168 Threat Intelligence jobs in South Africa

Threat Intelligence Lead

Cape Town, Western Cape Canonical

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Canonical Cape Town, Western Cape, South Africa

Join or sign in to find your next job

Join to apply for the Threat Intelligence Lead role at Canonical

Continue with Google Continue with Google

Canonical Cape Town, Western Cape, South Africa

Join to apply for the Threat Intelligence Lead role at Canonical

Get AI-powered advice on this job and more exclusive features.

Sign in to access AI-powered advices

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

Continue with Google Continue with Google

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Get notified about new Threat Intelligence Lead jobs in Cape Town, Western Cape, South Africa .

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Specialist, Threat Intelligence

R180000 - R250000 Y Standard Bank

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview

Business Segment: Group Functions

Location: ZA, GP, Johannesburg, 30 Baker Street

Job Type: Full-time

Job Ref ID: A-0001

Date Posted: 8/22/2025

Job Description

To provide Cyber-InfoSec expertise, professional knowledge, and technical skills to prevent cyber-attacks, significant reputational, financial, or other losses. To implement SBGs Cyber Resilience Programme to prevent cyber-attacks, protect sensitive data and systems from infiltration or misuse and execute the InfoSec capabilities against policies, standards, and controls across relevant functions

Qualifications

A degree in Information Technology or Computer Science.

IT Risk/Security certification such as CISM, CISSP or CISA is required.

A relevant Azure/AWS Cloud Certification is required

Experience Required:

Proficiency in Python is required. Experience with PowerShell, Bash and Ruby is an added advantage.

Experience in implementing machine learning and AI-powered automation workflows.

Design, develop, and maintain robust and scalable automation scripts and applications using Python and other scripting languages.

Experience with API integrations, database management (SQL/NoSQL), cloud infrastructures and cloud serverless technologies (e.g. AWS Lambda, Azure Functions) for implementing scalable cloud applications.

Experience with defensive technologies such as SIEMs, EDR tools, Threat Intelligence Platforms (TIP), OSINT tools and offensive technologies such as Burp Suite, Cobalt Strike, and Metasploit is an added advantage.

Experience within Financial Service Industry developing threat models, risk profiles, cybersecurity risk and incident management, and insight into crime in the financial sector.

Strong IT understanding, gaining insight into digital and platform operating models and cyber security trends and solutions, building cyber security intelligence.

Additional Information

Key Responsibilities:

Evaluate, develop and implement cyber security processes, tools integration and automation workflows for intelligence observation, enrichment, triage and investigations.

Implement machine learning and AI-powered automation workflows to provide intelligence observability and enrichment, enabling automated threat scoring reporting, and analysis of threat observations.

Debug, troubleshoot and optimize existing automation workflows and applications.

Document and present technical designs, specifications, and user manuals for all developed tools and workflows.

Integrate intelligence data from open-source, commercial, and internal sources to create a unified view for actionable intelligence analysis.

Research and stay current on application security threats, vulnerabilities, and emerging tactics, techniques and procedures (TTPs).

Familiarity with the MITRE ATT&CK framework, Cyber Kill Chain, or other security-related frameworks.

Support purple teaming exercises to build cyber resiliency across security teams.

Behavioural Competencies:

Adopting Practical Approaches

Articulating Information

Developing Strategies

Embracing Change

Exploring Possibilities

Generating Ideas

Interpreting Data

Making Decisions

Meeting Timescales

Producing Output

Providing Insights

Team Working

Technical Competencies:

Data Analysis

Debugging and Fixing Software

Information Security Management

IT Risk Management

Software Development Life Cycle (SDLC) methodologies & Tools

Technical Analysis

Use of Build and Test Automation

Write Code

Please note: All our recruitment processes comply with the applicable local laws and regulations. We will never ask for money or any from of payment as part of our recruitment process. If you experience this, please contact our Fraud line on or

This advertiser has chosen not to accept applicants from your region.

Specialist: Cyber Incident and Threat Intelligence

R600000 - R1200000 Y Telkom

Posted today

Job Viewed

Tap Again To Close

Job Description

Structural Information
Job number:

Job title:
Specialist: Cyber Incident and Threat Intelligence

Job grade:
S5

Group/ BU:
Corporate

Division:
CIO

Span of control:
0-5

Reports to:
Senior Management

Core Description
Responsible for identifying, analyzing, and responding to cyber threats and incidents targeting the organization. This role combines deep technical expertise with investigative skills to monitor threat landscapes, detect malicious activities, and provide actionable intelligence to improve the organization's cybersecurity posture. Works closely with SOC teams, digital forensics, and other cybersecurity functions to ensure proactive threat detection and effective incident response.

Job Responsibilities

  • Oversee the planning, design, implementation, testing, and operation of cyber breach resilience processes and systems on networks and applications.
  • Maintain awareness of the latest and common security threats, attack vectors, and Tactics, Techniques, and Procedures (TTPs) and maintain up-to-date threat profiles.
  • Act as an escalation point and subject matter expert for cybersecurity incidents and threat mitigation.
  • Develop and maintain incident management plans, procedures, controls, playbooks, and incident response strategies.
  • Lead cyber incident simulation exercises.
  • Designing and implementing a disaster recovery plan, ensuring Telkom can effectively respond to unexpected security incidents.
  • Monitor dark web, open-source intelligence (OSINT), and threat feeds to identify emerging threats.
  • Ensure that adequate processes are in place to collect, analyze, and disseminate threat intelligence from internal and external sources.
  • Lead or support cyber incident investigations, including detection, containment, eradication, and recovery processes.
  • Enhance detection rules and use cases in XDR and threat detection platforms.
  • Correlate intelligence with real-time security events to identify and prioritize threats.
  • Develop dashboards, visualizations, and metrics to report on threat trends and incident statistics.
  • Stay up to date with cybersecurity trends, zero-day vulnerabilities, and global threat activity.
  • Lead and ensure collaboration with the SOC team during incident handling.
  • Create threat intelligence reports, indicators of compromise (IOCs), and threat briefs for stakeholders.

Core Competencies
FUNCTIONAL KNOWLEDGE

Deep understanding of threat actor tactics, techniques, and procedures; Proficiency in using threat intelligence frameworks; Ability to contextualize and operationalize indicators of compromise; Experience in evaluating open-source and commercial threat intelligence feeds; Competence in producing and validating threat intelligence reports and advisories

Functional Skills
Analytical & Investigative; Communication & Interpretation; Decision Making; Problem Solving; Project & Task Management; Risk Awareness

ATTITUDES/ LEADERSHIP COMPETENCIES

Integrity; Assertive; Confident; Initiator; Supportive; Persuasive; Team Player; Problem Ownership

Certifications
Education

  • NQF 6: 3 year Diploma/ National Diploma in Information Technology

Experience

  • 5 Years relevant experience

Additional Information
Certifications:

  • Preferred certifications: Must have at least one of the following - CISM, CRISC CISSP, SABSA or ISO27001/2.
  • Additional desired certification: CoBIT, TOGAF, ITIL.

Special Requirements

  • None

Physical Requirements

  • None

Key Stakeholders

  • Enterprise and IT Architects
  • Internal Business Customers
  • External Customers
  • Consultants and specialists
  • Executive & Governance Forums
This advertiser has chosen not to accept applicants from your region.

Specialist, Incident Response

Johannesburg, Gauteng Standard Bank of South Africa Limited

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Location: ZA, GP, Johannesburg, Simmonds Street

As a Specialist Incident Response Analyst, you will play a central role in detecting, investigating, and responding to cyber incidents in a non-tiered SOC environment. You will own incidents end-to-end from triage through containment and recovery while applying an adversarial mindset to anticipate attacker behaviour. Alongside technical response, you will contribute to policy improvement, coaching, and industry engagement, ensuring the bank’s response capability matures continuously. This role includes after-hours standby as part of an on-call rotation.

Qualifications
  • A degree Information Technology is required.
  • IT Risk/security certification such as CISM, CISSP or CISA, GCIA, GCIH, OSCP is required.
  • AWS/Azure Cloud Certifications.

Experience Required:

  • 5-7 years experience in IT Security, preferably in a Financial Institution, with noted experience in developing threat models, threat analysis, cyber and incident management, offensive security, high level static and dynamic malware analysis.
  • 5-7 years experience in strong IT understanding, gaining insight into digital and platform operating models and cyber security trends and solutions.
  • Strong experience in incident management, threat modelling, malware analysis, and offensive security techniques.
  • Broad IT systems knowledge and awareness of digital platform operating models.
Key Responsibilities
  • Detect & Investigate: Analyse alerts from SIEM, EDR, and threat intelligence sources; distinguish true vs false positives.
  • Contain & Remediate: Lead active incidents through containment, eradication, and recovery actions.
  • Threat Hunting: Proactively search for adversary activity using attacker TTPs and threat intel.
  • Malware & Phishing Triage: Perform static/dynamic malware analysis and investigate phishing campaigns.
  • Offensive Security Awareness: Apply penetration testing/red team knowledge to strengthen detection and response.
  • Forensic Support: Collect and analyse logs, endpoint, and network artifacts for root cause analysis.
  • On-Call Duties: Provide after-hours escalation support on a rotational basis.
  • Documentation & Reporting: Produce incident reports, lessons learned, and contribute to playbook improvements.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Specialist, Incident Response

R900000 - R1200000 Y Standard Bank

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview

Business Segment: Group Functions

Location: ZA, GP, Johannesburg, Simmonds Street

Job Type: Full-time

Job Ref ID: A-0003

Date Posted: 8/22/2025

Job Description

As a Specialist Incident Response Analyst, you will play a central role in detecting, investigating, and responding to cyber incidents in a non-tiered SOC environment. You will own incidents end-to-end from triage through containment and recovery while applying an adversarial mindset to anticipate attacker behaviour. Alongside technical response, you will contribute to policy improvement, coaching, and industry engagement, ensuring the bank's response capability matures continuously. This role includes after-hours standby as part of an on-call rotation.

Qualifications

A degree Information Technology is required.

IT Risk/security certification such as CISM, CISSP or CISA, GCIA, GCIH, OSCP is required.

AWS/Azure Cloud Certifications.

Experience Required:

5-7 years experience in IT Security, preferably in a Financial Institution, with noted experience in developing threat models, threat analysis, cyber and incident management, offensive security, high level static and dynamic malware analysis.

5-7 years experience in strong IT understanding, gaining insight into digital and platform operating models and cyber security trends and solutions.

Strong experience in incident management, threat modelling, malware analysis, and offensive security techniques.

Broad IT systems knowledge and awareness of digital platform operating

models.

Additional Information

Key Responsibilities:

Detect & Investigate: Analyse alerts from SIEM, EDR, and threat intelligence sources; distinguish true vs false positives.

Contain & Remediate: Lead active incidents through containment, eradication, and recovery actions.

Threat Hunting: Proactively search for adversary activity using attacker TTPs and threat intel.

Malware & Phishing Triage: Perform static/dynamic malware analysis and investigate phishing campaigns.

Offensive Security Awareness: Apply penetration testing/red team knowledge to strengthen detection and response.

Forensic Support: Collect and analyse logs, endpoint, and network artifacts for root cause analysis.

On-Call Duties: Provide after-hours escalation support on a rotational basis.

Documentation & Reporting: Produce incident reports, lessons learned, and contribute to playbook improvements.

Behavioural Competencies:

Articulating Information

Checking Things

Directing People

Documenting Facts

Embracing Change

Examining Information

Interpreting Data

Making Decisions

Producing Output

Providing Insights

Taking Action

Team Working

Technical Competencies:

Data Analysis

Diagramming and Modelling

Documenting

Information Security

IT Knowledge

IT Systems

Research & Information Gathering

Please note: All our recruitment processes comply with the applicable local laws and regulations. We will never ask for money or any from of payment as part of our recruitment process. If you experience this, please contact our Fraud line on or

This advertiser has chosen not to accept applicants from your region.

Remote Incident Response Tech Lead

Mpumalanga, Mpumalanga FusionTek

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
FusionTek is a Managed Security Service Provider (MSSP) with offices in multiple US locations and team members globally. We're a tight-knit team of friendly, intelligent people focused on IT infrastructure management for small- to mid-sized businesses since 2007.

We're also rapidly growing and are looking for top-tier candidates who share our four core values:

  • We are team players, collectively working towards a common goal
  • We work each day with a growth mindset focused on the success of our coworkers, clients, and the company
  • We do the right thing with an honest and transparent approach that always puts our clients first
  • We take ownership of our work, always seeing it through to completion
  • We execute quickly and precisely, both internally and externally

If this opportunity excites you, we invite you to continue reading! Join our team as an Incident Response Technical Lead. We're seeking a proactive problem-solver with a client-focused attitude who thrives on tackling technical challenges.

As an Incident Response Tech Lead, you will provide excellence in high-touch technical management for incident response projects. This includes frequent technical and non-technical written, verbal and video call (Zoom / Teams) updates with all stakeholders on a project, both within FusionTek and externally. Throughout the day you'll be translating technology to clients who aren't always technical, so communication skills are paramount in this role. A broad technical foundation is also required, as you will make decisions on the client's recovery strategy and will serve as escalation point and subject matter expert to FusionTek team members and the client.

We are currently staffing the following shifts:

8:00 AM - 5:00 PM, Sunday to Thursday or Tuesday to Saturday - South Africa Standard Time (SAST)

2:00 PM - Midnight (Friday to Monday) - South Africa Standard Time (SAST)

Here's what you'll be doing:

  • You'll primarily be focused on technical management of incident response recovery efforts from start to finish. This can include initial project mobilization, assignment and management of technical workstreams, and frequent client and vendor communication. There are daily (sometimes more frequently) updated calls and associated reporting
  • Incident response projects can often begin over a weekend or outside of traditional business hours, and weekends are crucial recovery opportunities to lessen the impact the client feels as their businesses are often completely down
  • You'll work through our ticketing system to document, track, and escalate project tasks and tickets, and you'll also work on our documentation platform to keep everything up to date along the way
  • You'll serve as an escalation point on technical questions from other engineers and the client
  • You'll be working with a team of intelligent people to deliver world-class service to our clients


Requirements

  • Excellent comprehension and communication in the English language
  • Previous experience leading a technical team
  • Knowledge of Office 365 / Azure cloud services
  • Knowledge of Active Directory
  • Knowledge of complex networking troubleshooting (VLANs/routing/subnetting/packet captures)
  • Broad understanding of how operating systems work
  • Knowledge of advanced OS troubleshooting (boot issues/corruption of profiles/OS files)
  • Comfortable working in different OSs, both in CLI and GUI
  • SQL DB knowledge is a plus
  • Knowledge of advanced firewall configuration skills (creating and troubleshooting complex firewall policies/routes)
  • Experience troubleshooting ingress/egress issues
  • Comfortable working in diverse firewall UIs (SonicWall, Meraki, FortiGate, Cisco, WatchGuard, etc.)
  • Strong comprehension of system architecture (i.e. - how servers' function, what their roles are, etc.)
  • Understanding of the elements of network and system performance
  • Time management skills are crucial to your success in this role
  • Superb verbal and written communications skills are a must
  • Demonstrated skillset through industry certifications or an agreed upon plan to obtain them
  • Previous recovery / remediation experience a plus
  • Experience working in a ticketing system is preferred, with Autotask experience a plus


Benefits

At FusionTek, we truly believe that our people are our most valuable asset, which is why we're excited to provide:

  • Salary range - R800,000 to R950,000
  • Quarterly bonus eligibility based on specific KPIs
  • Educational reimbursement for certification tests and company supplied training resources
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Remote Incident Response Tech Lead

Northern Cape, Northern Cape FusionTek

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
FusionTek is a Managed Security Service Provider (MSSP) with offices in multiple US locations and team members globally. We're a tight-knit team of friendly, intelligent people focused on IT infrastructure management for small- to mid-sized businesses since 2007.

We're also rapidly growing and are looking for top-tier candidates who share our four core values:

  • We are team players, collectively working towards a common goal
  • We work each day with a growth mindset focused on the success of our coworkers, clients, and the company
  • We do the right thing with an honest and transparent approach that always puts our clients first
  • We take ownership of our work, always seeing it through to completion
  • We execute quickly and precisely, both internally and externally

If this opportunity excites you, we invite you to continue reading! Join our team as an Incident Response Technical Lead. We're seeking a proactive problem-solver with a client-focused attitude who thrives on tackling technical challenges.

As an Incident Response Tech Lead, you will provide excellence in high-touch technical management for incident response projects. This includes frequent technical and non-technical written, verbal and video call (Zoom / Teams) updates with all stakeholders on a project, both within FusionTek and externally. Throughout the day you'll be translating technology to clients who aren't always technical, so communication skills are paramount in this role. A broad technical foundation is also required, as you will make decisions on the client's recovery strategy and will serve as escalation point and subject matter expert to FusionTek team members and the client.

We are currently staffing the following shifts:

8:00 AM - 5:00 PM, Sunday to Thursday or Tuesday to Saturday - South Africa Standard Time (SAST)

2:00 PM - Midnight (Friday to Monday) - South Africa Standard Time (SAST)

Here's what you'll be doing:

  • You'll primarily be focused on technical management of incident response recovery efforts from start to finish. This can include initial project mobilization, assignment and management of technical workstreams, and frequent client and vendor communication. There are daily (sometimes more frequently) updated calls and associated reporting
  • Incident response projects can often begin over a weekend or outside of traditional business hours, and weekends are crucial recovery opportunities to lessen the impact the client feels as their businesses are often completely down
  • You'll work through our ticketing system to document, track, and escalate project tasks and tickets, and you'll also work on our documentation platform to keep everything up to date along the way
  • You'll serve as an escalation point on technical questions from other engineers and the client
  • You'll be working with a team of intelligent people to deliver world-class service to our clients


Requirements

  • Excellent comprehension and communication in the English language
  • Previous experience leading a technical team
  • Knowledge of Office 365 / Azure cloud services
  • Knowledge of Active Directory
  • Knowledge of complex networking troubleshooting (VLANs/routing/subnetting/packet captures)
  • Broad understanding of how operating systems work
  • Knowledge of advanced OS troubleshooting (boot issues/corruption of profiles/OS files)
  • Comfortable working in different OSs, both in CLI and GUI
  • SQL DB knowledge is a plus
  • Knowledge of advanced firewall configuration skills (creating and troubleshooting complex firewall policies/routes)
  • Experience troubleshooting ingress/egress issues
  • Comfortable working in diverse firewall UIs (SonicWall, Meraki, FortiGate, Cisco, WatchGuard, etc.)
  • Strong comprehension of system architecture (i.e. - how servers' function, what their roles are, etc.)
  • Understanding of the elements of network and system performance
  • Time management skills are crucial to your success in this role
  • Superb verbal and written communications skills are a must
  • Demonstrated skillset through industry certifications or an agreed upon plan to obtain them
  • Previous recovery / remediation experience a plus
  • Experience working in a ticketing system is preferred, with Autotask experience a plus


Benefits

At FusionTek, we truly believe that our people are our most valuable asset, which is why we're excited to provide:

  • Salary range - R800,000 to R950,000
  • Quarterly bonus eligibility based on specific KPIs
  • Educational reimbursement for certification tests and company supplied training resources
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Threat intelligence Jobs in South Africa !

Remote Incident Response Tech Lead

Free State, Free State FusionTek

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
FusionTek is a Managed Security Service Provider (MSSP) with offices in multiple US locations and team members globally. We're a tight-knit team of friendly, intelligent people focused on IT infrastructure management for small- to mid-sized businesses since 2007.

We're also rapidly growing and are looking for top-tier candidates who share our four core values:

  • We are team players, collectively working towards a common goal
  • We work each day with a growth mindset focused on the success of our coworkers, clients, and the company
  • We do the right thing with an honest and transparent approach that always puts our clients first
  • We take ownership of our work, always seeing it through to completion
  • We execute quickly and precisely, both internally and externally

If this opportunity excites you, we invite you to continue reading! Join our team as an Incident Response Technical Lead. We're seeking a proactive problem-solver with a client-focused attitude who thrives on tackling technical challenges.

As an Incident Response Tech Lead, you will provide excellence in high-touch technical management for incident response projects. This includes frequent technical and non-technical written, verbal and video call (Zoom / Teams) updates with all stakeholders on a project, both within FusionTek and externally. Throughout the day you'll be translating technology to clients who aren't always technical, so communication skills are paramount in this role. A broad technical foundation is also required, as you will make decisions on the client's recovery strategy and will serve as escalation point and subject matter expert to FusionTek team members and the client.

We are currently staffing the following shifts:

8:00 AM - 5:00 PM, Sunday to Thursday or Tuesday to Saturday - South Africa Standard Time (SAST)

2:00 PM - Midnight (Friday to Monday) - South Africa Standard Time (SAST)

Here's what you'll be doing:

  • You'll primarily be focused on technical management of incident response recovery efforts from start to finish. This can include initial project mobilization, assignment and management of technical workstreams, and frequent client and vendor communication. There are daily (sometimes more frequently) updated calls and associated reporting
  • Incident response projects can often begin over a weekend or outside of traditional business hours, and weekends are crucial recovery opportunities to lessen the impact the client feels as their businesses are often completely down
  • You'll work through our ticketing system to document, track, and escalate project tasks and tickets, and you'll also work on our documentation platform to keep everything up to date along the way
  • You'll serve as an escalation point on technical questions from other engineers and the client
  • You'll be working with a team of intelligent people to deliver world-class service to our clients


Requirements

  • Excellent comprehension and communication in the English language
  • Previous experience leading a technical team
  • Knowledge of Office 365 / Azure cloud services
  • Knowledge of Active Directory
  • Knowledge of complex networking troubleshooting (VLANs/routing/subnetting/packet captures)
  • Broad understanding of how operating systems work
  • Knowledge of advanced OS troubleshooting (boot issues/corruption of profiles/OS files)
  • Comfortable working in different OSs, both in CLI and GUI
  • SQL DB knowledge is a plus
  • Knowledge of advanced firewall configuration skills (creating and troubleshooting complex firewall policies/routes)
  • Experience troubleshooting ingress/egress issues
  • Comfortable working in diverse firewall UIs (SonicWall, Meraki, FortiGate, Cisco, WatchGuard, etc.)
  • Strong comprehension of system architecture (i.e. - how servers' function, what their roles are, etc.)
  • Understanding of the elements of network and system performance
  • Time management skills are crucial to your success in this role
  • Superb verbal and written communications skills are a must
  • Demonstrated skillset through industry certifications or an agreed upon plan to obtain them
  • Previous recovery / remediation experience a plus
  • Experience working in a ticketing system is preferred, with Autotask experience a plus


Benefits

At FusionTek, we truly believe that our people are our most valuable asset, which is why we're excited to provide:

  • Salary range - R800,000 to R950,000
  • Quarterly bonus eligibility based on specific KPIs
  • Educational reimbursement for certification tests and company supplied training resources
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Remote Incident Response Tech Lead

Gauteng, Gauteng FusionTek

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
FusionTek is a Managed Security Service Provider (MSSP) with offices in multiple US locations and team members globally. We're a tight-knit team of friendly, intelligent people focused on IT infrastructure management for small- to mid-sized businesses since 2007.

We're also rapidly growing and are looking for top-tier candidates who share our four core values:

  • We are team players, collectively working towards a common goal
  • We work each day with a growth mindset focused on the success of our coworkers, clients, and the company
  • We do the right thing with an honest and transparent approach that always puts our clients first
  • We take ownership of our work, always seeing it through to completion
  • We execute quickly and precisely, both internally and externally

If this opportunity excites you, we invite you to continue reading! Join our team as an Incident Response Technical Lead. We're seeking a proactive problem-solver with a client-focused attitude who thrives on tackling technical challenges.

As an Incident Response Tech Lead, you will provide excellence in high-touch technical management for incident response projects. This includes frequent technical and non-technical written, verbal and video call (Zoom / Teams) updates with all stakeholders on a project, both within FusionTek and externally. Throughout the day you'll be translating technology to clients who aren't always technical, so communication skills are paramount in this role. A broad technical foundation is also required, as you will make decisions on the client's recovery strategy and will serve as escalation point and subject matter expert to FusionTek team members and the client.

We are currently staffing the following shifts:

8:00 AM - 5:00 PM, Sunday to Thursday or Tuesday to Saturday - South Africa Standard Time (SAST)

2:00 PM - Midnight (Friday to Monday) - South Africa Standard Time (SAST)

Here's what you'll be doing:

  • You'll primarily be focused on technical management of incident response recovery efforts from start to finish. This can include initial project mobilization, assignment and management of technical workstreams, and frequent client and vendor communication. There are daily (sometimes more frequently) updated calls and associated reporting
  • Incident response projects can often begin over a weekend or outside of traditional business hours, and weekends are crucial recovery opportunities to lessen the impact the client feels as their businesses are often completely down
  • You'll work through our ticketing system to document, track, and escalate project tasks and tickets, and you'll also work on our documentation platform to keep everything up to date along the way
  • You'll serve as an escalation point on technical questions from other engineers and the client
  • You'll be working with a team of intelligent people to deliver world-class service to our clients


Requirements

  • Excellent comprehension and communication in the English language
  • Previous experience leading a technical team
  • Knowledge of Office 365 / Azure cloud services
  • Knowledge of Active Directory
  • Knowledge of complex networking troubleshooting (VLANs/routing/subnetting/packet captures)
  • Broad understanding of how operating systems work
  • Knowledge of advanced OS troubleshooting (boot issues/corruption of profiles/OS files)
  • Comfortable working in different OSs, both in CLI and GUI
  • SQL DB knowledge is a plus
  • Knowledge of advanced firewall configuration skills (creating and troubleshooting complex firewall policies/routes)
  • Experience troubleshooting ingress/egress issues
  • Comfortable working in diverse firewall UIs (SonicWall, Meraki, FortiGate, Cisco, WatchGuard, etc.)
  • Strong comprehension of system architecture (i.e. - how servers' function, what their roles are, etc.)
  • Understanding of the elements of network and system performance
  • Time management skills are crucial to your success in this role
  • Superb verbal and written communications skills are a must
  • Demonstrated skillset through industry certifications or an agreed upon plan to obtain them
  • Previous recovery / remediation experience a plus
  • Experience working in a ticketing system is preferred, with Autotask experience a plus


Benefits

At FusionTek, we truly believe that our people are our most valuable asset, which is why we're excited to provide:

  • Salary range - R800,000 to R950,000
  • Quarterly bonus eligibility based on specific KPIs
  • Educational reimbursement for certification tests and company supplied training resources
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Remote Incident Response Tech Lead

Gauteng, Gauteng FusionTek

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

workfromhome
FusionTek is a Managed Security Service Provider (MSSP) with offices in multiple US locations and team members globally. We're a tight-knit team of friendly, intelligent people focused on IT infrastructure management for small- to mid-sized businesses since 2007.

We're also rapidly growing and are looking for top-tier candidates who share our four core values:

  • We are team players, collectively working towards a common goal
  • We work each day with a growth mindset focused on the success of our coworkers, clients, and the company
  • We do the right thing with an honest and transparent approach that always puts our clients first
  • We take ownership of our work, always seeing it through to completion
  • We execute quickly and precisely, both internally and externally

If this opportunity excites you, we invite you to continue reading! Join our team as an Incident Response Technical Lead. We're seeking a proactive problem-solver with a client-focused attitude who thrives on tackling technical challenges.

As an Incident Response Tech Lead, you will provide excellence in high-touch technical management for incident response projects. This includes frequent technical and non-technical written, verbal and video call (Zoom / Teams) updates with all stakeholders on a project, both within FusionTek and externally. Throughout the day you'll be translating technology to clients who aren't always technical, so communication skills are paramount in this role. A broad technical foundation is also required, as you will make decisions on the client's recovery strategy and will serve as escalation point and subject matter expert to FusionTek team members and the client.

We are currently staffing the following shifts:

8:00 AM - 5:00 PM, Sunday to Thursday or Tuesday to Saturday - South Africa Standard Time (SAST)

2:00 PM - Midnight (Friday to Monday) - South Africa Standard Time (SAST)

Here's what you'll be doing:

  • You'll primarily be focused on technical management of incident response recovery efforts from start to finish. This can include initial project mobilization, assignment and management of technical workstreams, and frequent client and vendor communication. There are daily (sometimes more frequently) updated calls and associated reporting
  • Incident response projects can often begin over a weekend or outside of traditional business hours, and weekends are crucial recovery opportunities to lessen the impact the client feels as their businesses are often completely down
  • You'll work through our ticketing system to document, track, and escalate project tasks and tickets, and you'll also work on our documentation platform to keep everything up to date along the way
  • You'll serve as an escalation point on technical questions from other engineers and the client
  • You'll be working with a team of intelligent people to deliver world-class service to our clients


Requirements

  • Excellent comprehension and communication in the English language
  • Previous experience leading a technical team
  • Knowledge of Office 365 / Azure cloud services
  • Knowledge of Active Directory
  • Knowledge of complex networking troubleshooting (VLANs/routing/subnetting/packet captures)
  • Broad understanding of how operating systems work
  • Knowledge of advanced OS troubleshooting (boot issues/corruption of profiles/OS files)
  • Comfortable working in different OSs, both in CLI and GUI
  • SQL DB knowledge is a plus
  • Knowledge of advanced firewall configuration skills (creating and troubleshooting complex firewall policies/routes)
  • Experience troubleshooting ingress/egress issues
  • Comfortable working in diverse firewall UIs (SonicWall, Meraki, FortiGate, Cisco, WatchGuard, etc.)
  • Strong comprehension of system architecture (i.e. - how servers' function, what their roles are, etc.)
  • Understanding of the elements of network and system performance
  • Time management skills are crucial to your success in this role
  • Superb verbal and written communications skills are a must
  • Demonstrated skillset through industry certifications or an agreed upon plan to obtain them
  • Previous recovery / remediation experience a plus
  • Experience working in a ticketing system is preferred, with Autotask experience a plus


Benefits

At FusionTek, we truly believe that our people are our most valuable asset, which is why we're excited to provide:

  • Salary range - R800,000 to R950,000
  • Quarterly bonus eligibility based on specific KPIs
  • Educational reimbursement for certification tests and company supplied training resources
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Intelligence Jobs