Information Security Analyst L1 ( Talent Pool )

SBV Services (Pty) Ltd.
Selby
1 month ago
Create job alert

Information Security Analyst L1 (Talent Pool) (Selby)

Date:2022/11/02

Reference Number:ISAKAP

Description:

SBV seeks an Information Security Analyst L1 who will be responsible for analysing information security events and responding to identified threats including the auditing and validation of mandated security controls. This role will also assist in implementing, upgrading, and monitoring security protocols, processes, and compliance for the protection of the organisation's networks and information.

Responsibilities:

  1. Gather information related to Technology Transformation & Innovation:
    • Research the latest information technology security threats and trends globally and use this information to provide the management team with the required information to implement solutions to protect SBV’s data.
    • Adopt the strategic direction provided in order to execute duties, providing feedback as and when required.
  2. Conduct Analysis & Planning Activities:
    • Gather evidence required for security and vulnerability assessments, providing findings to the Information Security Analyst L2 for review and reporting.
    • Conduct investigations on uses of data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
    • Analyse security breaches to determine their root cause providing findings and recommendations to the Information Security Officer.
    • Conduct log correlation in the event of a breach or suspected data loss incident for investigative purposes. Evidence gathering to be presented to the Information Security Officer in the form of a report.
  3. Provide input into the Design for your area of responsibility:
    • Create content and drive security awareness through facilitating orientation, educational programs, and ongoing communication.
    • Investigate security remediation toolsets that will allow for automation on system threats through software development or off-the-shelf tools.
    • Compile a business case outlining the preferred toolset, submitting for approval to the Information Security Officer.
    • Proactively configure and monitor security alerts relating to incidents and disasters to reduce the likelihood of breach on the environment.
  4. Implementation & Execution within mandate:
    • Support Information Security Analyst L2 to conduct internal and external security reviews by conducting interviews, running toolsets, and consolidating the information to provide recommendations to close any potential gaps within the process and/or system.
    • Identify and respond to threats to meet or exceed defined SLAs, escalating where necessary.
    • Mitigate incidents and provide accurate documentation around the resolution process.
    • Verify authorized access by conducting reviews of logical access on systems.
    • Monitor and remediate network, intrusion detection, and prevention systems on a daily basis for security breaches and investigate and report to the Information Security Officer when a violation occurs.
    • Monitor the information security compliance against SBV’s standards and best practices.
    • Gather information and prepare reports that document security breaches and system compliance within the landscape.
  5. Risk & Quality Management within one’s area of responsibility:
    • Conduct vulnerability testing, risk analyses, and security assessments providing findings to the Information Security Analyst L2.
    • Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence.
    • Support the Information Security Analyst L2 to create a collaborative program to coordinate and drive operational activities related to Cyber Security, including event and incident investigation, process development and optimization, playbooks, and exercise development.
    • Assist with managing vendor resource deliverables to ensure quality and consistency against SLA as per mandate.
    • Be the point of contact that interfaces between vendors and business units during audits, assessments, or security reviews as per mandate.
    • Advise Technology business partners on regulatory, compliance (POPI, PAIA, etc.) and/or legal requirements as it relates to securing data.
    • Drive compliance regarding Information Security business continuity planning.
  6. Create awareness of IT Security good practices to the relevant stakeholders through communication and training:
    • Provide system users with assistance and guidance about new security products and procedures.
    • Drive compliance with Cybersecurity Training, in conjunction with Organisational Development, and awareness including alerting and escalations of non-compliant staff.
    • Deliver security awareness through facilitating orientation, educational programs, and ongoing communication.
    • Develop, document, and distribute how-to guides and update the internal knowledge base.
  7. Adhere to Process and Policy:
    • Monitor systems to drive zero data material breaches and findings in audits.
    • Drive the closure of audit findings departmentally providing regular feedback.
    • Support checks and monitoring of the internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance.
    • Monitor and drive compliance with established security configuration standards and best practices. Verify compliance with established security configuration standards and best practices.
  8. Drive the organisation culture within one’s centre:
    • Drive the department’s values while inspiring confidence and generating excitement, enthusiasm, and commitment towards the mission.
    • Serve as a leader of the culture program driving the desired behaviours and encouraging employee engagement.
    • Create and implement strategies in collaboration with Change Management & HR to evaluate and maintain employee satisfaction.
    • Drive Transformation and BBB-EE initiatives to ensure sustainable alignment to the company scorecard.
  9. Provide leadership to employees within the organisation:
    • Act as a change management architect in periods of change to ensure continuity of operations.
    • Effectively communicate and embed new processes and procedures as they occur addressing or escalating matters/concerns to the SMEs (subject matter experts) when required.
    • Facilitate the necessary presentations, workshops, or forums to ensure consistent and accurate communication is given across one’s centre/s.

Requirements:

  • 2 Years’ experience within either an Information Security position or Cybersecurity, of which:
  • In-depth knowledge of Cloud security platforms (MS Intune / O365 Security, etc.) (Advantageous).
  • In-depth knowledge of Firewalls and Malicious Code Defense including APT (Advantageous).
  • Knowledge of Cybersecurity technical assessments, standards, tools, and processes (Advantageous).
  • Knowledge of common attack vectors (Advantageous).
  • Knowledge of Vulnerability assessment tools (Nessus, Nmap) (Advantageous).
  • Endpoint and network security tools/techniques (Advantageous).
  • Bachelor’s degree in Information Security or similar.
  • Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE ISO 27001 (advantageous).

Note:Communication will be limited to shortlisted applicants only.

SBV recruitment is committed to transformation and diversity alignment.

#J-18808-Ljbffr

Related Jobs

View all jobs

Network and Security Engineer

Information Security Analyst

Information Security Analyst

Information Security Analyst

Information Security Analyst • London London

Information Security Analyst 2

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Job-Hunting During Economic Uncertainty: Cyber Security Edition

The cybe rsecurity sector sits at the forefront of today’s digital landscape, defending businesses and governments alike from increasingly sophisticated threats. From incident response and network security to cloud protections and zero-trust architectures, cyber security professionals tackle an ever-evolving array of challenges. Yet, even this mission-critical field is not immune to economic turbulence. When broader financial markets experience uncertainty—whether through global recessions, regional downturns, or unexpected macro events—the hiring climate can shift, making roles more selective and budgets tighter. For job seekers in cyber security, this can be disconcerting. You might discover that once-abundant vacancies have become scarce, competition for the remaining positions is fiercer, or company priorities pivot away from large-scale expansions toward essential, cost-justified security projects. At the same time, data breaches and cyberattacks don’t pause during economic slowdowns—if anything, they may escalate as bad actors exploit organizational vulnerabilities. This paradox means that while the market feels tough, demand for cyber security expertise remains robust. In this article, we’ll look at: Why economic uncertainty affects cyber security hiring trends. Strategies for staying competitive, even if the number of open roles shrinks. Methods to highlight your skills, adapt to shifting priorities, and network effectively. Approaches for preserving mental well-being during prolonged searches or uncertain feedback loops. How www.cybersecurityjobs.tech can help you find the ideal security-focused role. By proactively sharpening your skill set, tailoring your professional profile, and engaging with a focused community, you can secure a rewarding cyber security job—even when the broader market feels volatile.

How to Achieve Work-Life Balance in Cyber Security Jobs: Realistic Strategies and Mental Health Tips

Cyber security is one of today’s most vital and rapidly expanding sectors. As data breaches, ransomware, and other cyber threats continue to evolve, the demand for skilled professionals is surging across industries—from finance and healthcare to government and e-commerce. Whether you’re a penetration tester, security analyst, or threat intelligence expert, you play a key role in safeguarding digital infrastructure and sensitive information. This high-stakes environment, however, often comes with intense pressure. Long hours, constant vigilance, and an ever-changing threat landscape can make it challenging to find time for personal well-being. Many cyber security specialists report difficulty striking a sustainable work-life balance, unsure if it’s even possible in a field that never truly sleeps. Yet, as concerns about mental health and burnout become more pressing, professionals and employers alike are seeking better ways to combine career advancement with a fulfilling personal life. In this comprehensive article, we’ll explore how to achieve a work-life balance in cyber security. You’ll discover strategies for managing 24/7 threat alerts, the importance of realistic expectations, ways to maintain mental health in high-intensity roles, and tips for setting boundaries without compromising your professional growth. Whether you’re new to this dynamic arena or already an established specialist, these insights can help you thrive personally and professionally in the fast-paced world of cyber security.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.