At a Glance
- Tasks: Research global IT security threats and protect data through innovative solutions.
- Company: Join a forward-thinking company dedicated to cybersecurity excellence.
- Benefits: Competitive salary, health benefits, and opportunities for professional growth.
- Why this job: Make a real impact in safeguarding digital information and enhancing security practices.
- Qualifications: Bachelor's degree in Information Security or related field; industry certifications preferred.
- Other info: Dynamic work environment with a focus on transformation and diversity.
The predicted salary is between 30000 - 42000 £ per year.
Description
Gather information related to Technology Transformation & Innovation
- Research the latest information technology security threats and trends globally and use this information to provide the management team with the required information to implement solutions to protect SBV’s data.
- Adopt the strategic direction provided in order to execute duties, providing feedback as and when required.
Conduct Analysis & Planning Activities
- Gather evidence required for security and vulnerability assessments, providing findings to the Information Security Analyst L2 for review and reporting
- Conduct investigation on uses of data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
- Analyse security breaches to determine their root cause providing one’s findings and recommendations to the Information Security Officer.
- Conduct log correlation in the event of a breach or suspected data loss incident for investigative purposes. Evidence gathering to be presented to the Information Security Officer in form of a report.
Provide input into the Design for your area of responsibility
- Create content and drive security awareness through facilitating orientation, educational programs, and ongoing communication
- Investigate security remediation tool sets that will allow for automation on system threats through software development or off-the-shelf tools.
- Compile a business case outlining the preferred toolset, submitting for approval to the Information Security Officer
- Proactively configure and monitor security alerts relating to incidents, and disasters to reduce likelihood
Implementation & Execution within mandate
- Support Information Security Analyst L2 to conduct internal and external security reviews by conducting interviews, running toolsets and consolidating the information to provide recommendations to close any potential gaps within the process and or system
- Identify and respond to threats to meet or exceed defined SLAs, escalating where need be.
- Mitigate the incident and provide accurate documentation around the resolution process.
- Verify authorized access by conducting reviews of logical access on systems.
- Monitor and remediate network, intrusion detection and prevention systems on a daily basis for security breaches and investigate and report to the Information Security Officer when a violation occurs
- Monitor the information security compliance against SBV’s standards and best practices.
- Gather information and prepare reports that document security breaches and system compliance within the landscape
Risk & Quality Management within one’s area of responsibility
- Conducts vulnerability testing, risk analyses and security assessments providing findings to the Information Security Analyst L2
- Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence
- Support the Information Security Analyst L2 to create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimization, playbooks, and exercise development.
- Assists with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate
- To be the point of contact that interface between vendors and business units during audits, assessments or security reviews as per mandate
- Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc) and/or legal requirements as it relates to securing of data
- Drive compliance regarding Information Security business continuity planning.
- Subscribe and align to SBV Services\’ ISO 9001:2015 Quality Management Standards, ensuring the department’s processes and quality management system is at all times in compliance with the standard
- Support SBVs ESG journey, reporting on and managing the ESG requirements to ensure a positive reflection and outcome
Create awareness of IT Security good practices to the relevant stakeholders through communication and training
- Provide system users with assistance guidance about new security products and procedures
- Drive compliance with Cyber security Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non-compliant staff
- Deliver security awareness through facilitating the orientation, educational programs, and on-going communication
- Develop, document and distribute how-to guides and update the internal knowledge base
Adhere to Process and Policy
- Monitoring of systems to drive 0 data material breaches and findings in Audits
- Drive the closure of audit findings departmentally providing regular feedback to the Information Security Officer
- Support with checks and monitoring of internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance
- Monitor and drive compliance with established security configuration standards and best practices. Verify compliance with established security configuration standards and best practice
Lead as an Ambassador and executor of Change
- Act as a change management architect in periods of change to ensure business continuity.
- Manage the integration of business units into a seamless end to end solution for customers.
- Effectively communicate and embed new processes and procedures as they occur, addressing or escalating matters/ concerns to the SME’s (subject matter experts) when required.
- Facilitate the necessary presentations, workshops, or forums to ensure consistent and accurate information is given across one\’s portfolio
Communication will be limited to shortlisted candidates only.
SBV recruitment is committed to transformation and diversity alignment
Requirements
- Bachelor’s degree in Information Security or similar.
- Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE ISO 27001 (advantageous)
Requirements: Work Experience
- 2 Years’ experience within either an Information Security position or Cybersecurity, of which:
- 2 Years’ IT administration experience
- In-depth knowledge of Cloud security platform (MS Intune / O365 Security, etc.) (Advantageous)
- In-depth knowledge of Firewalls and Malicious Code Defense including APT (Advantageous)
- Knowledge of Cybersecurity technical assessments, standards, tools, and processes (Advantageous)
- Knowledge of common attack vectors (Advantageous)
- Knowledge of Vulnerability assessment tools (Nessus, Nmap) (Advantageous)
- Endpoint and network security tools/techniques (Advantageous)
Work Level: Skilled
Job Type: Permanent
Salary: Market Related
EE Position: No
Location: Houghton
#J-18808-Ljbffr
Information Security Analyst L1 employer: SBV South Africa
Contact Detail:
SBV South Africa Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Information Security Analyst L1
✨Tip Number 1
Network, network, network! Get out there and connect with people in the industry. Attend meetups, webinars, or even online forums. The more you engage, the better your chances of landing that Information Security Analyst role.
✨Tip Number 2
Don’t just apply and wait! Follow up on your applications. A quick email or message can show your enthusiasm and keep you on their radar. Plus, it gives you a chance to ask any questions about the role.
✨Tip Number 3
Prepare for interviews by brushing up on the latest security trends and tools. Be ready to discuss how you would handle specific security scenarios. Show them you’re not just knowledgeable but also passionate about protecting data.
✨Tip Number 4
Check out our website for job openings and apply directly through us. We’re all about making connections and helping you find the right fit in the cybersecurity world. Let’s get you that dream job!
We think you need these skills to ace Information Security Analyst L1
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Information Security Analyst role. Highlight relevant experience and skills that match the job description, like your knowledge of security tools and incident response.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about information security and how your background makes you a great fit for our team at StudySmarter.
Showcase Your Certifications: If you've got any industry certifications like CISSP or Security+, flaunt them! They show us you're serious about your career in information security and have the skills we need.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and we can’t wait to see your application!
How to prepare for a job interview at SBV South Africa
✨Know Your Stuff
Make sure you brush up on the latest information security threats and trends. Being able to discuss current issues in cybersecurity will show that you're proactive and knowledgeable, which is exactly what they’re looking for.
✨Showcase Your Analytical Skills
Prepare to discuss your experience with vulnerability assessments and security breaches. Have specific examples ready where you’ve identified root causes or provided recommendations, as this will demonstrate your analytical capabilities.
✨Familiarise Yourself with Tools
Get to know the tools mentioned in the job description, like Nessus or Nmap. If you can talk about how you've used these tools in past roles or how you would approach using them, it’ll give you a leg up in the interview.
✨Communicate Clearly
Since the role involves educating others about security practices, practice explaining complex concepts in simple terms. This will not only help you in the interview but also show that you can effectively communicate with non-technical stakeholders.