of safeguarding our digital assets and infrastructure. In this role, you will monitor, detect, and respond to security threats, vulnerabilities, and incidents across our systems. You'll perform risk assessments, analyze security breaches, and provide remediation recommendations while collaborating with various teams to enhance our security posture. This is a fantastic opportunity to grow your skills in a fast-paced environment while playing a critical role in protecting our organization from cyber threats.

Key Responsibilities:
  • Monitor security alerts and events from various sources, including SIEM tools, to identify and respond to security threats.
  • Conduct thorough investigations of security incidents, documenting findings and coordinating response actions.
  • Assist in the development and implementation of security policies, procedures, and guidelines to protect sensitive information.
  • Perform vulnerability assessments and penetration testing to identify security weaknesses.
  • Analyze trends and patterns in security incidents and provide recommendations for improving defense mechanisms.
  • Stay updated on the latest cybersecurity threats, vulnerabilities, and best practices.
  • Work with IT and development teams to ensure secure configurations and practices across all systems.
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 2+ years of experience in cybersecurity, information security, or a related role.
  • Strong understanding of security principles, concepts, and technologies.
  • Experience with security monitoring tools, SIEM platforms, and incident response procedures.
  • Familiarity with network security, firewalls, intrusion detection/prevention systems, and secure coding practices.
  • Knowledge of security frameworks and regulatory standards (e.g., NIST, ISO 27001, GDPR).
  • Strong analytical and problem-solving skills, with attention to detail.
  • Excellent communication skills to effectively collaborate with cross-functional teams.
  • CERT, CISSP, CISM, or equivalent security certifications are a plus.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Offensive Security Analyst

Cape Town, Western Cape S-RM

Posted 18 days ago

Job Viewed

Tap Again To Close

Job Description

S-RM Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Offensive Security Analyst role at S-RM

S-RM Cape Town, Western Cape, South Africa

Join to apply for the Offensive Security Analyst role at S-RM

Offensive Security Analysts support our delivery consultants running our offensive security services. They help to interpret client challenges, innovate solutions, and deliver findings. Our aim is to become trusted advisors to our clients.

You will work across the full spectrum of our pentesting services, whether point in time or continuous, as well as participate in larger engagements such as red teams. You will help our clients to build cyber resilience, enhance their understanding of the threat landscape and become better prepared to face dynamic and evolving security risks.

1.1 Main Duties And Responsibilities

Client Engagement and Account Management

  • Engage with clients to understand their cyber security challenges
  • Translate client challenges into solutions that fit S-RM's Offensive Security service offering and value proposition
  • Develop an understanding of delivery timelines, project resourcing requirements and pricing
  • Understand S-RM's proposal process and lead on proposal writing and presentations in some cases
  • Contribute to the expansion of client accounts and winning of new business
  • Gain an understanding of S-RM's target sectors and industries



Offensive Security

  • Penetration testing
    • Vulnerability assessments and monitoring
    • External infrastructure
    • External Attack Surface Management
    • Web application
    • API pentesting
    • Phishing and spear phishing
    • Internal pentesting
    • Mobile application pentesting (Android and iOS)
    • OT Pentesting
    • IOT Pentesting
    • Cloud Pentesting
    • Open-Source Intelligence (OSINT) gathering


  • Configuration Reviews
    • Cloud configuration review
    • Application configuration review
    • Hardware build review
    • Firewall review


  • Delivery & Client communications
    • Deliver findings in a range of formats, including written reports, presentations, and verbal briefings


  • Threat Intelligence
    • Keep abreast of threat intelligence developments, threat actor activity and security industry developments in mitigations and tooling
    • Develop and deliver client threat profiles, threat assessments and dark web analysis
Project Management



  • Support vCISO engagements, accessing the full range of S-RM's resources and expertise
  • Collaborate with incident response, ethical hacking, and digital forensics teams to integrate our services and support to clients
  • Support the delivery of retainer relationships
  • Support the delivery of the Attack Surface Management (ASM) service



Internal Initiatives and Strategy

  • Support internal initiatives on product development, process management, tech enablement, efficiency and exploring different ways to support clients
  • Contribute to the adaption of security frameworks to create innovative products
  • Challenge received wisdom and existing products and services. Suggest alternative approaches where appropriate
    • Develop documentation and evolve the testing methodologies where applicable
Professional Development and Domain Knowledge



  • Commit to continuous professional development and personal knowledge improvement across the full range of cyber security competencies, in line with personal utilisation targets (see Objectives)
  • Complete up to one formal training course over the financial year. This is beyond internal training sessions
  • Share knowledge with the wider team in line with company values, including contributing to internal training initiatives and programmes

Seniority level
  • Seniority level Entry level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Security and Investigations

Referrals increase your chances of interviewing at S-RM by 2x

Sign in to set job alerts for “Security Analyst” roles.

Cape Town, Western Cape, South Africa 3 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Business Intelligence Business Analyst III (BIBA III)

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa ZAR450,000.00-ZAR700,000.00 1 month ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 4 months ago

Cape Town, Western Cape, South Africa 2 weeks ago

L2 Security Operations Centre (SOC) Analyst

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 3 months ago

Cape Town, Western Cape, South Africa 3 weeks ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 3 months ago

Stellenbosch, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 3 months ago

MS Sentinel SIEM Security Engineer (South Africa)

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 3 days ago

Stellenbosch, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

Security Operations Engineer – Identify and Access Management (IAM) Specialist

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Engineer (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Gauteng, Gauteng Crayon Technologies Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

How you'll role As a Technical Security Analyst, you will be on the frontline of our cyber defense strategy. Your mission is to safeguard our digital environment by identifying and responding effectively to threats. You'll work collaboratively with cross-functional teams, providing expertise in forensic analysis, vulnerability assessment, and threat intelligence. Your role is essential in interpreting complex server logs and evaluating the impact of vulnerabilities on the business. If you're passionate about cyber forensics and building resilient, secure systems, this is a perfect opportunity for you. What you'll do Collect and preserve forensic evidence from servers, endpoints, and cloud environments Access, read, and interpret server logs, audit trails, and system data Analyze logs for suspicious activity and known attack signatures Evaluate the likelihood and potential consequence of exploitation and provide mitigation recommendations Collaborate with DevOps, IT, and Security teams during incident response Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR) Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns What you'll need Proficiency in forensic tools and techniques Generalist understanding of server infrastructure and core security concepts Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.) Experience with CVE tracking, vulnerability scanners, and mitigation workflows Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.) Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders Preferred experience Hands-on incident response or blue team roles Exposure to SIEM platforms Understanding of chain-of-custody and legal considerations in evidence handling IDS/IPS knowledge Ability to track vulnerabilities through to remediation Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK Ability to perform hypothesis-driven hunts and pivot off findings Knowledge of cloud platforms: AWS, Linode, Hetzner Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Jobs