Information Security Analyst L2 ( Talent pool )
Information Security Analyst L2 ( Talent pool )

Information Security Analyst L2 ( Talent pool )

Full-Time 30000 - 42000 Β£ / year (est.) No home office possible
Go Premium
S

At a Glance

  • Tasks: Join us as an Information Security Analyst L2, tackling tech risks and enhancing cybersecurity.
  • Company: SBV South Africa is dedicated to creating a secure digital environment.
  • Benefits: Enjoy a full-time role with opportunities for growth and development in a dynamic field.
  • Why this job: Be part of a mission-driven team that values innovation and security awareness.
  • Qualifications: You need 5 years in Information Security, including IT administration and ethical hacking experience.
  • Other info: This is an entry-level position with a focus on transformation and diversity.

The predicted salary is between 30000 - 42000 Β£ per year.

Information Security Analyst L2 ( Talent pool )

Join to apply for the Information Security Analyst L2 ( Talent pool ) role at SBV South Africa

Information Security Analyst L2 ( Talent pool )

Join to apply for the Information Security Analyst L2 ( Talent pool ) role at SBV South Africa

Description

SBV seeks an Information Security Analyst L2 who will Conduct all activities related to technology risks and remediations to protect the SBV ecosystem from potential threats including partnering with SBV Employees and vendors to drive a Cyber security conscious organisation.

Description

SBV seeks an Information Security Analyst L2 who will Conduct all activities related to technology risks and remediations to protect the SBV ecosystem from potential threats including partnering with SBV Employees and vendors to drive a Cyber security conscious organisation.

Support Technology Transformation & Innovation in your area of responsibility

  • Support with developing and maintaining Cyber Security Road Map and interventions
  • Support with developing company-wide best practices for Technology security
  • Support improving the maturity, or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions.
  • Creates and maintain appropriate standard operating procedures for the Cyber Security and information protection.

Support on Analysis & Planning Activities

  • Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and other factors that indicate security risks as per SLA.
  • Researching, investigating and developing proficiency in current and emerging threats, vulnerabilities, and security technology developments.
  • Play an active role in Technology Security Planning sessions, driving agenda and deliverables with all participants.
  • Support managing Vendor Strategy and roadmap for Information Security
  • Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction within mandate
  • Assessment of the organisation\’s technology risk exposure and measurement of the various parameters that make up technology risks.

Support the Design for your area of responsibility

  • Work closely with other stakeholders to design, architect, consult and implement security solutions to ensure readiness for security technologies
  • In support of program design, gather client requirements and draft documentation in order to compile a draft project plan, only more complex programs need to be reviewed by the Information Security Officer
  • Identify the desired outcomes and success criteria which is to be the baseline for post project review and benefit realisation validation, as well as measuring positive effects.
  • Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated
  • Drafts procedures and or policies with regards to cyber security submitting them to the Information Security Officer for review and authorisation.

Implementation & Execution within mandate

  • Monitor and analyse Cybersecurity operational services, including intrusion detection and prevention, situational awareness of:
  • network intrusions.
  • security events.
  • data spillage; and.
  • Incident response actions.
  • Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans
  • Investigate improper access to ensure proper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements including but not limited to privilege account management.
  • Provide daily operational effectiveness reporting to the Information Security Officer
  • Create and update weekly dashboard view of cyber risk ratings in the organisation.
  • Prepare reports for circulation to the management teams related to investigations and treats for the month, this will also be rolled up into quarterly reporting.
  • Support with managing vendor resource deliverables to ensure quality and consistency of services
  • Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer
  • Risk & Quality Management within one’s area of responsibility

    • Drives vulnerability testing, risk analyses and security assessments providing findings to the Information Security Officer
    • Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence.
    • Guide teams throughout the organisation, imparting knowledge to enable employees to become Technology Security champions
    • Create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimization, playbooks, and exercise development.
    • Assists with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate
    • To be the point of contact that interface between vendors and business units during audits, assessments or security reviews as per mandate
    • Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc) and/or legal requirements as it relates to securing of data.
    • Drive compliance regarding Information Security business continuity planning.

    Create awareness of IT Security good practices to the relevant stakeholders through communication and training

    • Foster relationships within the organization in order to implement security interventions that are relevant to current business needs.
    • Work across the organization to present contextual risk information to business colleagues, influencing strategic and operational decisions.
    • Lead and collaborate on lessons learned and root cause activities, including incident response processes until closure with all relevant stakeholders.
    • Drive compliance with Cyber security Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non-compliant staff
    • Develops security awareness by providing orientation, educational programs, and on-going communication.
    • Develop, document and distribute how-to guides and update the internal knowledge base

    Adhere to Process and Policy

    • Strives for 0 data material breaches and findings in Audits
    • Drives any audit findings departmentally providing regular feedback to the Information Security Officer
    • Manage internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance
    • Create and maintain appropriate standard operating procedures for Information Security, including business continuity plans.
    • Establishes system controls by developing a framework for controls and levels of access, recommending improvements.
    • Comply with established security configuration standards and best practices.

    Drive compliance of the audit framework

    • Monitor and drive compliance against the audit framework. Logical access, physical access, change management, security controls (hardware, software and data levels). Implement additional processes, such as Segregation of Duties, Password Safes and Audit trails, to address the risk posed by privileged Technology users.
    • Conduct reviews and assessments according to policies and standards set out (across PM Lifecycle and SDLC).
    • Conduct internal and external security audits, providing recommendations to close any potential gaps within the process and or system
    • Conduct technical security reviews and perform technical risk assessments.

    Support the SBV United Ethos

    • Act as a coach or guide to new employees within the department, peers and others
    • Contribute to building a knowledge sharing culture within the department
    • Where applicable, take the opportunity to upskill oneself on future skill sets and other roles with the department/SBV

    Drive the organisation culture within one’s centre

    • Drive the department’s values while inspiring confidence and generating excitement, enthusiasm and commitment towards the mission.
    • Serve as a leader of the culture program driving the desired behaviours and encouraging employee engagement
    • Create and implement strategies in collaboration with Change Management & HR to evaluate and maintain employee satisfaction
    • Drive Transformation and BBB-EE initiatives to ensure sustainable alignment to the company scorecard

    Provide leadership to employees within the organisation, creating a winning culture and high moral Lead as an Ambassador and executor of Change

    • Act as a change management architect in periods of change to ensure continuity to operations
    • Effectively communicate and embed new processes and procedures as they occur addressing or escalating matters / concerns to the SME’s (subject matter experts) when required
    • Facilitate the necessary presentations, workshops or forums to ensure consistent and accurate communication is given across one’s centre/s

    Requirements

    Minimum Requirements: Work Experience

    • 5 Years’ experience within either an Information Security position or Cybersecurity, which include protection against social engineering, or security vulnerability remediation, of which:
    • 2 Years’ IT administration experience
    • 2 Years’ Ethical Hacking experience
    • In-depth knowledge of Cloud security platform (MS Intune / O365 Security, etc.)
    • In-depth knowledge of Firewalls and Malicious Code Defense including APT
    • Knowledge of Cybersecurity technical assessments, standards, tools, and processes
    • Knowledge of common attack vectors
    • Knowledge of Vulnerability assessment tools (Nessus, Nmap)
    • Endpoint and network security tools/techniques

    Minimum Requirements: Education

    • Bachelor’s degree in Information Security or similar.
    • Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE, ISO27001 (Candidates with certifications will be given preferential reviews

    NB: Communication will be limited to shortlisted applicants only

    SBV recruitment is committed to transformation and diversity alignment

    Work Level

    Management

    Job Type

    Permanent

    Salary

    Market Related

    EE Position

    Yes

    Location

    Selby

    Seniority level

    • Seniority level

      Entry level

    Employment type

    • Employment type

      Full-time

    Job function

    • Job function

      Information Technology

    • Industries

      Security and Investigations

    Referrals increase your chances of interviewing at SBV South Africa by 2x

    Get notified about new Information Security Analyst jobs in Selby, England, United Kingdom.

    Junior SOC Analyst – National Security West

    Leeds, England, United Kingdom 13 hours ago

    Junior SOC Analyst – National Security West

    Leeds, England, United Kingdom 13 hours ago

    Leeds, England, United Kingdom 2 days ago

    Cyber Threat Analyst – National Security West

    Leeds, England, United Kingdom 12 hours ago

    Cyber Threat Analyst – National Security West

    Leeds, England, United Kingdom 1 week ago

    Front Line Analyst – National Security – Leeds

    Leeds, England, United Kingdom 6 days ago

    Front Line Analyst – National Security – Leeds

    Leeds, England, United Kingdom 6 days ago

    Cyber Security Analyst – OT (Operational Technology)

    Selby, England, United Kingdom 5 days ago

    We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

    #J-18808-Ljbffr

    Information Security Analyst L2 ( Talent pool ) employer: SBV South Africa

    SBV South Africa is an exceptional employer that prioritises a culture of innovation and collaboration, particularly in the dynamic field of Information Security. Employees benefit from comprehensive training programs, opportunities for professional growth, and a commitment to diversity and transformation, all while working in the vibrant location of Selby. With a focus on fostering a cybersecurity-conscious organisation, SBV empowers its team members to make meaningful contributions to the safety and integrity of technology systems.
    S

    Contact Detail:

    SBV South Africa Recruiting Team

    StudySmarter Expert Advice 🀫

    We think this is how you could land Information Security Analyst L2 ( Talent pool )

    ✨Tip Number 1

    Familiarise yourself with the latest trends in cybersecurity, especially those related to technology risks and vulnerabilities. Being well-versed in current threats will not only help you during interviews but also demonstrate your proactive approach to staying informed.

    ✨Tip Number 2

    Network with professionals in the cybersecurity field, particularly those who work at SBV or similar organisations. Engaging in conversations about their experiences can provide valuable insights and potentially lead to referrals.

    ✨Tip Number 3

    Consider obtaining relevant certifications such as CISSP or CEH if you haven't already. These credentials can significantly enhance your profile and show your commitment to professional development in information security.

    ✨Tip Number 4

    Prepare for potential technical assessments by practising with tools like Nessus or Nmap. Familiarity with these tools will not only boost your confidence but also showcase your hands-on skills during the interview process.

    We think you need these skills to ace Information Security Analyst L2 ( Talent pool )

    Information Security Management
    Cybersecurity Risk Assessment
    Vulnerability Management
    Incident Response
    Network Security
    Cloud Security (MS Intune / O365 Security)
    Ethical Hacking
    Security Auditing
    Technical Security Reviews
    Knowledge of Cybersecurity Standards and Frameworks
    Communication Skills
    Problem-Solving Skills
    Collaboration and Teamwork
    Project Management
    Regulatory Compliance (POPI, PAIA)
    Training and Awareness Development
    Analytical Skills
    Attention to Detail
    Adaptability
    Continuous Learning

    Some tips for your application 🫑

    Tailor Your CV: Make sure your CV highlights relevant experience in information security and cybersecurity. Focus on your skills in risk assessment, vulnerability remediation, and any specific tools or technologies mentioned in the job description.

    Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your understanding of the role. Mention specific experiences that align with the responsibilities outlined in the job description, such as managing vendor strategies or conducting security assessments.

    Highlight Relevant Certifications: If you have industry certifications like CISSP, CEH, or Security+, make sure to prominently feature them in your application. These credentials can set you apart from other candidates and demonstrate your commitment to the field.

    Showcase Problem-Solving Skills: In your application, provide examples of how you've identified and resolved security vulnerabilities in past roles. This could include specific incidents where you successfully mitigated risks or improved security protocols.

    How to prepare for a job interview at SBV South Africa

    ✨Know Your Cybersecurity Fundamentals

    Make sure you have a solid understanding of key cybersecurity concepts, such as threat detection, vulnerability management, and incident response. Be prepared to discuss how these principles apply to the role and provide examples from your past experience.

    ✨Familiarise Yourself with Relevant Tools

    Since the role requires knowledge of tools like Nessus and Nmap, ensure you can speak confidently about your experience with these or similar tools. Highlight any specific projects where you used them to identify vulnerabilities or enhance security measures.

    ✨Demonstrate Problem-Solving Skills

    Be ready to showcase your analytical skills by discussing how you've approached complex security challenges in the past. Use the STAR method (Situation, Task, Action, Result) to structure your responses and illustrate your problem-solving process.

    ✨Show Enthusiasm for Continuous Learning

    Cybersecurity is an ever-evolving field, so express your commitment to staying updated on the latest trends and technologies. Mention any relevant certifications you hold or are pursuing, and discuss how you plan to further your knowledge in this area.

    Information Security Analyst L2 ( Talent pool )
    SBV South Africa
    Go Premium

    Land your dream job quicker with Premium

    You’re marked as a top applicant with our partner companies
    Individual CV and cover letter feedback including tailoring to specific job roles
    Be among the first applications for new jobs with our AI application
    1:1 support and career advice from our career coaches
    Go Premium

    Money-back if you don't land a job in 6-months

    S
    • Information Security Analyst L2 ( Talent pool )

      Full-Time
      30000 - 42000 Β£ / year (est.)

      Application deadline: 2027-07-30

    • S

      SBV South Africa

    Similar positions in other companies
    UK’s top job board for Gen Z
    discover-jobs-cta
    Discover now
    >