79 Threat Analyst jobs in South Africa

Threat Response Analyst

Johannesburg, Gauteng Mimecast

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Mimecast Johannesburg, Gauteng, South AfricaAs a Threat Response Analyst you will be joining the Mimecast Messaging Security organization and be responsible for supporting a service for on-demand threat resolution.

The service is designed to provide customers with prompt feedback and intelligence on email-borne threats, remediate these threats from their email environment to reduce dwell time, and put the appropriate detections in place to prevent further incidents from occurring.

The role may require working afternoon / evening shifts and being part of a rotation for holiday support.Messaging Security ensures that our security-focused solutions are performing accurately and efficiently.

We verify that Mimecast can detect the latest email-borne threats amidst a rapidly evolving threat landscape.

Through threat research and customer feedback we identify where Mimecast can be improved and update detection at our spam, URL, and attachment security layers.

We strive for proactive, rather than reactive, approaches to threat detection.The team is also responsible for assuring that Mimecast maintains an exceptional sending reputation by looking for compromised email addresses and senders following poor mailing practice.Messaging Security works closely with research and development, as well as customer support.

We are a global team that spans three continents.What You'll DoAnalyze phishing / malicious email campaigns to identify IOC'sCategorize email threats and determining the best means of updating detectionProvide email security advice, expertise, and remediation to our customersUnderstand security policies within the Mimecast Administration Console and providing configuration suggestions to customersResearch and investigate the latest security threats and their potential impact to Mimecast customersWork with security vendors around threat detection techniques and remediationIdentifying opportunities for improved processes and systemsWhat You'll BringWorking knowledge of messaging (email traffic management) and routingExperience and understanding of email security technologiesStrong understanding of Domain Name System (DNS)Strong understanding of SMTP, SSL / TLS, POP3, IMAP, TCP / IPAbility to translate complex technical capabilities into management-friendly responsesCuriosity about the infrastructure of phishing / malicious email campaigns1+ years' experience working with the Mimecast platform2+ years' experience working in a Security Operation Center (SOC)Experience working with email / malware detection and blocking techniquesExperience working with threat intelligence platformsExperience working within SaaS environmentsWhat We BringJoin our Messaging Security team to accelerate your career journey, working with cutting-edge technologies and contributing to projects that have real customer impact.

You will be immersed in a dynamic environment that recognizes and celebrates your achievements.Mimecast is on a path of steady and healthy growth as a company, investing in people like you who bring the skills and expertise to raise our technical expertise, operational maturity, and customer success to the next level.

Your contributions are important!

Every voice and action matters.Mimecast offers formal and on-the-job learning opportunities, maintains a comprehensive benefits package that helps our employees and their family members to sustain a healthy lifestyle, and importantly – opportunities to work with cross-functional teams to build your knowledge!Our Hybrid Model : We provide you with the flexibility to live balanced, healthy lives through our hybrid working model that champions both collaborative teamwork and individual flexibility.

Employees are expected to come to the office at least two days per week, because working together in person : Fosters a culture of collaboration, communication, performance, and learning.Drives innovation and creativity within and between teamsIntroduces employees to priorities outside of their immediate realm.Ensures important interpersonal relationships and connections with one another and our community!DEI StatementCybersecurity is a community effort.

That's why we're committed to building an inclusive, diverse community that celebrates and welcomes everyone – unless they're a cybercriminal, of course.We're proud to be an Equal Opportunity and Affirmative Action Employer, and we'd encourage you to join us whatever your background.

We particularly welcome applicants from traditionally underrepresented groups.We consider everyone equally : your race, age, religion, sexual orientation, gender identity, ability, marital status, nationality, or any other protected characteristic won't affect your application.Due to certain obligations to our customers, an offer of employment will be subject to your successful completion of applicable background checks, conducted in accordance with local law.Seniority levelSeniority levelNot ApplicableEmployment typeEmployment typeFull-timeJob functionJob functionInformation TechnologyIndustriesIT Services and IT Consulting, Software Development, and Computer and Network SecurityReferrals increase your chances of interviewing at Mimecast by 2xJohannesburg, Gauteng, South Africa 1 week agoJunior Security Operations Center Analyst (JHB)Johannesburg Metropolitan Area 1 week agoMidrand, Gauteng, South Africa 3 weeks agoJohannesburg, Gauteng, South Africa 1 week agoJohannesburg, Gauteng, South Africa 3 days agoSenior Team Lead : Cyber Security Operations – Identity Governance and AdministrationJohannesburg, Gauteng, South Africa 3 days agoSecurity Operations Engineer – Identify and Access Management (IAM) SpecialistJohannesburg, Gauteng, South Africa 7 hours agoJohannesburg, Gauteng, South Africa 3 days agoSenior Team Lead : Cyber Security Operations – Endpoint SecurityJohannesburg, Gauteng, South Africa ZAR, - ZAR, 3 months agoJohannesburg, Gauteng, South Africa 1 week agoBusiness Development Executive - Managed IT Services and CybersecurityJohannesburg, Gauteng, South Africa 3 months agoWe're unlocking community knowledge in a new way.

Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Junior Threat Intelligence Analyst

Johannesburg, Gauteng M-Kopa-Solar

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

M-KOPA's Threat Intelligence team sits within the Security department and identifies and assesses threats against our products, business and personnel. The team has taken a unique approach to Threat Intelligence by developing a custom analysis platform instead of depending on standard tools — Recorded Futures. By consuming several intelligence sources, we aim to provide minute-by-minute information to our Fraud, Application Security and Managerial teams using Azure Microservices. Your role is acting as a developer, primarily Python, for the Threat Intelligence team with elements of Threat Hunting in the mix. It's not only about building automated tools to scour the Internet but also about identifying new threats to monitor. It is a fully Remote role within the following time zone (UTC -1 / UTC+3), and you will report to the Senior Threat Intelligence Researcher. Additionally, you will work closely with the Application Security and Global Fraud teams to develop intelligence-gathering systems to distribute significant findings appropriately.

You're excited about this opportunity because;

  • You will create, build and enhance a bespoke Threat Intelligence platform, exceeding the capabilities of 99% of Threat Intelligence teams.
  • You will identify new threats against M-KOPA, our products and our employees.
  • You will get to learn about development best practices, Continuous Integration and Continuous Development processes.
  • You will become familiar with the latest hardware hacking, web applications hacking and malware attacks.
  • You will receive and analyze cyber threat alerts from various sources and communicate them to the appropriate team members.
  • You will perform cyber defense trend analysis, assist team members with determining their cybersecurity requirements, and establish reporting mechanisms.
  • You will develop and deliver written and oral mobile threat alerts, scheduled internal notifications, case studies, and after-action reports to several stakeholders.
  • You will coordinate and communicate across multiple stakeholder groups.
  • You will monitor external data sources to maintain an up-to-date understanding of cyber actors and threats and provide recommendations on prioritizing cyber threats and prevention / mitigation measures.
  • You will review and evaluate incoming intelligence reports, information, collection plans, and programs.

We're excited about you because you have experience with;

  • Moderate experience writing Python programs or knowledge of Python development.
  • Any experience with Microsoft Azure or cloud microservice architectures.
  • Some familiarity with modern development practices, Continuous Integration and Continuous Development.
  • Ability to read Zulu to a proficient level.
  • Any knowledge of Threat Intelligence principles.
  • Windows and Linux command line knowledge.

Benefits - What's in it for you!

  • You will be involved, and participate in, our Application and Information Security Red Teaming operations.
  • Have the opportunity to travel internationally to attend conferences and training courses.
  • Annual Learning and Development Fund - You have an annual $1,200 allowance to spend on learning and development (that is, between 1 January and 31 December). For your first year at M-KOPA, this allowance is pro-rated depending on the month that you start.
  • Home Office Set Up - Having the best IT equipment tools in the world doesn't make sense if you do not have a proper setup to work with. For this reason, M-KOPA will pre-approve the following items for a total budget of $1,000 that you can use at any time after signing the offer letter with M-KOPA.
  • On site retreats with wider tech team, plus trips to operational markets.

M-KOPA is an equal opportunity and affirmative action employer committed to assembling a diverse, broadly trained staff. Women, minorities, and people with disabilities are strongly encouraged to apply. M-KOPA explicitly prohibits the use of Forced or Child Labour and respects the rights of its employees to agree to terms and conditions of employment voluntarily, without coercion, and freely terminate their employment on appropriate notice. M-KOPA shall ensure that its Employees are of legal working age and shall comply with local laws for youth employment or student work, such as internships or apprenticeships. M-KOPA does not collect / charge any money as a pre-employment or post-employment requirement. This means that we never ask for ‘recruitment fees’, ‘processing fees’, ‘interview fees’, or any other kind of money in exchange for offer letters or interviews at any time during the hiring process.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Vulnerability Analyst

Cape Town, Western Cape DigiOutsource

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Cybersecurity Vulnerability Analyst role at DigiOutsource

Join to apply for the Cybersecurity Vulnerability Analyst role at DigiOutsource

Kick-start your career in the online gaming world and experience the very latest in technology and innovation.

Who We Are

We’re part of Super Group, the NYSE-listed digital gaming company behind some of the world’s leading Sports and iGaming brands.

At DigiOutsource, we bring passionate people and innovative tech together to create market-leading online gaming solutions. Our multidisciplinary teams are passionate about products, customer experience and security. We’re empowered to achieve the ultimate in high-performance gaming experiences using the best technology available.

Who We’re Looking For

We’re on a thrilling journey of growth and innovation, and we need passionate, driven individuals to join us. At DigiOutsource, every day is action-packed, and we expect you to bring your A-game. In return, you’ll find a supportive environment where your skills can flourish and your career can soar.

Ready to become a game-changer? Supercharge your career with us and be part of something extraordinary.

Why we need you

We’re on a mission to create extraordinary experiences for our customers, and we believe that your unique skills, passion and superdrive will help us achieve our vision.

As a Vulnerability Management Analyst, you’ll be supporting the delivery of repeatable, automated and scalable vulnerability management systems and processes, covering windows, linux, 3rd party software and cloud services. This will help us excel by keeping systems modern and secure to stay ahead of the game.

What You’ll Be Doing

As part of your role, your responsibilities will include:

  • Identify, assess and prioritize resolution of vulnerabilities based on risk and known exploits
  • Design, implement and maintain robust automated vulnerability detection and remediation processes, including ensuring required scheduled network and system scans are run.
  • Review current security controls and compensating mitigation controls for vulnerabilities
  • Maintain detailed plans and documentation on vulnerabilities and remediation schedules
  • Generate and deliver comprehensive monthly vulnerability management reports, providing insights into risk exposure, remediation progress, and trends. These reports will highlight critical vulnerabilities, compliance status, and risk prioritization to support informed decision-making by key stakeholders
  • Ensure adherence to regulations including ISO27001:2022 and Sarbanes-Oxley
  • Keep up to date with the latest Tactics, Techniques and procedures and associated risks and attack vectors
  • Effective collaboration with technology teams to resolve identified vulnerabilities
  • Managing a Configuration Management Database (CMDB) to ensure accurate system inventory and asset relationships, correlating vulnerabilities to affected systems, and collaborating with internal teams to remediate security risks.

This job description is not intended to be an exhaustive list of responsibilities. You may be required to complete other reasonable duties in order to achieve business objectives.

Essential Skills You’ll Bring To The Table

The necessary skills that we require for this role include:

  • Strong verbal and written communication skills, with the ability to convey complex ideas clearly and effectively
  • Experience working collaboratively in cross-functional teams, with a focus on achieving shared goals
  • Expertise in managing multiple projects simultaneously, with a track record of delivering on time and within scope
  • Exceptional attention to detail, ensuring high standards of quality in all outputs
  • Ability to adapt quickly to changing environments and priorities, maintaining effectiveness in dynamic situations
  • CompTia Security+ Certification or other equivalent certificates
  • Experience implementing and operating vulnerability scanning solutions, such as Nessus or Qualys
  • Experience with Microsoft XDR, Microsoft Endpoint Manager and other Microsoft cloud technologies.
  • Experience with Automation using Terraform and Ansible
  • Strong understanding of operating systems, including Windows, Linux and MacOS

Desirable Skills You’ve Got Up Your Sleeve

It would be great if you also have some of the following skills:

  • Microsoft SC-200 Certification
  • Familiarity in using Kusto query language
  • Scripting languages such as PowerShell and Bash
  • Strong planning and organizing skills
  • Self-motivated and results-oriented
  • Curiosity and a continued learning mentality
  • Passion for automation and modernization

Our values are non-negotiables

Our culture is underpinned by core values that are linked to key behavioural competencies. Along with the below behavioural competencies, these are essential for all employees in order for you to embed in and drive our culture forward.

These Competencies Are

  • Adaptability
  • Ownership and accountability
  • Initiating action
  • Resilience
  • Team orientation
  • Integrity
  • Innovation

What You’ll Get Back

We offer a great variety of personal and professional benefits to help you thrive at DigiOutsource and Super Group. This includes:

  • We’re dedicated to your supergrowth. Our comprehensive learning and development programmes give you a range of resources and opportunities to expand your skills and advance your career.
  • Your hard work and achievements won’t go unnoticed. Our innovative Performance Tool ensures you receive regular, constructive feedback, helping you to continuously improve and reach your full potential.
  • Our Employee Assistance programme offers a variety of benefits which you and your family can benefit from.
  • Free Daily Meal
  • Free Massages On-site
  • Free On-Site Gym
  • Group Life Cover
  • Funeral Fund Benefit
  • Financial Services Assistance
  • Curro School Fees Benefit
  • Income Continuation Benefit
  • Leadership Training
  • Referral Bonus
  • Medical Aid Subsidy
  • Free Sleep Coaching
  • On-site Barista
  • Retirement Annuity Subsidy
  • Team socials

Be part of that Superclass feeling.

At Super Group, diversity is part of our DNA. With teams across 16 countries, 85 nationalities, and 20 languages, we take equal opportunities seriously, championing a supportive, inclusive and empowering environment wherever you are in the Group.

It’s all about putting your experience first and ensuring honesty and fairness in all we do.

Here, your growth is supported and your contributions valued.

Game on!

  • Please note we will apply relevance to our Talent Management and Talent Development Programme as part of our recruitment process.
  • Shortlisted candidates may need to complete an assessment.

This position requires trust and honesty it has access to customers financial details - therefore a credit and criminal record check will be conducted. The qualifications identified herein are an inherent job requirement; therefore, a qualification verification check will be done. By applying for this role, and supplying the necessary details, you hereby grant us permission to apply for these checks. This will be done in a confidential manner, and solely for the purposes of verification.

Should you not hear from us within 2 weeks, please deem your application as unsuccessful.

The perfect place to work, play and grow!

Seniority level
  • Seniority level Entry level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries IT Services and IT Consulting, Software Development, and Retail

Referrals increase your chances of interviewing at DigiOutsource by 2x

Get notified about new Cyber Security Analyst jobs in Cape Town, Western Cape, South Africa .

City of Cape Town, Western Cape, South Africa 4 days ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 2 weeks ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 months ago

Cape Town, Western Cape, South Africa 5 months ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 6 months ago

Cape Town, Western Cape, South Africa 1 day ago

L2 Security Operations Centre (SOC) Analyst

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 4 days ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 1 week ago

MS Sentinel SIEM Security Engineer (South Africa)

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 days ago

Cape Town, Western Cape, South Africa 2 weeks ago

Cape Town, Western Cape, South Africa 6 days ago

Cape Town, Western Cape, South Africa 5 months ago

Cape Town, Western Cape, South Africa 2 hours ago

Linux Cryptography and Security Engineer

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 2 days ago

Cape Town, Western Cape, South Africa 5 months ago

City of Cape Town, Western Cape, South Africa 4 days ago

Platform Vulnerability & Patch Management Engineer

City of Cape Town, Western Cape, South Africa 2 days ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 4 days ago

Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 1 week ago

City of Cape Town, Western Cape, South Africa 1 week ago

Cape Town, Western Cape, South Africa 4 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Vulnerability Analyst

Western Cape, Western Cape Digital Outsource Services

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Cybersecurity Vulnerability Analyst page is loadedCybersecurity Vulnerability Analyst Apply remote type Hybrid locations Cape Town time type Full time posted on Posted Yesterday job requisition id JR10573

Kick-start your career in the online gaming world and experience the very latest in technology and innovation.

Who we are

We’re part of Super Group, the NYSE-listed digital gaming company behind some of the world’s leading Sports and iGaming brands.

At DigiOutsource, we bring passionate people and innovative tech together to create market-leading online gaming solutions. Our multidisciplinary teams are passionate about products, customer experience and security. We’re empowered to achieve the ultimate in high-performance gaming experiences using the best technology available.

Who we’re looking for

We’re on a thrilling journey of growth and innovation, and we need passionate, driven individuals to join us. At DigiOutsource, every day is action-packed, and we expect you to bring your A-game. In return, you’ll find a supportive environment where your skills can flourish and your career can soar.

Ready to become a game-changer? Supercharge your career with us and be part of something extraordinary.

Why we need you

We’re on a mission to create extraordinary experiences for our customers, and we believe that your unique skills, passion and superdrive will help us achieve our vision.

As a Vulnerability Management Analyst, you’ll be supporting the delivery of repeatable, automated and scalable vulnerability management systems and processes, covering windows, linux, 3rd party software and cloud services. This will help us excel by keeping systems modern and secure to stay ahead of the game.

What you’ll be doing

As part of your role, your responsibilities will include:

  • Identify, assess and prioritize resolution of vulnerabilities based on risk and known exploits
  • Design, implement and maintain robust automated vulnerability detection and remediation processes, including ensuring required scheduled network and system scans are run.
  • Review current security controls and compensating mitigation controls for vulnerabilities
  • Maintain detailed plans and documentation on vulnerabilities and remediation schedules
  • Generate and deliver comprehensive monthly vulnerability management reports, providing insights into risk exposure, remediation progress, and trends. These reports will highlight critical vulnerabilities, compliance status, and risk prioritization to support informed decision-making by key stakeholders
  • Ensure adherence to regulations including ISO27001:2022 and Sarbanes-Oxley
  • Keep up to date with the latest Tactics, Techniques and procedures and associated risks and attack vectors
  • Effective collaboration with technology teams to resolve identified vulnerabilities
  • Managing a Configuration Management Database (CMDB) to ensure accurate system inventory and asset relationships, correlating vulnerabilities to affected systems, and collaborating with internal teams to remediate security risks.

This job description is not intended to be an exhaustive list of responsibilities. You may be required to complete other reasonable duties in order to achieve business objectives.

Essential skills you’ll bring to the table

The necessary skills that we require for this role include:

  • Strong verbal and written communication skills, with the ability to convey complex ideas clearly and effectively
  • Experience working collaboratively in cross-functional teams, with a focus on achieving shared goals
  • Expertise in managing multiple projects simultaneously, with a track record of delivering on time and within scope
  • Exceptional attention to detail, ensuring high standards of quality in all outputs
  • Ability to adapt quickly to changing environments and priorities, maintaining effectiveness in dynamic situations
  • CompTia Security+ Certification or other equivalent certificates
  • Experience implementing and operating vulnerability scanning solutions, such as Nessus or Qualys
  • Experience with Microsoft XDR, Microsoft Endpoint Manager and other Microsoft cloud technologies.
  • Experience with Automation using Terraform and Ansible
  • Strong understanding of operating systems, including Windows, Linux and MacOS

Desirable skills you’ve got up your sleeve

It would be great if you also have some of the following skills:

  • Microsoft SC-200 Certification
  • Familiarity in using Kusto query language
  • Scripting languages such as PowerShell and Bash
  • Strong planning and organizing skills
  • Self-motivated and results-oriented
  • Curiosity and a continued learning mentality
  • Passion for automation and modernization

Our values are non-negotiables

Our culture is underpinned by core values that are linked to key behavioural competencies. Along with the below behavioural competencies, these are essential for all employees in order for you to embed in and drive our culture forward.

These competencies are:

  • Adaptability
  • Ownership and accountability
  • Initiating action
  • Resilience
  • Team orientation
  • Integrity
  • Innovation

What you’ll get back

We offer a great variety of personal and professional benefits to help you thrive at DigiOutsource and Super Group. This includes:

  • We’re dedicated to your supergrowth. Our comprehensive learning and development programmes give you a range of resources and opportunities to expand your skills and advance your career.
  • Your hard work and achievements won’t go unnoticed. Our innovative Performance Tool ensures you receive regular, constructive feedback, helping you to continuously improve and reach your full potential.
  • Our Employee Assistance programme offers a variety of benefits which you and your family can benefit from.
  • Free Daily Meal
  • Free Massages On-site
  • Free On-Site Gym
  • Group Life Cover
  • Funeral Fund Benefit
  • Financial Services Assistance
  • Curro School Fees Benefit
  • Income Continuation Benefit
  • Leadership Training
  • Referral Bonus
  • Medical Aid Subsidy
  • Free Sleep Coaching
  • On-site Barista
  • Retirement Annuity Subsidy
  • Team socials

Be part of that Superclass feeling.

At Super Group, diversity is part of our DNA. With teams across 16 countries, 85 nationalities, and 20 languages, we take equal opportunities seriously, championing a supportive, inclusive and empowering environment wherever you are in the Group.

It’s all about putting your experience first and ensuring honesty and fairness in all we do.
Here, your growth is supported and your contributions valued.

Game on!


*Please note we will apply relevance to our Talent Management and Talent Development Programme as part of our recruitment process.

*Shortlisted candidates may need to complete an assessment.

This position requires trust and honesty it has access to customers financial details - therefore a credit and criminal record check will be conducted. The qualifications identified herein are an inherent job requirement; therefore, a qualification verification check will be done. By applying for this role, and supplying the necessary details, you hereby grant us permission to apply for these checks. This will be done in a confidential manner, and solely for the purposes of verification.


Should you not hear from us within 2 weeks, please deem your application as unsuccessful.

The perfect place to work, play and grow!

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity vulnerability analyst

Western Cape, Western Cape Digital Outsource Services

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Cybersecurity Vulnerability Analyst page is loadedCybersecurity Vulnerability Analyst Apply remote type Hybrid locations Cape Town time type Full time posted on Posted Yesterday job requisition id JR10573Kick-start your career in the online gaming world and experience the very latest in technology and innovation. Who we are We’re part of Super Group, the NYSE-listed digital gaming company behind some of the world’s leading Sports and i Gaming brands. At Digi Outsource, we bring passionate people and innovative tech together to create market-leading online gaming solutions. Our multidisciplinary teams are passionate about products, customer experience and security. We’re empowered to achieve the ultimate in high-performance gaming experiences using the best technology available. Who we’re looking for We’re on a thrilling journey of growth and innovation, and we need passionate, driven individuals to join us. At Digi Outsource, every day is action-packed, and we expect you to bring your A-game. In return, you’ll find a supportive environment where your skills can flourish and your career can soar. Ready to become a game-changer? Supercharge your career with us and be part of something extraordinary. Why we need you We’re on a mission to create extraordinary experiences for our customers, and we believe that your unique skills, passion and superdrive will help us achieve our vision. As a Vulnerability Management Analyst, you’ll be supporting the delivery of repeatable, automated and scalable vulnerability management systems and processes, covering windows, linux, 3rd party software and cloud services. This will help us excel by keeping systems modern and secure to stay ahead of the game.What you’ll be doing As part of your role, your responsibilities will include: Identify, assess and prioritize resolution of vulnerabilities based on risk and known exploits Design, implement and maintain robust automated vulnerability detection and remediation processes, including ensuring required scheduled network and system scans are run. Review current security controls and compensating mitigation controls for vulnerabilities Maintain detailed plans and documentation on vulnerabilities and remediation schedules Generate and deliver comprehensive monthly vulnerability management reports, providing insights into risk exposure, remediation progress, and trends. These reports will highlight critical vulnerabilities, compliance status, and risk prioritization to support informed decision-making by key stakeholders Ensure adherence to regulations including ISO27001:2022 and Sarbanes-Oxley Keep up to date with the latest Tactics, Techniques and procedures and associated risks and attack vectors Effective collaboration with technology teams to resolve identified vulnerabilities Managing a Configuration Management Database (CMDB) to ensure accurate system inventory and asset relationships, correlating vulnerabilities to affected systems, and collaborating with internal teams to remediate security risks. This job description is not intended to be an exhaustive list of responsibilities. You may be required to complete other reasonable duties in order to achieve business objectives. Essential skills you’ll bring to the table The necessary skills that we require for this role include: Strong verbal and written communication skills, with the ability to convey complex ideas clearly and effectively Experience working collaboratively in cross-functional teams, with a focus on achieving shared goals Expertise in managing multiple projects simultaneously, with a track record of delivering on time and within scope Exceptional attention to detail, ensuring high standards of quality in all outputs Ability to adapt quickly to changing environments and priorities, maintaining effectiveness in dynamic situations Comp Tia Security+ Certification or other equivalent certificates Experience implementing and operating vulnerability scanning solutions, such as Nessus or Qualys Experience with Microsoft XDR, Microsoft Endpoint Manager and other Microsoft cloud technologies. Experience with Automation using Terraform and Ansible Strong understanding of operating systems, including Windows, Linux and Mac OS Desirable skills you’ve got up your sleeve It would be great if you also have some of the following skills: Microsoft SC-200 Certification Familiarity in using Kusto query language Scripting languages such as Power Shell and Bash Strong planning and organizing skills Self-motivated and results-oriented Curiosity and a continued learning mentality Passion for automation and modernization Our values are non-negotiables Our culture is underpinned by core values that are linked to key behavioural competencies. Along with the below behavioural competencies, these are essential for all employees in order for you to embed in and drive our culture forward. These competencies are: Adaptability Ownership and accountability Initiating action Resilience Team orientation Integrity Innovation What you’ll get back We offer a great variety of personal and professional benefits to help you thrive at Digi Outsource and Super Group. This includes: We’re dedicated to your supergrowth. Our comprehensive learning and development programmes give you a range of resources and opportunities to expand your skills and advance your career. Your hard work and achievements won’t go unnoticed. Our innovative Performance Tool ensures you receive regular, constructive feedback, helping you to continuously improve and reach your full potential. Our Employee Assistance programme offers a variety of benefits which you and your family can benefit from. Free Daily Meal Free Massages On-site Free On-Site Gym Group Life Cover Funeral Fund Benefit Financial Services Assistance Curro School Fees Benefit Income Continuation Benefit Leadership Training Referral Bonus Medical Aid Subsidy Free Sleep Coaching On-site Barista Retirement Annuity Subsidy Team socials Be part of that Superclass feeling. At Super Group, diversity is part of our DNA. With teams across 16 countries, 85 nationalities, and 20 languages, we take equal opportunities seriously, championing a supportive, inclusive and empowering environment wherever you are in the Group. It’s all about putting your experience first and ensuring honesty and fairness in all we do.Here, your growth is supported and your contributions valued. Game on! *Please note we will apply relevance to our Talent Management and Talent Development Programme as part of our recruitment process. *Shortlisted candidates may need to complete an assessment. This position requires trust and honesty it has access to customers financial details - therefore a credit and criminal record check will be conducted. The qualifications identified herein are an inherent job requirement; therefore, a qualification verification check will be done. By applying for this role, and supplying the necessary details, you hereby grant us permission to apply for these checks. This will be done in a confidential manner, and solely for the purposes of verification. Should you not hear from us within 2 weeks, please deem your application as unsuccessful. The perfect place to work, play and grow! #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Officer

EFT Corp.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome

Please select a reason for contacting us* I want to enquire about your services Other

What is your role in your organisation

What is your desired timeframe for the project to go live?

In which region(s) do you plan to offer your product/solution?

What are you interested in?

How did you find out about us?

I accept Terms and Conditions

I would like to receive EFT Corporation News and Updates

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form.

At EFT Corporation, success starts with people. Our team of 290+ professionals works across the United Kingdom, South Africa, Zambia, Ghana, Kenya, Mauritius, Zimbabwe, and India, bringing together deep local knowledge and shared ambition.With over 25 years of experience, we partner with more than 100 financial institutions to deliver secure, modern payment solutions that improve access and make everyday transactions easier. We're building the future of payments through smart technology, strong partnerships, and a clear focus on progress.

Why You'll Love Working Here:
  • Career Development: We invest in your future by providing continuous learning, mentorship, and growth opportunities.
  • Work-Life Balance: We support flexible work arrangements and wellness programs to ensure you can thrive both professionally and personally.
  • Impact-Driven Work: Be part of a company driving innovation and transforming financial services across Africa.
  • Diversity, Equity & Inclusion Commitment: Be part of a workplace where everyone feels valued and appreciated
Your Role
  • As an Information Security Officer , your job purpose is to be held accountable in respect to assisting the Senior Security and Infrastructure Engineer and the Senior DevOps Engineers in the following:
    • Assisting in maintaining the safety and security of the organisation’s systems and network database to prevent unauthorized access and avoid data breaches.
    • Maintaining the organisation’s systems and networks.
    • Assisting in overseeing the entire software development process, from planning and development to deployment and maintenance.
    • This role requires expertise in both software development and operations, as well as an understanding of the DevOps methodology.
    • This includes CI/CD, Infrastructure management (AWS), Automation, Monitoring, logging and metrics, Collaboration and Security.
    • The role also requires a significant focus on PCI compliance and support and collaboration with the Security and Infrastructure team is required.
  • You will be responsible for owning the Futurex HSM and Thales HSM device management which includes:
    • Yearly Key management/replacement ceremonies.
    • PCI compliance as it relates to the HSM.
  • Assisting with new security compliance:
    • ISO27001.
    • PCI+PIN.
What You’ll Do Maintain Operational Systems, Networks and Security:
  • Facilitate annual PCI audits.
  • Linux Operating systems are security patched in a timely manner. If patching will affect customers, arrange with operations support, and follow the correct change control process.
  • Maintain Elastic SIEM.
  • Respond to and investigate SIEM alerts.
  • Respond to operational system alerts and/or operational queries across the entire technology stack (Production and QA system issues, infrastructure issues, Databaseissues, Network issues, Security and Firewall issues and any 3rd party or customer integration issues) as they occur.
  • Manage / Deploy system tooling that may be beneficial to the business.
  • Research, POC and deploy new open source or when applicable closed source tooling that is beneficial to the business systems or processes. This can be in supporting Applications, Monitoring, Logging, SIEM, AI/machine Learning, Fraud Detection, Operational Support applications, Authentication systems, BI / Data Analytics, networks, Security or compliance.
  • Create ad hoc Python scripts / Applications to perform various repetitive tasks.
  • Ensure that AWS environments and services are architectured and configured in a secure and redundant manner including all security services from AWS.
  • Maintain AWS services including but not limited to: VPC, EC2, ECS, ECS Fargate, ECR, Guard Duty, Cloudwatch, Cloudtrail, Security groups, VPC Routing, Site to Site VPNs, Application Load balancers / network load balancers, Web application firewalls,etc.
  • Architect, support and maintain connectivity between 3rd parties, Banking partners, integrators and on prem datacentres.
  • Ensure best practice security measures are implemented.
  • Ensure best practices regarding system isolation and scope reduction.
  • Provide support to field engineers on HSMs and key management.
  • Maintain internal HSMs and key management procedures.
  • Provide support to the product and SLDC teams – this includes consulting on design, finding compliant solutions for customer issues, and filling out cyber risk assessments for customers or tenders.
Regulatory Compliance:
  • Maintain/Improve (PC14) PCI.
  • GDPR.
  • Ensure Security, Infrastructure & Procedures (with supporting team) are comprehensive and kept up to date.Security Tooling:
  • Ensure SSO, Intrusion detection, SIEM, Antivirus, Patch Management and PGP are implanted as per the polices.
  • Stimulation / adoption of user-driven security culture (give security a brand within the org and educate).
Automation:
  • To increase efficiency and reduce errors for both security and infrastructure management.
  • To reduce costs (optimize) without sacrificing performance and security.
Perform Security Activities & Reporting:
  • Ensure that weekly vulnerability scans results are tracked, and vulnerabilities are remediated within set severity timeframes weekly.
  • Review all daily and weekly BAU PCI Items for signoff monthly.
  • Ensure weekly Internal and External Scans were completed.
  • Perform data analysis reporting monthly.
  • Maintain a strong security posture within the card holder environment.
  • Work with 3rd party to ensure PCI Certification Audit is completed and passed on time.
  • Review Security Commitment to third parties.
What We’re Looking For Qualification & Experience:
  • Bachelor’s degree in Computer Science or related field.
  • 3 years’ relevant experience.
  • Experience within the payment / banking sector.
  • Experience working with PCI Audits / Security in DevOps, Linux, Mysql, Cloud (AWS).
  • Network experience (particularly cloud based / virtual).
Skills & Knowledge Required:
  • PCI Audits / Security / Processes.
  • Linux, Mysql, and Cloud (AWS).
  • Experience with automation tools like CloudFormation, Ansible, Puppet, Chef, etc.
  • Cloud knowledge, specifically AWS.
  • Logging Frameworks: ELK stack, cloudwatch, etc.
  • Monitoring and Alerting Framework: Zabbix, Nagios, etc.
Personal Attributes:
  • Ability to learn new technologies at pace.
  • Problem solving.
  • Ability to work within a high stress & flux environment.
  • Ability to foster & cultivate relationships with internal & external stakeholders.
  • Ability to work autonomously as well as part of a team.
  • Assertiveness – communicating feelings and beliefs; being non-offensive.
  • Detail & deadline oriented.
  • Analytical & critical thinking.
  • Celebrate Your Special Day: Enjoy a dedicated day off to celebrate your birthday.
  • Wellbeing Matters: Maintain a healthy work-life balance with up to 3 days of wellbeing leave annually.
  • Family Comes First: Support your loved ones when it matters most with up to 20 days of family responsibility leave.
Our Values
  • Empowerment
    We trust our team to lead, make decisions, and drive outcomes.
  • Financial Inclusion for All
    We build payment solutions that broaden access and support diversity.
  • Technology with Purpose
    We design tech that simplifies and improves every transaction.
  • Customer-Centric
    Our customers are at the heart of everything we do.

Join EFTCorporation and help shape simpler, more inclusive payments for millions across Africa.

Ready to make your mark? Apply Now

EFT Corporation is an Equal Opportunity Employer. Diversity drives our success, and we welcome passionate individuals from all walks of life to join our team.

EFT Corporation does not accept unsolicited resumes from search firms/recruiters. EFT Corporation will not pay any fees to search firms/recruiters if a search firm/recruiter submits a candidate unless an agreement has been entered into concerning the specific open position(s). Search firms/recruiters offering resumes to EFT Corporation on an unsolicited basis shall be deemed to accept this condition, regardless of any other provision to the contrary.

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Architect

Johannesburg, Gauteng InfyStrat

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Job title: Information Security Architect

Contract duration: Start with 6 months

First preference: EEE candidates

Location: JHB

The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital.

Key Responsibilities:

  • Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs.
  • Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle.
  • Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains.
  • Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems.
  • Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS.
  • Evaluates and selects security technologies, tools, and frameworks to support the organization’s security.
  • Define portfolio vision and reusable security patterns aligned with the EA strategy.
  • Lead architecture reviews for high-risk projects, driving recommendations to resolution.
  • Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance.
  • Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices.
  • Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team.
  • Experience with Cloud Security platform vendors and technologies such as Azure and AWS.
  • Manage security architects and mentor engineers, developers, and vendors.

What will you bring?

  • Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls.
  • Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items.
  • Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture.
  • Teamwork and Energy – work across different functional and business teams with effective collaboration.
  • Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and DevSecOps toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking.
  • Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards.
  • Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF).

Requirements / Skills and Competence

  • Tertiary qualification in Computer Science, Engineering, or related field (preferred)
  • Minimum of 5-10 years of experience in Security Architecture.
  • CISSP, CISA, CISM, or other relevant security-related designation(s) preferred.
  • Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP)
  • Experience in identifying gaps in existing architectures.
  • Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions.
  • Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies.
  • Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business.
  • Good experience in security architecture design in Cloud and on-prem.
  • Design and implementation of IOT, endpoint protection, and secure IAM.
  • Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies
  • Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products
  • Knowledge of web application architectures and threat modelling.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Threat analyst Jobs in South Africa !

Information Security Consultant

Cape Town, Western Cape iLaunch (Pty) Ltd

Posted 19 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Our client, a leading financial services firm, is seeking an Information Security Consultant to join their team on a permanent basis.

Responsibilities
  • Security Auditing
  • Responsible for Security tools monitoring
  • Network experience (TCP/IP, Firewalls, IPS, NAC)
  • Operating System management and Hardening
  • Anti-Virus System management and Configuration
  • Logical Access Management
  • Vulnerability Management
Minimum Requirements
  • Matric and an Information Technology diploma or degree qualification
  • 4+ years experience in the field
Package & Remuneration

Salary: Market Related

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security specialist

Durban, KwaZulu Natal Network Recruitment

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job & Company Description: An opportunity has become available for a Information Cyber Security Specialist to join a leading and well established multi-listed client in Durban. The successful candidate will have exposure to vulnerability management, to build architectural frameworks as well a doing risk assessments amongst other key functions. In essence,we are looking for a techie who has moved into the information security space from a strategic level dealing with Security, Risk, Vulnerability and Compliance. Job Experience & Skills Required: Minimum of a Diploma or Bachelor Degree in IT, Information Security or Information Systems 3+ years' Information Security specialising in Vulnerability Management and Cybersecurity Background experience on Network, Infrastructure and Web Security (advantageous) Experience doing risk assessments from scratch Build architectural frameworks would be a strong advantage Knowledge of ISO 27001 and NIST (Nice to have) Any of the following certifications would be advantageous: CISSP, CISM, CISA, CISO If you are interested in this opportunity, please apply directly or email your CV to For more IT jobs, please visit If you have not had any response in two weeks, please consider the vacancy application unsuccessful. Your profile will be kept on our database for any other suitable roles / positions. For more information contact: Luan French on / Branch Manager #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information security architect

Johannesburg, Gauteng InfyStrat

Posted today

Job Viewed

Tap Again To Close

Job Description

permanent
Job title: Information Security Architect Contract duration: Start with 6 months First preference: EEE candidates Location: JHB The Head of Security Architecture for the organization is responsible for designing, implementing, and maintaining robust security architectures that protect sensitive data in compliance with regulations such as POPIA, GDPR. This role is critical in safeguarding the confidentiality, integrity, and availability of electronic health records (EHR), patient and employee information, medical devices, and cloud-based healthcare services. The role will focus on designing and developing security architecture that aligns business and corporate security strategy. The role will collaboratively direct Security Architects, IT, and Engineers to design and build security controls and solutions compliant with approved enterprise architecture frameworks and standards across business and digital. Key Responsibilities: Design and develop complex and comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Model threats and risks, designing the controls necessary to mitigate them, on both an organizational and technical level – thinking like an attacker, understanding and anticipating the moves and tactics that a hacker might use to attack systems. Follow the architecture analysis process, which consists of research, validation, and evaluation of all new initiatives, with phase gate reviews presented to all stakeholders during key forums, including current trends such as AI and LLMS. Evaluates and selects security technologies, tools, and frameworks to support the organization’s security. Define portfolio vision and reusable security patterns aligned with the EA strategy. Lead architecture reviews for high-risk projects, driving recommendations to resolution. Advise on security controls for hybrid and cloud platforms, balancing usability, cost, and compliance. Defines and applies security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Experience with Cloud Security platform vendors and technologies such as Azure and AWS. Manage security architects and mentor engineers, developers, and vendors. What will you bring? Risk-based decision-making - expert in ISO 27001 / NIST / CIS controls, able to quantify and articulate risk, then select proportionate, cost-effective controls. Pen-testing & threat-modelling - scoping, overseeing, and translating results into enforceable patterns and backlog items. Influential communication - proven ability to engage C-suite and delivery stakeholders alike, adapting style to gain agreement and drive secure-by-design culture. Teamwork and Energy – work across different functional and business teams with effective collaboration. Technical depth - hands-on knowledge of cloud security, IAM, container & API security, network segmentation, encryption, and Dev Sec Ops toolchains; capable of explaining the exploitability of complex vulnerabilities. Zero trust design thinking. Mentoring & governance - experience in line-managing or coaching security architects/engineers and running architecture assurance or design-review boards. Secure-system design leadership - demonstrable track record creating or validating architectures for large-scale, high-risk services using recognised frameworks (SABSA, TOGAF). Requirements / Skills and Competence Tertiary qualification in Computer Science, Engineering, or related field (preferred) Minimum of 5-10 years of experience in Security Architecture. CISSP, CISA, CISM, or other relevant security-related designation(s) preferred. Certifications in CISSP-ISSAP, TOGAF, or SABSA, cloud architecture (Microsoft, AWS, GCP) Experience in identifying gaps in existing architectures. Understanding of security infrastructure in Public and Private Cloud, e.g., virtual network infrastructure, hybrid Iaa S/Paa S/Saa S solutions. Experience in designing security architectures to mitigate threats and sound knowledge of security strategies and technologies. Direct the Project and Security teams with the guidance to build policies, standards, risks, and controls frameworks supporting operational requirements for the business. Good experience in security architecture design in Cloud and on-prem. Design and implementation of IOT, endpoint protection, and secure IAM. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc.) and other IAM technologies Understanding of the implementation, operation, and maintenance of SIEM, boundary protection technologies (firewalls, mail gateways), Antivirus, and AD security products Knowledge of web application architectures and threat modelling. #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Analyst Jobs