Our client has an opportunity available for an Information Security Analyst.
Requirements:
- 5 years’ experience within either an Information Security position or Cybersecurity, which include protection against social engineering, or security vulnerability remediation, of which:
- 2 years’ IT administration experience.
 
- 2 years’ Ethical Hacking experience.
 
 
- In-depth knowledge of Cloud security platform.
 
- In-depth knowledge of Firewalls and Malicious Code Defence including APT.
 
- Knowledge of Cybersecurity technical assessments, standards, tools, and processes.
 
- Knowledge of common attack vectors.
 
- Knowledge of Vulnerability assessment tools.
 
- Endpoint and network security tools or techniques.
 
- Bachelor’s degree in Information Security or similar.
 
- Industry certifications.
 
 
KPAs:
 
- Support with development and maintenance of Cyber Security Road Maps and interventions.
 
- Create and maintain appropriate standard operating procedures for Cyber Security and information protection.
 
- Identify, respond, predict and analyse security breaches and threats to determine their root cause.
 
- Research, investigate and develop proficiency in current and emerging threats, vulnerabilities, and security technology developments.
 
- Work closely with other stakeholders to design, architect, consult and implement security solutions to ensure readiness for security technologies.
 
- Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated.
 
- Draft procedures and policies with regards to cyber security.
 
- Monitor and analyse Cybersecurity operational services.
 
- Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans.
 
- Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer.
 
- Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence.
 
- Create a collaborative program to coordinate and drive operational activities related to Cyber Security.
 
- Advise Technology business partners on regulatory, compliance and legal requirements as it relates to securing data.
 
- Lead and collaborate on lessons learned and root cause activities.
 
- Manage internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance.
 
- Monitor and drive compliance against the audit framework.
 
- Conduct technical security reviews and perform technical risk assessments.
 
- Act as a change management architect in periods of change to ensure continuity to operations.