135 Security Analyst jobs in South Africa
Security Analyst
Posted today
Job Viewed
Job Description
SUMMARY : Security Analyst
POSITION INFO : Qualifications
- Matric Certificate with Maths
- B Com in Accountancy or equivalent
- JDE Common Foundation
- JDE Technical Foundation
- AllOut Security Certification
- CNC Certification (advantageous)
- AS / 400 CL Programming
- PRINCE2 / Project Management Certification
- Business or Systems Analysis Certification
- ITIL or COBIT Framework knowledge
Requirements
- Ten (10) + years in IT, with at least 5 years in JD Edwards E1 and World (Functional and Technical)
- Experience with AllOut Security administration
- ERP System experience: JD Edwards (mandatory), SAP or Navision (advantageous)
- Deep knowledge of Active Directory, vulnerability management, and other security tools
- Experience managing security frameworks on AS / 400 systems
- CNC and JDE deployment management
- Business analysis, project implementation, and end-user training
- Knowledge of compliance standards (SOX, King IV)
- Process mapping and documentation (Visio, Lucidchart, etc.)
- Report development and analytics (QlikView, SQL, etc.)
Duties
- Design and maintain system security protocols (JDE E1 and World)
- Administer and configure AllOut Security, ensuring segregation of duties and audit readiness
- Monitor and maintain integrations and support for systems connected to JD Edwards
- Perform system analysis, vulnerability assessments, and conduct internal audits in line with King III / IV and SOX standards
- Lead and support audits, risk assessments, and disaster recovery processes
- Manage user roles, responsibilities, and access rights across systems
- Support CNC, AS / 400 system management, and I-series server operations
- Write, update, and maintain technical documentation and user procedures
- Lead incident responses, forensic analysis, and breach investigations
- Train and support end-users and departmental teams
- Provide help desk support and develop end-user documentation
- Drive and support security awareness campaigns
- Proactively identify areas for process and security improvement
- Address audit queries as needed
- Perform ad hoc duties within reasonable scope
Information Security Analyst II
Posted 8 days ago
Job Viewed
Job Description
To analyse information security related tasks within the ambit of existing information security policies, standards and processes, procedures and practices as well as business rules. Working independently to deliver on work tasks. Mentor Administrators and Analyst I. Collaborate with other specialists to execute analysis work tasks, perform operational tasks, question, recommend and update improvements to the existing policies, process and procedures. To ensure stability and up-time for areas the incumbent takes responsibility for, which could require availability on demand to perform job related duties outside of normal working hours.
Job Responsibilities- We are looking for a suitable resource with general network security or web security experience to alleviate work pressures on our current team members
- Experience with Email and Web Proxies
- DNS Security knowledge
- Experience with Microsoft O365
- Assist with support of current email and web security tasks
- Liaise with other teams to promote good security practices and explain security procedures
- Experience with Security Technologies
- Building relationships with I&O Teams
- Oversee the implementation of the information security changes and check for the short comings and risks.
- Interpret MIS and system logs/ reports with the view to analyse and correct any deviations against standards and best practices.
- Participate in the implementation of new products as provided in the selection criteria.
- Act as the 1st point of problem resolution for non routine incidents and 1st line support for problems.
- Ensure compliance to standards and practises by familiarizing and keeping abreast of information security policies, rules, standards and processes, procedures and practices as well as business rules.
- Document and maintain all relevant processes and procedures mindful of current policies and standards.
- Create and maintain information security standards.
- Oversee and monitor the information security environment according to set standards.
- Review and contribute to project documentation including business requirements, designs and implementation.
- Create design documentation according to relevant standards and practices
- Implement specific Information security technologies.
- Gain further exposure and experience on multiple technologies by job shadowing Information Security analysts III and Technical Specialist.
- Log submit and implement low, medium and high risk changes independently.
- Provide guidance and supervision to Administrators and Analyst I on implementation and changes.
- Oversee and ensure change was successful in certain cases and when required perform unit testing.
- Oversee and ensure back-ups are done, documents are stored and statuses updated.
- Analyse logs and reports independently and provide supervision to Administrators and Analyst I.
- Monitor and action Service Manager low, medium and high impact incidents and e-mails related to Information Security.
- Ensure job related tasks and processes are in place.
- Ensure that the logging and submitting of all relevant incidents have taken place and resolve low, medium and high incidents.
- Conduct risk and root cause analyses around exceptions, queries, incidents as per operational procedures with the relevant internal and external stakeholders and provide feedback, confirm stakeholder satisfaction.
- Keep abreast of legislation and other industry changes that impacts on role by reading the relevant newsletters, websites and attending sessions.
- Improve personal capability and to stay abreast of developments in field of expertise by identify training courses and career progression opportunities for self through input and feedback from managers.
- Ensure information is provided correctly to stakeholders by maintaining knowledge sharing knowledge with team.
- Transfer of knowledge to team members.
- Identify and recommend opportunities to enhance processes, systems and policies and support implementation of new processes, policies and systems.
- Strong knowledge of Information Security Principles
- Ensuring security best practices are implemented , safeguarding network infrastructure against any potential threats
- Knowledge of Email Security
- Experience with Email Security Technologies
- Experience Service Now
- Experience Microsoft O365
- Matric / Grade 12 / National Senior Certificate
- Advanced Diplomas/National 1st Degrees
- CCNA - Security
- Security +
- Network +
- MS Azure Certifications – MS 365
Minimum of 3 years’ experience in an IT operations team dealing with the network Security tasks
Technical / Professional Knowledge- Administrative procedures and systems
- Data analysis
- Governance, Risk and Controls
- Principles of project management
- Relevant regulatory knowledge
- Relevant software and systems knowledge
- Cluster Specific Operational Knowledge
- System Development Life cycle(SDLC)
- TCP/IP
- Information Security terms and definitions
- Information Security policies and procedures
- Communication
- Customer Focus
- Initiating Action
- Managing Work
- Technical/Professional Knowledge and Skills
---
Please contact the Nedbank Recruiting Team at
If you can't find the job you're looking for, activate job alerts to be one of the first to know when new positions open up.
Nedbank Ltd Reg No 1951/ /06.
Authorised financial services and registered credit provider (NCRCP16).
For assistance please contact the Nedbank Recruiting Team at
#J-18808-LjbffrICT Security Analyst
Posted today
Job Viewed
Job Description
Industry: Scientific, Research & Development
Job category: Network Administration and Security
Location: Randburg
Contract: Permanent
Remuneration: Market Related
EE position: Yes
IntroductionMintek has an exciting career opportunity for an ICT Security Analyst. The successful candidate will ensure the security and integrity of MINTEK’s ICT infrastructure by implementing and managing key security systems, monitoring network traffic, responding to incidents, conducting risk assessment and ensuring compliance with regulations like POPIA. The ideal candidate will have strong cybersecurity skills and experience with various security tools.
System Administration and Security Management- Firewall Administration (IPS/IDS): Manage and monitor firewall configurations, ensuring optimal performance and security. Implement intrusion detection and prevention systems to protect against potential threats;
- Endpoint EDR Administration and Monitoring: Manage and monitor EDR systems by configuring policies, conducting threat hunts, analysing alerts, and ensuring updates. Implement behavioural detection and prevention to identify and mitigate threats, ensuring endpoint security and performance;
- VPN Management: Administer and secure virtual private network, ensuring secure remote access for users while monitoring for unauthorised access or breaches;
- Mimecast Administration: Oversee the e-mail security platform, ensuring robust protection against phishing, malware, and other e-mail-based threats;
- KnowBe4 Security Awareness Training: Manage the security awareness platform, coordinating regular phishing simulations and training sessions to improve staff vigilance against social engineering attacks;
- SIEM Incident Remediation: Monitor security information and event management (SIEM) systems incidents, analyse security alerts, and respond to incidents promptly to mitigate risks;
- Active Directory (AD) Security: Ensure the security and integrity of the Active Directory environment by managing access controls, permissions, and group policies;
- Cloud Security: Implement and manage security measures for cloud-based services, ensuring data protection and compliance with MINTEK’s security policies.
- Digital Signature Administration: Manage the digital signature platform, ensuring secure and compliant electronic document signing processes;
- Data Governance: Develop and enforce data governance policies, ensuring the organization’s data is managed securely, consistently, and in compliance with regulations;
- Vulnerability Management: Conduct regular vulnerability assessments, applying patches and updates as necessary, and ensuring systems are protected against known vulnerabilities.
- POPIA Compliance: Ensure all ICT operations and data management practices comply with the Protection of Personal Information Act (POPIA) requirements, implementing necessary controls and processes.
- Cross-ICT Sections Collaboration: Work closely with other sections in ICT to ensure security measures are integrated into all aspects of the organization’s operations;
- User Support: Provide technical support and guidance to users regarding security practices and incident response procedures;
- Monthly Reporting: Prepare regular reports on security status, incidents, and compliance for senior management and regulatory bodies.
- Minimum: Bachelor’s degree in information technology, Computer Science, Information Systems, Cybersecurity, or a related field.
- Ideal: CompTIA's Security, CISSP or equivalent
- Minimum of 3-5 years of experience in IT security, with specific experience in the administration of firewalls, VPNs, and SIEM systems;
- Hands-on experience with firewalls, EDRs, email security, security awareness training, vulnerability management and AD security.
- Experience in cloud security and vulnerability management is essential.
Technical Security Analyst
Posted 4 days ago
Job Viewed
Job Description
Job Title: Technical Security Analyst
Reports To: Associate Director, Security
Employment Type: Full-Time, Permanent, remote position in South Africa only
As a Technical Security Analyst at Netstock, you will be at the frontline of defending our digital environment by identifying, analyzing, and responding to cyber threats with precision and context. You’ll leverage your expertise in forensic analysis, vulnerability assessment, and threat intelligence to investigate incidents, interpret complex server logs, and assess the true business impact of vulnerabilities. This role is ideal for a technically skilled professional who understands risk and thrives in high stakes scenarios.
You’ll work closely with cross-functional teams, including engineering, compliance, and IT to ensure that security incidents are swiftly contained, vulnerabilities are correctly prioritized, and risks are well-communicated. Your ability to see the bigger picture while navigating the technical details will directly strengthen our security posture.
From interpreting CVEs to leading incident reviews, your input will shape how we protect our infrastructure and our customers. If you’re passionate about forensics, threat response, and building resilient systems in a modern, cloud-based environment, we’d love to hear from you!
Responsible for conducting forensic evidence gathering during security incidents, interpreting system and application logs, and identifying indicators of compromise. This role requires a strong foundation in cybersecurity principles, familiarity with server environments, and hands-on experience with vulnerability and threat analysis.
Responsibilities
- Collect and preserve forensic evidence from servers, endpoints, and cloud environments in a forensically sound manner
- Access, read, and interpret server logs, audit trails, and system data to support investigations
- Analyze logs for suspicious activity, privilege escalations, lateral movement, and known attack signatures
- Support segregation of duties analysis and remediation
- Analyze the technical and business impact of identified vulnerabilities or attack vectors using threat intelligence and risk management principles
- Evaluate the likelihood and potential consequence of exploitation, and provide context-based risk ratings and mitigation recommendations
- Collaborate with DevOps, Dev, IT and Security teams during incident response, ensuring proper containment and root cause analysis
- Maintain awareness of emerging vulnerabilities, actively working with CVEs and threat intelligence to assess risk
- Provide post-incident reporting with detailed timelines, evidence, and mitigation recommendations
- Ensure forensic/investigation activities align with legal, regulatory, and organizational standards (e.g., ISO 27001, NIST, GDPR)
- Vulnerability Management - Track patching and configuration compliance across systems
- Proactively search for signs of compromise using hypothesis-based techniques
- Use threat intelligence feeds and TTPs (Tactics, Techniques, and Procedures) to identify abnormal patterns
- Build and refine detection logic based on observed environment behavior
- Create custom log correlation rules and detection use cases
- Review server, database, and application configurations for security misconfigurations
- Assist with internal or third-party penetration testing exercises
- Validate reported vulnerabilities and test exploitability in controlled environments
- Help develop realistic tabletop scenarios and user training content
Required Skills and Qualifications
- Proficiency in forensic tools and techniques
- Generalist understanding of server infrastructure, system privileges, and core security concepts
- Ability to parse and correlate various log formats (syslog, Windows Event Logs, cloud audit logs, etc.)
- Proficient in reviewing and interpreting log data across different platforms (Windows, Linux, cloud, network appliances)
- Experience with CVE tracking, vulnerability scanners, and mitigation workflows
- Familiarity with standards such as ISO 27001 and common infosec frameworks
- Solid grasp of risk management principles (likelihood vs. impact, asset value, threat actor profiling, etc.)
- Experience assessing the business relevance of technical vulnerabilities and translating findings for stakeholders
Preferred Skills and Qualifications
- Hands-on incident response or blue team roles
- Exposure to SIEM platforms
- Understanding of chain-of-custody and legal considerations in evidence handling
- Experience in environments with regulatory requirements
- Familiarity with common services: SSH, DNS, HTTP(S), SMB, RDP
- IDS/IPS knowledge
- Ability to track vulnerabilities through to remediation
- Exposure to ISO 27001, NIST CSF, CIS Controls, MITRE ATT&CK
- Ability to perform hypothesis-driven hunts and pivot off findings
- Knowledge of cloud platforms: AWS, Linode, Hetzner
- Understanding of the CIA triad (Confidentiality, Integrity, Availability)
This position is subject to pre-employment screening, however candidates will not be unfairly discriminated against.
We receive a high number of applications per role and therefore ONLY successful applicants will be contacted.
This role is open to residents of the Republic of South Africa. Although we may consider candidates with permanent residency, preference will be given to citizens of the Republic of South Africa.
Working with us
Netstock was founded with a clear vision: To give the hungry up-and-comers the capability to level the playing field and compete with the industry giants. Working here means embracing that “challenger” mentality: We are smart, scrappy fighters, building our edge with the agility to move faster than the big guys — pioneering smarter ways to work and innovating new ways to deliver powerfully easy to use technologies for our customers.
About us
Netstock is the driving force accelerating the growth of organizations worldwide. Over the last 15 years, we’ve built out a regional presence that gives us deep insights into supply chain planning factors in each industry. We continue to enhance our supply chain planning solutions, making our predictive engine smarter, accelerating automation, and adding sophisticated new capabilities such as AI and machine learning.
You can read more about Netstock’s history and our product offering at Netstock
#J-18808-LjbffrPhysical Security Analyst
Posted 7 days ago
Job Viewed
Job Description
Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company
Join to apply for the Physical Security Analyst role at Teraco – A Digital Realty Company
Teraco Data Environments
2025/07/24 Gauteng
Job Reference Number: PSA_JB3
Department: Security
Business Unit
Industry: Information Technology
Job Type: Permanent
Positions Available: 1
Salary: Market Related
This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting.
Job Description
PURPOSE OF THE ROLE
This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.
Main Functions Of The Job
- Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
- Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
- Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
- Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
- Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
- Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
- Logging and updating calls via the ticketing system.
- Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
- Client specific monthly reporting.
- ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
- The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
- System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
- Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
- Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
- Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
- Adherence to standard operating procedures and to IT security governance and policies.
- Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
- Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
- Ad-hoc duties.
- Review & validation of new/old, mapped camera’s according to security risk reviews.
Skills Requirement
- Excellent written and verbal communication skills.
- Active listening – ability to understand requirements
- Ability to communicate in English
- Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
- Good prioritization and organization skills.
- Attention to detail and accuracy
- Proactive problem solver
- Ability to work independently & a positive team player
- Self-motivated
- Conducts self professionally, exhibits high levels of tolerance and patience
- Responsible for continued learning and self-development
- All activities performed on time
- Ability to write reports, business correspondence, and procedures
- Matric
- Experience in Vendor Management and related SLA’s
- Previous experience in supporting a VMS system or IP camera network (Advantageous)
- Driver’s license and own car essential
- IT Diploma/Certificate or equivalent NQF Level 6
- 4 years’ experience in process or document administration in a technical environment
- A+
- N+
- Microsoft Excel
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Finance and Sales
- Industries Facilities Services
Referrals increase your chances of interviewing at Teraco – A Digital Realty Company by 2x
Get notified about new Investment Analyst jobs in Gauteng, South Africa .
Johannesburg Metropolitan Area 1 week ago
Johannesburg, Gauteng, South Africa 5 days ago
Johannesburg, Gauteng, South Africa 6 days ago
Johannesburg, Gauteng, South Africa 6 days ago
Talent Pool: Investment Consultant (Johannesburg) MMH Talent Pool: Investment Consultant (Johannesburg)Pretoria, Gauteng, South Africa 1 day ago
Johannesburg, Gauteng, South Africa 1 week ago
Pretoria, Gauteng, South Africa 2 weeks ago
Centurion, Gauteng, South Africa 3 months ago
Talent Pool: Investment Regional Manager - Countrywide MMHCenturion, Gauteng, South Africa 4 months ago
Johannesburg, Gauteng, South Africa 1 day ago
Talent Pool: Investment Regional Manager - Countrywide MMHCenturion, Gauteng, South Africa 2 days ago
Pretoria, Gauteng, South Africa 2 weeks ago
Johannesburg, Gauteng, South Africa 1 month ago
Senior Lecturer (College of Business & Economics: Department of Finance & Investment Management) Intermediate Business Analyst – Become Senior Business Analyst working for SA’s leading wealth manager – Johannesburg – R650K PACity of Johannesburg, Gauteng, South Africa 15 hours ago
Springs, Gauteng, South Africa 4 days ago
Senior Business Analyst | Waterfall, Gauteng | PermanentJohannesburg, Gauteng, South Africa 5 days ago
Centurion, Gauteng, South Africa 20 hours ago
Johannesburg, Gauteng, South Africa ZAR60,000.00-ZAR72,000.00 1 month ago
Centurion, Gauteng, South Africa 20 hours ago
Johannesburg, Gauteng, South Africa 5 days ago
SPECIALIST ANALYST INVESTMENT PROVIDERS DEPARTMENTSandton, Gauteng, South Africa 1 month ago
Johannesburg, Gauteng, South Africa 2 months ago
Johannesburg, Gauteng, South Africa 1 week ago
Johannesburg, Gauteng, South Africa 4 days ago
Business Analyst – Design investment management platform features for SA’s leading wealth manager – Johannesburg – R810K PAJohannesburg Metropolitan Area 15 hours ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrOffensive Security Analyst
Posted 22 days ago
Job Viewed
Job Description
S-RM Cape Town, Western Cape, South Africa
Join or sign in to find your next jobJoin to apply for the Offensive Security Analyst role at S-RM
S-RM Cape Town, Western Cape, South Africa
Join to apply for the Offensive Security Analyst role at S-RM
Offensive Security Analysts support our delivery consultants running our offensive security services. They help to interpret client challenges, innovate solutions, and deliver findings. Our aim is to become trusted advisors to our clients.
You will work across the full spectrum of our pentesting services, whether point in time or continuous, as well as participate in larger engagements such as red teams. You will help our clients to build cyber resilience, enhance their understanding of the threat landscape and become better prepared to face dynamic and evolving security risks.
1.1 Main Duties And Responsibilities
Client Engagement and Account Management
- Engage with clients to understand their cyber security challenges
- Translate client challenges into solutions that fit S-RM's Offensive Security service offering and value proposition
- Develop an understanding of delivery timelines, project resourcing requirements and pricing
- Understand S-RM's proposal process and lead on proposal writing and presentations in some cases
- Contribute to the expansion of client accounts and winning of new business
- Gain an understanding of S-RM's target sectors and industries
- Penetration testing
- Vulnerability assessments and monitoring
- External infrastructure
- External Attack Surface Management
- Web application
- API pentesting
- Phishing and spear phishing
- Internal pentesting
- Mobile application pentesting (Android and iOS)
- OT Pentesting
- IOT Pentesting
- Cloud Pentesting
- Open-Source Intelligence (OSINT) gathering
- Configuration Reviews
- Cloud configuration review
- Application configuration review
- Hardware build review
- Firewall review
- Delivery & Client communications
- Deliver findings in a range of formats, including written reports, presentations, and verbal briefings
- Threat Intelligence
- Keep abreast of threat intelligence developments, threat actor activity and security industry developments in mitigations and tooling
- Develop and deliver client threat profiles, threat assessments and dark web analysis
- Support vCISO engagements, accessing the full range of S-RM's resources and expertise
- Collaborate with incident response, ethical hacking, and digital forensics teams to integrate our services and support to clients
- Support the delivery of retainer relationships
- Support the delivery of the Attack Surface Management (ASM) service
- Support internal initiatives on product development, process management, tech enablement, efficiency and exploring different ways to support clients
- Contribute to the adaption of security frameworks to create innovative products
- Challenge received wisdom and existing products and services. Suggest alternative approaches where appropriate
- Develop documentation and evolve the testing methodologies where applicable
- Commit to continuous professional development and personal knowledge improvement across the full range of cyber security competencies, in line with personal utilisation targets (see Objectives)
- Complete up to one formal training course over the financial year. This is beyond internal training sessions
- Share knowledge with the wider team in line with company values, including contributing to internal training initiatives and programmes
- Seniority level Entry level
- Employment type Full-time
- Job function Information Technology
- Industries Security and Investigations
Referrals increase your chances of interviewing at S-RM by 2x
Sign in to set job alerts for “Security Analyst” roles.Cape Town, Western Cape, South Africa 3 weeks ago
Cape Town, Western Cape, South Africa 1 week ago
City of Cape Town, Western Cape, South Africa 1 week ago
Cape Town, Western Cape, South Africa 1 day ago
City of Cape Town, Western Cape, South Africa 5 days ago
Business Intelligence Business Analyst III (BIBA III)Cape Town, Western Cape, South Africa 1 month ago
Cape Town, Western Cape, South Africa ZAR450,000.00-ZAR700,000.00 1 month ago
Cape Town, Western Cape, South Africa 1 week ago
Cape Town, Western Cape, South Africa 2 weeks ago
Cape Town, Western Cape, South Africa 4 months ago
Cape Town, Western Cape, South Africa 2 weeks ago
L2 Security Operations Centre (SOC) AnalystCape Town, Western Cape, South Africa 6 days ago
Cape Town, Western Cape, South Africa 1 week ago
Cape Town, Western Cape, South Africa 1 week ago
City of Cape Town, Western Cape, South Africa 5 days ago
Cape Town, Western Cape, South Africa 5 days ago
City of Cape Town, Western Cape, South Africa 2 weeks ago
Cape Town, Western Cape, South Africa 6 days ago
Cape Town, Western Cape, South Africa 3 months ago
Cape Town, Western Cape, South Africa 3 weeks ago
Linux Cryptography and Security EngineerCape Town, Western Cape, South Africa 1 month ago
Cape Town, Western Cape, South Africa 3 months ago
Stellenbosch, Western Cape, South Africa 1 day ago
Cape Town, Western Cape, South Africa 3 months ago
MS Sentinel SIEM Security Engineer (South Africa)Cape Town, Western Cape, South Africa 1 week ago
Cape Town, Western Cape, South Africa 3 days ago
Stellenbosch, Western Cape, South Africa 1 day ago
City of Cape Town, Western Cape, South Africa 5 days ago
Cape Town, Western Cape, South Africa 5 days ago
Security Operations Engineer – Identify and Access Management (IAM) SpecialistCape Town, Western Cape, South Africa 1 week ago
Senior/Staff Application Security Analyst (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 1 week ago
Senior/Staff Application Security Analyst (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 1 week ago
Senior/Staff Application Security Engineer (Bangkok based, relocation provided)Cape Town, Western Cape, South Africa 1 week ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrTechnical Security Analyst
Posted today
Job Viewed
Job Description
Be The First To Know
About the latest Security analyst Jobs in South Africa !
Ict security analyst
Posted today
Job Viewed
Job Description
Physical Security Analyst
Posted 14 days ago
Job Viewed
Job Description
PURPOSE OF THE ROLE
This role is an administrative role. The Physical Security Analyst will be responsible for performing the day-to-day operations, management and administration of the physical security access control and CCTV system, keeping track of physical assets and client reporting. The role is responsible for tracking and ensuring closure of security vulnerabilities, management and closure of tickets within SLA, and updating policies and procedures to improve security posture.
MAIN FUNCTIONS OF THE JOB
- Action physical access request tickets to the Access Control System in line with Teraco policies. This requires a high degree of attention to detail, and compliance to policies.
- Track and allocate tickets to team members for action. Ensure tickets are addressed within required timelines.
- Analyze logs and data sets from various sources to formulate reporting for internal usage e.g. data integrity assessments etc.
- Analyze logs and data sets from various sources to formulate reporting for Teraco clients.
- Track percentage of data integrity issues successfully verified & closed within the specified timeframe.
- Ensure scheduled checks, calibrations, and inspections (CCTV, access control, metal detectors, perimeter fences) are completed on time.
- Logging and updating calls via the ticketing system.
- Driving closure and tracking progress to ensure timely remediation for incident Management specific to security systems.
- Client specific monthly reporting.
- ISO 27001, PCI, ISAE 3402 Type II compliance, monitoring and reporting, as it relates to supported systems.
- The use of vulnerability management for IoT and OT devices using third-party tools, including identification, assessment, and remediation tracking by logging of tickets for action by team members and ensuring tasks are closed timeously.
- System Uptime: Validation of percentage of time that all security systems (CCTV, access control, metal detectors) are operational and functional by leveraging data sets provided from various sources.
- Escalate and track calls that require the attention of the IT team by utilizing the correct escalations channels
- Document security administration procedures, implement the procedures as agreed and ensure evidence in respect of procedures is retained as per documented.
- Liaising with vendors for replacement stock or spares for maintenance & maintain critical stock levels.
- Adherence to standard operating procedures and to IT security governance and policies.
- Take initiative in consultation with Security Systems Manager to improve IT security and better fulfil the needs of the user-base.
- Validation of handover documentation for the testing of new installations for both standard and non-standard projects.
- Ad-hoc duties.
- Review & validation of new/old, mapped camera’s according to security risk reviews.
SKILLS REQUIREMENT
- Excellent written and verbal communication skills.
- Active listening – ability to understand requirements li>Ability to communicate in English
- Diligent: Even when it becomes a hassle must be willing to see an issue through to resolution.
- Good prioritization and organization skills.
- Attention to detail and accuracy
- Proactive problem solver
- Ability to work independently & a positive team player
- Self-motivated
- Conducts self professionally, exhibits high levels of tolerance and patience
- Responsible for continued learning and self-development
- All activities performed on time
- Ability to write reports, business correspondence, and procedures
QUALIFICATIONS AND EXPERIENCE
- Matric
- Experience in Vendor Management and related SLA’s li>Previous experience in supporting a VMS system or IP camera network (Advantageous)
- Driver’s license and own car essential li>IT Diploma/Certificate or equivalent NQF Level 6
- 4 years’ experience in process or document administration in a technical environment li>A+
- N+
- Microsoft Excel
It Security Analyst Umhlanga
Posted today
Job Viewed
Job Description
Are you ready to take the lead in transforming cybersecurity landscapes and safeguarding digital frontiers? Our esteemed BPO firm is on the hunt for a dynamic and skilled IT Senior Security Analyst to join our vibrant team in Durban. This pivotal role is at the heart of our security operations, offering the chance to shape security architecture, deploy cutting-edge technologies, and spearhead our cyber defense initiatives.
Duties & Responsibilities- Practical planning and implementation of effective cyber defense and detection technologies.
- Work with IT Ops on identified systems vulnerabilities to seek long-term solutions.
- Formulate and evolve document standards through the use of known best practices.
- Improved documentation aligned to industry best practices.
- Enhanced reporting with clear data-driven results for use during security assessments, incident analysis, and root cause investigations.
- Lead remediation recommendations and ensure incident closure and compliance.
- Review and enhance evidence collection of all security incidents for reporting, compliance, and improvement purposes.
- Monitor networks and connected devices for security issues.
- Proactively respond to and report on DLP, IPS/IDS, ATP, APT detection, help devise remediation actions and improvement plans.
- Track and help manage remediation efforts ensuring a mature document trail.
- Use formal and agreed processes, methods, and standards to address incident management in a mature manner, ensuring effective remediation, business impact, and root cause analysis.
- Investigate all cyber security incidents.
- Aid in the documentation of security breaches and provide remediation recommendations.
- Assess security incidents and measure organizational impact.
- Ensure and improve the organization’s IT Security and regulatory compliance.
- Development and implementation of effective “first-line of defense” protection solutions.
- Implement and report against scheduled sensitive data discovery.
- Stay current on IT security trends and news (Trusted 3rd Party Notifications).
- Research security enhancements and make recommendations to management.
- Perform cyber security protection and detection systems design, deployment, and enhancement.
- Relevant IT Security certification or equivalent.
- Minimum 5 years’ experience in IT systems engineering.
- Minimum 3 years’ experience in IT security incident response.
- Experience with computer network vulnerability testing tools and techniques.
- Experience with vulnerability remediation in and across various technologies.
- Good understanding of firewalls, proxies, SIEM, AV, and IDS/IPS concepts.
- Understanding of Wireless network security and protection mechanisms.
- Understanding of cyber security centric documentation and evidence collection.
- Experience with industry standard InfoSec tools and techniques i.e. O365 Security Centre, Mimecast, Qualys, AV, SIEM’s, Qualys and Nessus, unstructured data scanning, rogue detection, etc.
- Pentest experience and exposure.