135 Security Analyst jobs in South Africa

Security Analyst

Springs, Gauteng Objective Personnel

Posted today

Job Viewed

Tap Again To Close

Job Description

SUMMARY : Security Analyst

POSITION INFO : Qualifications

  • Matric Certificate with Maths
  • B Com in Accountancy or equivalent
  • JDE Common Foundation
  • JDE Technical Foundation
  • AllOut Security Certification
  • CNC Certification (advantageous)
  • AS / 400 CL Programming
  • PRINCE2 / Project Management Certification
  • Business or Systems Analysis Certification
  • ITIL or COBIT Framework knowledge

Requirements

  • Ten (10) + years in IT, with at least 5 years in JD Edwards E1 and World (Functional and Technical)
  • Experience with AllOut Security administration
  • ERP System experience: JD Edwards (mandatory), SAP or Navision (advantageous)
  • Deep knowledge of Active Directory, vulnerability management, and other security tools
  • Experience managing security frameworks on AS / 400 systems
  • CNC and JDE deployment management
  • Business analysis, project implementation, and end-user training
  • Knowledge of compliance standards (SOX, King IV)
  • Process mapping and documentation (Visio, Lucidchart, etc.)
  • Report development and analytics (QlikView, SQL, etc.)

Duties

  • Design and maintain system security protocols (JDE E1 and World)
  • Administer and configure AllOut Security, ensuring segregation of duties and audit readiness
  • Monitor and maintain integrations and support for systems connected to JD Edwards
  • Perform system analysis, vulnerability assessments, and conduct internal audits in line with King III / IV and SOX standards
  • Lead and support audits, risk assessments, and disaster recovery processes
  • Manage user roles, responsibilities, and access rights across systems
  • Support CNC, AS / 400 system management, and I-series server operations
  • Write, update, and maintain technical documentation and user procedures
  • Lead incident responses, forensic analysis, and breach investigations
  • Train and support end-users and departmental teams
  • Provide help desk support and develop end-user documentation
  • Drive and support security awareness campaigns
  • Proactively identify areas for process and security improvement
  • Address audit queries as needed
  • Perform ad hoc duties within reasonable scope
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst II

Johannesburg, Gauteng nedbank

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.

Job Responsibilities
  • We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
  • Experience with Email and Web Proxies
  • DNS Security knowledge
  • Experience with Microsoft O365
  • Assist with support of current email and web security tasks
  • Liaise with other teams to promote good security practices and explain security procedures
  • Experience with Security Technologies
  • Building relationships with I&O Teams
  • Oversee the implementation of the information security changes and check for the short comings and risks.
  • Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
  • Participate in the implementation of new products as provided in the selection criteria.
  • Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
  • Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
  • Document and maintain all relevant processes and procedures mindful of current policies and standards.
  • Create and maintain information security standards.
  • Oversee and monitor the information security environment according to set standards.
  • Review and contribute to project documentation including business requirements, designs and implementation.
  • Create design documentation according to relevant standards and practices
  • Implement specific Information security technologies.
  • Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
  • Log submit and implement low, medium and high risk changes independently.
  • Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
  • Oversee and ensure change was successful in certain cases and when required perform unit testing.
  • Oversee and ensure back-ups are done, documents are stored and statuses updated.
  • Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
  • Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
  • Ensure job related tasks and processes are in place.
  • Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
  • Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
  • Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
  • Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
  • Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
  • Transfer of knowledge to team members.
  • Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
Technical Knowledge
  • Strong knowledge of Information Security Principles
  • Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
  • Knowledge of Email Security
  • Experience with Email Security Technologies
  • Experience Service Now
  • Experience Microsoft O365
Essential Qualifications - NQF Level
  • Matric / Grade 12 / National Senior Certificate
  • Advanced Diplomas/National 1st Degrees
Preferred Certifications
  • CCNA - Security
  • Security +
  • Network +
  • MS Azure Certifications – MS 365
Minimum Experience Level

Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks

Technical / Professional Knowledge
  • Administrative procedures and systems
  • Data analysis
  • Governance, Risk and Controls
  • Principles of project management
  • Relevant regulatory knowledge
  • Relevant software and systems knowledge
  • Cluster Specific Operational Knowledge
  • System Development Life cycle(SDLC)
  • TCP/IP
  • Information Security terms and definitions
  • Information Security policies and procedures
  • Communication
  • Customer Focus
  • Initiating Action
  • Managing Work
  • Technical/Professional Knowledge and Skills

---

Please contact the Nedbank Recruiting Team at

If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.

Nedbank Ltd Reg No 1951/ /06.
Authorised financial services and registered credit provider (NCRCP16).

For assistance please contact the Nedbank Recruiting Team at

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

ICT Security Analyst

Randburg, Gauteng Mintek Pty Ltd.

Posted today

Job Viewed

Tap Again To Close

Job Description

Industry: Scientific, Research & Development

Job category: Network Administration and Security

Location: Randburg

Contract: Permanent

Remuneration: Market Related

EE position: Yes

Introduction

Mintek has an exciting career opportunity for an ICT Security Analyst. The successful candidate will ensure the security and integrity of MINTEK’s ICT infrastructure by implementing and managing key security systems, monitoring network traffic, responding to incidents, conducting risk assessment and ensuring compliance with regulations like POPIA. The ideal candidate will have strong cybersecurity skills and experience with various security tools.

System Administration and Security Management
  • Firewall Administration (IPS/IDS): Manage and monitor firewall configurations, ensuring optimal performance and security. Implement intrusion detection and prevention systems to protect against potential threats;
  • Endpoint EDR Administration and Monitoring: Manage and monitor EDR systems by configuring policies, conducting threat hunts, analysing alerts, and ensuring updates. Implement behavioural detection and prevention to identify and mitigate threats, ensuring endpoint security and performance;
  • VPN Management: Administer and secure virtual private network, ensuring secure remote access for users while monitoring for unauthorised access or breaches;
  • Mimecast Administration: Oversee the e-mail security platform, ensuring robust protection against phishing, malware, and other e-mail-based threats;
  • KnowBe4 Security Awareness Training: Manage the security awareness platform, coordinating regular phishing simulations and training sessions to improve staff vigilance against social engineering attacks;
  • SIEM Incident Remediation: Monitor security information and event management (SIEM) systems incidents, analyse security alerts, and respond to incidents promptly to mitigate risks;
  • Active Directory (AD) Security: Ensure the security and integrity of the Active Directory environment by managing access controls, permissions, and group policies;
  • Cloud Security: Implement and manage security measures for cloud-based services, ensuring data protection and compliance with MINTEK’s security policies.
Specialized Security Administration
  • Digital Signature Administration: Manage the digital signature platform, ensuring secure and compliant electronic document signing processes;
  • Data Governance: Develop and enforce data governance policies, ensuring the organization’s data is managed securely, consistently, and in compliance with regulations;
  • Vulnerability Management: Conduct regular vulnerability assessments, applying patches and updates as necessary, and ensuring systems are protected against known vulnerabilities.
Compliance and Governance
  • POPIA Compliance: Ensure all ICT operations and data management practices comply with the Protection of Personal Information Act (POPIA) requirements, implementing necessary controls and processes.
Collaboration and Support
  • Cross-ICT Sections Collaboration: Work closely with other sections in ICT to ensure security measures are integrated into all aspects of the organization’s operations;
  • User Support: Provide technical support and guidance to users regarding security practices and incident response procedures;
  • Monthly Reporting: Prepare regular reports on security status, incidents, and compliance for senior management and regulatory bodies.
EDUCATION:
  • Minimum: Bachelor’s degree in information technology, Computer Science, Information Systems, Cybersecurity, or a related field.
  • Ideal: CompTIA's Security, CISSP or equivalent
EXPERIENCE:
  • Minimum of 3-5 years of experience in IT security, with specific experience in the administration of firewalls, VPNs, and SIEM systems;
  • Hands-on experience with firewalls, EDRs, email security, security awareness training, vulnerability management and AD security.
  • Experience in cloud security and vulnerability management is essential.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

NETSTOCK

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only

As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.

You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.

From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!

Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.

Responsibilities

  • Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
  • Access, read, and interpret server logs, audit trails, and system data to support investigations
  • Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
  • Support segregation of duties analysis and remediation
  • Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
  • Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
  • Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
  • Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
  • Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
  • Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
  • Vulnerability Management - Track patching and configuration compliance across systems
  • Proactively search for signs of compromise using hypothesis-based techniques
  • Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
  • Build and refine detection logic based on observed environment behavior
  • Create custom log correlation rules and detection use cases
  • Review server, database, and application configurations for security misconfigurations
  • Assist with internal or third-party penetration testing exercises
  • Validate reported vulnerabilities and test exploitability in controlled environments
  • Help develop realistic tabletop scenarios and user training content

Required Skills and Qualifications

  • Proficiency in forensic tools and techniques
  • Generalist understanding of server infrastructure, system privileges, and core security concepts
  • Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
  • Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
  • Experience with CVE tracking, vulnerability scanners, and mitigation workflows
  • Familiarity with standards such as ISO 27001 and common infosec frameworks
  • Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
  • Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders

Preferred Skills and Qualifications

  • Hands-on incident response or blue team roles
  • Exposure to SIEM platforms
  • Understanding of chain-of-custody and legal considerations in evidence handling
  • Experience in environments with regulatory requirements
  • Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
  • IDS/IPS knowledge
  • Ability to track vulnerabilities through to remediation
  • Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
  • Ability to perform hypothesis-driven hunts and pivot off findings
  • Knowledge of cloud platforms: AWS, Linode, Hetzner
  • Understanding of the CIA triad (Confidentiality, Integrity, Availability)

This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.

We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.

This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.

Working with us

Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.

About us

Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.

You can read more about Netstock’s history and our product offering at Netstock

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Gauteng, Gauteng Teraco – A Digital Realty Company

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company

Teraco Data Environments

2025/07/24 Gauteng

Job Reference Number: PSA_JB3

Department: Security

Business Unit

Industry: Information Technology

Job Type: Permanent

Positions Available: 1

Salary: Market Related

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting.

Job Description

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

Main Functions Of The Job

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

Job Requirements

Skills Requirement

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

Qualifications And Experience

  • Matric
  • Experience in Vendor Management and related SLA’s
  • Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • A+
  • N+
  • Microsoft Excel

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Finance and Sales
  • Industries Facilities Services

Referrals increase your chances of interviewing at Teraco – A Digital Realty Company by 2x

Get notified about new Investment Analyst jobs in Gauteng, South Africa .

Johannesburg Metropolitan Area 1 week ago

Johannesburg, Gauteng, South Africa 5 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Johannesburg, Gauteng, South Africa 6 days ago

Talent Pool: Investment Consultant (Johannesburg) MMH Talent Pool: Investment Consultant (Johannesburg)

Pretoria, Gauteng, South Africa 1 day ago

Johannesburg, Gauteng, South Africa 1 week ago

Pretoria, Gauteng, South Africa 2 weeks ago

Centurion, Gauteng, South Africa 3 months ago

Talent Pool: Investment Regional Manager - Countrywide MMH

Centurion, Gauteng, South Africa 4 months ago

Johannesburg, Gauteng, South Africa 1 day ago

Talent Pool: Investment Regional Manager - Countrywide MMH

Centurion, Gauteng, South Africa 2 days ago

Pretoria, Gauteng, South Africa 2 weeks ago

Johannesburg, Gauteng, South Africa 1 month ago

Senior Lecturer (College of Business & Economics: Department of Finance & Investment Management) Intermediate Business Analyst – Become Senior Business Analyst working for SA’s leading wealth manager – Johannesburg – R650K PA

City of Johannesburg, Gauteng, South Africa 15 hours ago

Springs, Gauteng, South Africa 4 days ago

Senior Business Analyst | Waterfall, Gauteng | Permanent

Johannesburg, Gauteng, South Africa 5 days ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa ZAR60,000.00-ZAR72,000.00 1 month ago

Centurion, Gauteng, South Africa 20 hours ago

Johannesburg, Gauteng, South Africa 5 days ago

SPECIALIST ANALYST INVESTMENT PROVIDERS DEPARTMENT

Sandton, Gauteng, South Africa 1 month ago

Johannesburg, Gauteng, South Africa 2 months ago

Johannesburg, Gauteng, South Africa 1 week ago

Johannesburg, Gauteng, South Africa 4 days ago

Business Analyst – Design investment management platform features for SA’s leading wealth manager – Johannesburg – R810K PA

Johannesburg Metropolitan Area 15 hours ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Offensive Security Analyst

Cape Town, Western Cape S-RM

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

S-RM Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Offensive Security Analyst role at S-RM

S-RM Cape Town, Western Cape, South Africa

Join to apply for the Offensive Security Analyst role at S-RM

Offensive Security Analysts support our delivery consultants running our offensive security services. They help to interpret client challenges, innovate solutions, and deliver findings. Our aim is to become trusted advisors to our clients.

You will work across the full spectrum of our pentesting services, whether point in time or continuous, as well as participate in larger engagements such as red teams. You will help our clients to build cyber resilience, enhance their understanding of the threat landscape and become better prepared to face dynamic and evolving security risks.

1.1 Main Duties And Responsibilities

Client Engagement and Account Management

  • Engage with clients to understand their cyber security challenges
  • Translate client challenges into solutions that fit S-RM's Offensive Security service offering and value proposition
  • Develop an understanding of delivery timelines, project resourcing requirements and pricing
  • Understand S-RM's proposal process and lead on proposal writing and presentations in some cases
  • Contribute to the expansion of client accounts and winning of new business
  • Gain an understanding of S-RM's target sectors and industries



Offensive Security

  • Penetration testing
    • Vulnerability assessments and monitoring
    • External infrastructure
    • External Attack Surface Management
    • Web application
    • API pentesting
    • Phishing and spear phishing
    • Internal pentesting
    • Mobile application pentesting (Android and iOS)
    • OT Pentesting
    • IOT Pentesting
    • Cloud Pentesting
    • Open-Source Intelligence (OSINT) gathering


  • Configuration Reviews
    • Cloud configuration review
    • Application configuration review
    • Hardware build review
    • Firewall review


  • Delivery & Client communications
    • Deliver findings in a range of formats, including written reports, presentations, and verbal briefings


  • Threat Intelligence
    • Keep abreast of threat intelligence developments, threat actor activity and security industry developments in mitigations and tooling
    • Develop and deliver client threat profiles, threat assessments and dark web analysis
Project Management



  • Support vCISO engagements, accessing the full range of S-RM's resources and expertise
  • Collaborate with incident response, ethical hacking, and digital forensics teams to integrate our services and support to clients
  • Support the delivery of retainer relationships
  • Support the delivery of the Attack Surface Management (ASM) service



Internal Initiatives and Strategy

  • Support internal initiatives on product development, process management, tech enablement, efficiency and exploring different ways to support clients
  • Contribute to the adaption of security frameworks to create innovative products
  • Challenge received wisdom and existing products and services. Suggest alternative approaches where appropriate
    • Develop documentation and evolve the testing methodologies where applicable
Professional Development and Domain Knowledge



  • Commit to continuous professional development and personal knowledge improvement across the full range of cyber security competencies, in line with personal utilisation targets (see Objectives)
  • Complete up to one formal training course over the financial year. This is beyond internal training sessions
  • Share knowledge with the wider team in line with company values, including contributing to internal training initiatives and programmes

Seniority level
  • Seniority level Entry level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Security and Investigations

Referrals increase your chances of interviewing at S-RM by 2x

Sign in to set job alerts for “Security Analyst” roles.

Cape Town, Western Cape, South Africa 3 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Business Intelligence Business Analyst III (BIBA III)

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa ZAR450,000.00-ZAR700,000.00 1 month ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 4 months ago

Cape Town, Western Cape, South Africa 2 weeks ago

L2 Security Operations Centre (SOC) Analyst

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 3 months ago

Cape Town, Western Cape, South Africa 3 weeks ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 1 month ago

Cape Town, Western Cape, South Africa 3 months ago

Stellenbosch, Western Cape, South Africa 1 day ago

Cape Town, Western Cape, South Africa 3 months ago

MS Sentinel SIEM Security Engineer (South Africa)

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 3 days ago

Stellenbosch, Western Cape, South Africa 1 day ago

City of Cape Town, Western Cape, South Africa 5 days ago

Cape Town, Western Cape, South Africa 5 days ago

Security Operations Engineer – Identify and Access Management (IAM) Specialist

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Analyst (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

Senior/Staff Application Security Engineer (Bangkok based, relocation provided)

Cape Town, Western Cape, South Africa 1 week ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Technical Security Analyst

Gauteng, Gauteng Crayon Technologies Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

How you'll role As a Technical Security Analyst, you will be on the frontline of our cyber defense strategy. Your mission is to safeguard our digital environment by identifying and responding effectively to threats. You'll work collaboratively with cross-functional teams, providing expertise in forensic analysis, vulnerability assessment, and threat intelligence. Your role is essential in interpreting complex server logs and evaluating the impact of vulnerabilities on the business. If you're passionate about cyber forensics and building resilient, secure systems, this is a perfect opportunity for you. What you'll do Collect and preserve forensic evidence from servers, endpoints, and cloud environments Access, read, and interpret server logs, audit trails, and system data Analyze logs for suspicious activity and known attack signatures Evaluate the likelihood and potential consequence of exploitation and provide mitigation recommendations Collaborate with DevOps, IT, and Security teams during incident response Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR) Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns What you'll need Proficiency in forensic tools and techniques Generalist understanding of server infrastructure and core security concepts Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.) Experience with CVE tracking, vulnerability scanners, and mitigation workflows Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.) Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders Preferred experience Hands-on incident response or blue team roles Exposure to SIEM platforms Understanding of chain-of-custody and legal considerations in evidence handling IDS/IPS knowledge Ability to track vulnerabilities through to remediation Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK Ability to perform hypothesis-driven hunts and pivot off findings Knowledge of cloud platforms: AWS, Linode, Hetzner Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security analyst Jobs in South Africa !

Ict security analyst

Randburg, Gauteng Mintek Pty Ltd.

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Industry: Scientific, Research & Development Job category: Network Administration and Security Location: Randburg Contract: Permanent Remuneration: Market Related EE position: Yes Introduction Mintek has an exciting career opportunity for an ICT Security Analyst. The successful candidate will ensure the security and integrity of MINTEK’s ICT infrastructure by implementing and managing key security systems, monitoring network traffic, responding to incidents, conducting risk assessment and ensuring compliance with regulations like POPIA. The ideal candidate will have strong cybersecurity skills and experience with various security tools. System Administration and Security Management Firewall Administration (IPS/IDS): Manage and monitor firewall configurations, ensuring optimal performance and security. Implement intrusion detection and prevention systems to protect against potential threats; Endpoint EDR Administration and Monitoring: Manage and monitor EDR systems by configuring policies, conducting threat hunts, analysing alerts, and ensuring updates. Implement behavioural detection and prevention to identify and mitigate threats, ensuring endpoint security and performance; VPN Management: Administer and secure virtual private network, ensuring secure remote access for users while monitoring for unauthorised access or breaches; Mimecast Administration: Oversee the e-mail security platform, ensuring robust protection against phishing, malware, and other e-mail-based threats; Know Be4 Security Awareness Training: Manage the security awareness platform, coordinating regular phishing simulations and training sessions to improve staff vigilance against social engineering attacks; SIEM Incident Remediation: Monitor security information and event management (SIEM) systems incidents, analyse security alerts, and respond to incidents promptly to mitigate risks; Active Directory (AD) Security: Ensure the security and integrity of the Active Directory environment by managing access controls, permissions, and group policies; Cloud Security: Implement and manage security measures for cloud-based services, ensuring data protection and compliance with MINTEK’s security policies. Specialized Security Administration Digital Signature Administration: Manage the digital signature platform, ensuring secure and compliant electronic document signing processes; Data Governance: Develop and enforce data governance policies, ensuring the organization’s data is managed securely, consistently, and in compliance with regulations; Vulnerability Management: Conduct regular vulnerability assessments, applying patches and updates as necessary, and ensuring systems are protected against known vulnerabilities. Compliance and Governance POPIA Compliance: Ensure all ICT operations and data management practices comply with the Protection of Personal Information Act (POPIA) requirements, implementing necessary controls and processes. Collaboration and Support Cross-ICT Sections Collaboration: Work closely with other sections in ICT to ensure security measures are integrated into all aspects of the organization’s operations; User Support: Provide technical support and guidance to users regarding security practices and incident response procedures; Monthly Reporting: Prepare regular reports on security status, incidents, and compliance for senior management and regulatory bodies. EDUCATION: Minimum: Bachelor’s degree in information technology, Computer Science, Information Systems, Cybersecurity, or a related field. Ideal: Comp TIA's Security, CISSP or equivalent EXPERIENCE: Minimum of 3-5 years of experience in IT security, with specific experience in the administration of firewalls, VPNs, and SIEM systems; Hands-on experience with firewalls, EDRs, email security, security awareness training, vulnerability management and AD security. Experience in cloud security and vulnerability management is essential. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Physical Security Analyst

Teraco

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

permanent

PURPOSE OF THE ROLE

This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.

MAIN FUNCTIONS OF THE JOB

  • Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
  • Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
  • Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
  • Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
  • Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
  • Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
  • Logging and updating calls via the ticketing system.
  • Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
  • Client specific monthly reporting.
  • ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
  • The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
  • System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
  • Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
  • Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
  • Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
  • Adherence to standard operating procedures and to IT security governance and policies.
  • Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
  • Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
  • Ad-hoc duties.
  • Review & validation of new/old, mapped camera’s according to security risk reviews.

SKILLS REQUIREMENT

  • Excellent written and verbal communication skills.
  • Active listening – ability to understand requirements
  • li>Ability to communicate in English
  • Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
  • Good prioritization and organization skills.
  • Attention to detail and accuracy
  • Proactive problem solver
  • Ability to work independently & a positive team player
  • Self-motivated
  • Conducts self professionally, exhibits high levels of tolerance and patience
  • Responsible for continued learning and self-development
  • All activities performed on time
  • Ability to write reports, business correspondence, and procedures

QUALIFICATIONS AND EXPERIENCE

  • Matric
  • Experience in Vendor Management and related SLA’s
  • li>Previous experience in supporting a VMS system or IP camera network (Advantageous)
  • Driver’s license and own car essential
  • li>IT Diploma/Certificate or equivalent NQF Level 6
  • 4 years’ experience in process or document administration in a technical environment
  • li>A+
  • N+
  • Microsoft Excel
This advertiser has chosen not to accept applicants from your region.

It Security Analyst Umhlanga

Umhlanga Rocks, KwaZulu Natal Careerbox

Posted today

Job Viewed

Tap Again To Close

Job Description

IT Senior Security Analyst

Are you ready to take the lead in transforming cybersecurity landscapes and safeguarding digital frontiers? Our esteemed BPO firm is on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This pivotal role is at the heart of our security operations, offering the chance to shape security architecture, deploy cutting-edge technologies, and spearhead our cyber defense initiatives.

Duties & Responsibilities
  • Practical planning and implementation of effective cyber defense and detection technologies.
  • Work with IT Ops on identified systems vulnerabilities to seek long-term solutions.
  • Formulate and evolve document standards through the use of known best practices.
  • Improved documentation aligned to industry best practices.
  • Enhanced reporting with clear data-driven results for use during security assessments, incident analysis, and root cause investigations.
  • Lead remediation recommendations and ensure incident closure and compliance.
  • Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes.
  • Monitor networks and connected devices for security issues.
  • Proactively respond to and report on DLP, IPS/IDS, ATP, APT detection, help devise remediation actions and improvement plans.
  • Track and help manage remediation efforts ensuring a mature document trail.
  • Use formal and agreed processes, methods, and standards to address incident management in a mature manner, ensuring effective remediation, business impact, and root cause analysis.
  • Investigate all cyber security incidents.
  • Aid in the documentation of security breaches and provide remediation recommendations.
  • Assess security incidents and measure organizational impact.
  • Ensure and improve the organization’s IT Security and regulatory compliance.
  • Development and implementation of effective “first-line of defense” protection solutions.
  • Implement and report against scheduled sensitive data discovery.
  • Stay current on IT security trends and news (Trusted 3rd Party Notifications).
  • Research security enhancements and make recommendations to management.
  • Perform cyber security protection and detection systems design, deployment, and enhancement.
Desired Experience & Qualification
  • Relevant IT Security certification or equivalent.
  • Minimum 5 years’ experience in IT systems engineering.
  • Minimum 3 years’ experience in IT security incident response.
  • Experience with computer network vulnerability testing tools and techniques.
  • Experience with vulnerability remediation in and across various technologies.
  • Good understanding of firewalls, proxies, SIEM, AV, and IDS/IPS concepts.
  • Understanding of Wireless network security and protection mechanisms.
  • Understanding of cyber security centric documentation and evidence collection.
  • Experience with industry standard InfoSec tools and techniques i.e. O365 Security Centre, Mimecast, Qualys, AV, SIEM’s, Qualys and Nessus, unstructured data scanning, rogue detection, etc.
  • Pentest experience and exposure.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Analyst Jobs