IT Security Analyst

 

Recruiter:

Data Centrix

Job Ref:

JHB005589/Colet

Date posted:

Monday, September 13, 2021

Location:

Centurion, South Africa


SUMMARY:

IT Security Analyst – Centurion Based

My client based in Centurion is recruiting for an IT Security Analyst.  The IT Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits, assessments, and assurance reporting.

The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.

Required Experience:

Extensive experience with Cisco Secure Firewall Management Centre.

Experience with Cisco Identity Services Engine.

4 years of Information Security experience.



POSITION INFO:

Qualifications:

  • Extensive experience with Cisco Secure Firewall Management Centre.
  • Experience with Cisco Identity Services Engine.
  • 4 years of Information Security experience

Detailed Outputs of Key Performance Areas:

  • Strategy & Planning

Participate in the planning and design of enterprise security architecture, under the direction of the IT Network Architect, where appropriate.

Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Network Architect, where appropriate.

Participate in the planning and design of an enterprise business continuity plan and disaster recovery plan, under the direction of the IT Network Architect, where appropriate.

 

  • Acquisition & Deployment

Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.

Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.

  • Operational Management

Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices).

Maintain operational configurations of all in-place security solutions as per the established baselines.

Monitor all in-place security solutions for efficient and appropriate operations.

Review logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.

Participate in investigations into problematic activity.

Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.

Provide on-call support for end users for all in-place security solutions.

Coordinate remediation of threats, vulnerabilities, and infections.

Maintain security incident records.

Provide monthly security posture reporting.

Assist with patch management, windows patches with critical and important ratings.

Assist with endpoint protection platform as well as endpoint detection and response.

  • Perform Departmental Tasks

Assist IT personnel with onsite/remote technical support as and when required in accordance with departmental requirements and relevant procedures.

Assist IT personnel with resolving technical issues as required in accordance with relevant procedures.

 

 

 



 

NB! This job is now closed. You can apply for other jobs by uploading your CV.



 

 

 

Similar jobs you might be interested in:

IT Security Analyst (Penetration Testing/Red Teaming/Research & Development)
Location: Johannesburg
Salary: 40-50K
Our client in Sandton who provides it Security Solutions has a vacant position for a "Security analyst".
36 days ago


1015 IT Security Engineer (Senior)
Location: Menlyn
Salary:
ESSENTIAL SKILLS:Min. 3 years of professional experience in the implementation and support of Microsoft Enterprise itarchitectures with a focus on Identity and Access Management Systems.Expert experience in implementing and administering Microsoft Entra ID, Entra ID Connect and ActiveDirectory, together with the good knowledge in authentication protocols (Kerberos, SAML, OAUTH/OIDC)Advanced experi...
11 days ago


TTD IT Security Engineer (JAVA) (Senior) 2124
Location: Midrand
Salary:
Are you a Senior it Security Engineer with a strong background in Identity & Access Management, Java development, and cloud security? This is an exciting opportunity to join a high-performing team responsible for delivering secure authentication platforms used across modern digital services, applications, and cloud environments.You’ll play a key role in designing and supporting enterpris...
19 days ago


2124 IT Security Engineer (Senior) TTD
Location: Menlyn
Salary:
ESSENTIAL SKILLS:Expert JAVA EE development knowledgeKnowledge of authentication solutions, SAML, OpenID Connect, API GatewayExpert knowledge in the areas of web and cloud technologiesExpertise in agile development and DevOpsKnowledge of current it architectures, manufacturers and trendsStrong sense of reliability, being available to support after-hours as required.Proven experience in a strong le...
15 days ago


Security Analyst
Location: Johannesburg
Salary:
We are looking for a proactive and detail-oriented Security/SOC/Cybersecurity analyst (L1/L2) to join our growing cybersecurity team. In this role, you will be responsible for protecting a Microsoft-centric cloud and enterprise environment, with a strong focus on threat detection, investigation, and response.
6 days ago


Senior Operational Risk Manager
Location: Johannesburg
Salary:
Are you an experienced risk leader ready to drive enterprise-wide operational risk maturity in a highly regulated environment? This is a senior opportunity for a strategic thinker with strong governance, assurance, and stakeholder influence capabilities.
6 days ago


Data Analyst
Location: Johannesburg
Salary:
Are you a detail‑driven Data analyst who enjoys turning complex data into clear, actionable business insights? Join a forward‑thinking environment where your analytical skills will directly influence operational, tactical, and strategic decision‑making.
6 days ago


Senior Data Analyst
Location: Centurion
Salary:
Are you a data-driven specialist who thrives on turning complex data into powerful business insights? This is an opportunity to make a real impact by driving strategy, managing risk, and shaping data-driven decision-making in a highly regulated environment.
6 days ago


Service Desk Coordinator
Location: Johannesburg
Salary: Annually
Seeking a Service Desk Coordinator within it service management as a defined by the itIL. The main function will be to support the it infrastructure in the RUN and/or Build team at a Technician-level.
19 days ago


AI Specialist
Location: Johannesburg
Salary: Annually
The AI Engineer will be responsible for designing, developing and maintaining advanced AI systems to support strategic objectives across voice and digital customer interaction channels. This includes the creation of production-grade AI voice bots, text bots, AI-driven QA systems for call audits and bespoke NLP/NLU systems.
19 days ago


Create a free job alert for IT Security Analyst in Centurion

Enter your email address below and we will email you similar jobs when they become available:

You can cancel at any time. We will not spam you.
By giving us your email address your agree to our Terms and Conditions