Information Security Analyst L2
Information Security Analyst L2

Information Security Analyst L2

Houghton Full-Time 36000 - 60000 ÂŁ / year (est.) No home office possible
S

At a Glance

  • Tasks: Join us in safeguarding digital assets and tackling cyber threats head-on.
  • Company: Dynamic tech firm focused on innovation and security.
  • Benefits: Competitive salary, flexible work options, and growth opportunities.
  • Why this job: Make a real difference in cybersecurity while developing your skills.
  • Qualifications: 5 years in Information Security or Cybersecurity, with relevant certifications.
  • Other info: Collaborative environment with a focus on continuous learning and development.

The predicted salary is between 36000 - 60000 ÂŁ per year.

Description

Support Technology Transformation & Innovation in your area of responsibility

  • Support with developing and maintaining Cyber Security Road Map and interventions
  • Support with developing company-wide best practices for Technology security
  • Support improving the maturity, or efficiency, of the Cyber Security team, by identifying innovative, problem‑solving solutions.
  • Creates and maintain appropriate standard operating procedures for the Cyber Security and information protection

Support on Analysis & Planning Activities

  • Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber‑security threats, attacks, incidents, and other factors that indicate security risks as per SLA.
  • Researching, investigating and developing proficiency in current and emerging threats, vulnerabilities, and security technology developments.
  • Play an active role in Technology Security Planning sessions, driving agenda and deliverables with all participants.
  • Support managing Vendor Strategy and roadmap for Information Security
  • Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate
  • Assessment of the organisation\’s technology risk exposure and measurement of the various parameters that make up technology risks

Support the Design for your area of responsibility

  • Work closely with other stakeholders to design, architect, consult and implement security solutions to ensure readiness for security technologies
  • In support of program design, gather client requirements and draft documentation in order to compile a draft project plan; only more complex programs need to be reviewed by the Information Security Officer
  • Identify the desired outcomes and success criteria which is to be the baseline for post‑project review and benefit realisation validation, as well as measuring positive effects
  • Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated
  • Draft procedures and or policies with regards to cyber security submitting them to the Information Security Officer for review and authorisation

Implementation & Execution within mandate

  • Monitor and analyse Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, data spillage and Incident response actions
  • Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans
  • Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management
  • Provide daily operational effectiveness reporting to the Information Security Officer
  • Create and update weekly dashboard view of cyber risk ratings in the organisation
  • Prepare reports for circulation to the management teams related to investigations and treats for the month; this will also be rolled up into quarterly reporting
  • Support with managing vendor resource deliverables to ensure quality and consistency of services
  • Audit vendor services and report on non‑performance or execution deficiencies to the Information Security Officer

Risk & Quality Management within one’s area of responsibility

  • Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer
  • Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence
  • Guide teams throughout the organisation, imparting knowledge to enable employees to become Technology Security champions
  • Create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimisation, playbooks, and exercise development
  • Assists with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate
  • To be the point of contact that interface between vendors and business units during audits, assessments or security reviews as per mandate
  • Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc.) and/or legal requirements as it relates to securing of data
  • Drive compliance regarding Information Security business continuity planning
  • Subscribe and align to SBV Services\’ ISO 9001:2015 Quality Management Standards, ensuring the department’s processes and quality management system is at all times in compliance with the standard
  • Support SBVs ESG journey, reporting on and managing the ESG requirements to ensure a positive reflection and outcome

Create awareness of IT Security good practices to the relevant stakeholders through communication and training

  • Foster relationships within the organization in order to implement security interventions that are relevant to current business needs
  • Work across the organization to present contextual risk information to business colleagues, influencing strategic and operational decisions
  • Lead and collaborate on lessons learned and root cause activities, including incident response processes until closure with all relevant stakeholders
  • Drive compliance with Cyber security Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non‑compliant staff
  • Develops security awareness by providing orientation, educational programs, and on‑going communication
  • Develop, document and distribute how‑to guides and update the internal knowledge base

Adhere to Process and Policy

  • Strives for 0 data material breaches and findings in Audits
  • Drives any audit findings departmentally providing regular feedback to the Information Security Officer
  • Manage internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance
  • Create and maintain appropriate standard operating procedures for Information Security, including business continuity plans
  • Establishes system controls by developing a framework for controls and levels of access, recommending improvements
  • Comply with established security configuration standards and best practices

Drive compliance of the audit framework

  • Monitor and drive compliance against the audit framework. Logical access, physical access, change management, security controls (hardware, software and data levels). Implement additional processes, such as Segregation of Duties, Password Safes and Audit trails, to address the risk posed by privileged Technology users
  • Conduct reviews and assessments according to policies and standards set out (across PM Lifecycle and SDLC)
  • Conduct internal and external security audits, providing recommendations to close any potential gaps within the process and or system
  • Conduct technical security reviews and perform technical risk assessments

Support the SBV United Ethos

  • Act as a coach or guide to new employees within the department, peers and others
  • Contribute to building a knowledge sharing culture within the department
  • Where applicable, take the opportunity to upskill oneself on future skill sets and other roles with the department/SBV

Lead as an Ambassador and executor of Change.

  • Act as a change management architect in periods of change to ensure business continuity
  • Manage the integration of business units into a seamless end to end solution for customers
  • Effectively communicate and embed new processes and procedures as they occur, addressing or escalating matters/ concerns to the SME’s (subject matter experts) when required
  • Facilitate the necessary presentations, workshops, or forums to ensure consistent and accurate communication is given across one’s portfolio

Requirements

  • 5 Years’ experience within either an Information Security position or Cybersecurity, which includes protection against social engineering, or security vulnerability remediation, of which:
  • 2 Years’ IT administration experience
  • 2 Years’ Ethical Hacking experience
  • In-depth knowledge of Cloud security platform (MS Intune / O365 Security, etc.)
  • In-depth knowledge of Firewalls and Malicious Code Defense including APT
  • Knowledge of Cybersecurity technical assessments, standards, tools, and processes
  • Knowledge of common attack vectors
  • Knowledge of Vulnerability assessment tools (Nessus, Nmap)
  • Endpoint and network security tools/techniques

Requirement: Education

  • Bachelor’s degree in Information Security or similar
  • Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC‑Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE, ISO27001 (Candidates with certifications will be given preferential reviews)

NB: Communication will be limited to shortlisted candidates only.

SBV recruitment is committed to transformation and diversity alignment.

Work Level: Management

Job Type: Permanent

Salary: Market Related

EE Position: No

Location: Houghton

#J-18808-Ljbffr

Information Security Analyst L2 employer: SBV South Africa

At SBV, we pride ourselves on being an exceptional employer that fosters a culture of innovation and collaboration in the heart of Houghton. Our commitment to employee growth is evident through continuous training opportunities and a supportive environment that encourages knowledge sharing and professional development. With a focus on cybersecurity excellence, we offer competitive benefits and a dynamic workplace where your contributions directly impact our mission to enhance technology security across the organisation.
S

Contact Detail:

SBV South Africa Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Information Security Analyst L2

✨Network Like a Pro

Get out there and connect with people in the industry! Attend meetups, webinars, or conferences related to cybersecurity. You never know who might have a lead on your dream job or can offer valuable insights.

✨Show Off Your Skills

Don’t just list your skills on your CV; demonstrate them! Create a portfolio showcasing your projects, whether it’s vulnerability assessments or security solutions you’ve implemented. This gives potential employers a taste of what you can do.

✨Ace the Interview

Prepare for interviews by researching common cybersecurity scenarios and how you would handle them. Practice articulating your thought process clearly, as this shows your problem-solving skills and technical knowledge.

✨Apply Through Our Website

Make sure to apply directly through our website for the best chance at landing that Information Security Analyst role. It streamlines the process and ensures your application gets the attention it deserves!

We think you need these skills to ace Information Security Analyst L2

Cyber Security Road Map Development
Best Practices for Technology Security
Problem-Solving Solutions
Standard Operating Procedures Creation
Security Breach Analysis
Threat Prediction and Response
Vulnerability Assessment
Incident Response Management
Vendor Management
Risk Exposure Assessment
Security Solution Design and Implementation
Compliance with ISO 9001:2015
Technical Security Reviews
Security Awareness Training
Cloud Security Knowledge

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Information Security Analyst role. Highlight relevant experience, especially in cybersecurity and IT administration, and don’t forget to mention any certifications you have that align with the job description.

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your skills can help us at StudySmarter. Be specific about your achievements and how they relate to the responsibilities listed in the job description.

Showcase Your Problem-Solving Skills: In your application, give examples of how you've identified and solved security issues in the past. We love innovative thinkers, so share any unique solutions you've implemented that improved security or efficiency.

Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!

How to prepare for a job interview at SBV South Africa

✨Know Your Cybersecurity Basics

Make sure you brush up on the fundamentals of cybersecurity, especially those mentioned in the job description. Be ready to discuss your experience with firewalls, vulnerability assessments, and incident response. This will show that you’re not just familiar with the terms but can apply them in real-world scenarios.

✨Showcase Your Problem-Solving Skills

Prepare examples of how you've identified and resolved security threats in the past. Use the STAR method (Situation, Task, Action, Result) to structure your answers. This will help demonstrate your analytical skills and ability to think critically under pressure.

✨Familiarise Yourself with Current Threats

Stay updated on the latest cybersecurity threats and trends. Being able to discuss recent incidents or emerging vulnerabilities will impress your interviewers and show that you’re proactive about your professional development.

✨Ask Insightful Questions

Prepare thoughtful questions about the company's cybersecurity strategies and challenges. This not only shows your interest in the role but also gives you a chance to assess if the company aligns with your career goals and values.

Information Security Analyst L2
SBV South Africa
Location: Houghton

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

S
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>