Specialist: Cybersecurity Analyst
3 days ago
**ROLE PURPOSE**
As part of the Customer-facing Nexio SOC team, the Specialist: Cybersecurity Analyst plays a critical role in monitoring, detecting, and responding to cybersecurity incidents within a Security Operations Center. The Cybersecurity Analyst utilizes incident handling methodologies to validate security events, assess severity levels, and provide guidance to SOC Analysts. By leveraging threat intelligence and conducting in-depth analysis, Cybersecurity Analyst identifies the scope of attacks, impacted systems, and potential perpetrators. The Cybersecurity Analyst ensures shift-related metrics are monitored, offers recommendations, and advises on containment and recovery steps. The Cybersecurity Analyst documents incidents, updates relevant documentation and supports the development of analytic methods for threat detection.
He/She should ideally have advanced security incident handling analysis experience in an established SOC environment and contribute to risk management, lead Blue Team exercises, mentor junior analysts, and develop playbooks for incident scenarios. The Cybersecurity Analyst monitors network traffic, investigates incidents, and collaborates with the SOC team to respond to threats or intrusions.
**ROLE REQUIREMENT**
- Is familiar with the tactical and long-term vision across the Cyber Security function.
- Adheres to the standard operating procedure and playbooks in the SOC.
- Impacts on Customer satisfaction and confidence in the SOC Service and service level performance.
- Provides security incident handling and technical guidance to SOC Teams.
- Gives regular, comprehensive, and constructive feedback, and coaching and mentoring to the team.
- Mentor junior analysts to enhance their effectiveness in their roles.
- Delegates work to team members taking into account their capacity, level of skill, and exposure to different types of work and complexity; provides clear instructions and direction, with reasonable deadlines.
- Validate and declare security incidents based on incident handling methodologies.
- Confirm severity levels (S0 to S4) using SLA severity classification.
- Provide guidance and support to SOC Analysts during incident response.
- Utilize threat intelligence, updated rules, and IOCs to identify affected systems and the extent of attacks.
- Conduct in-depth threat intelligence analysis to uncover attack types, data/systems impacted, and potential perpetrators.
- Monitor shift-related metrics and gather applicable reporting for the SOC Team Lead and SOC Manager.
- Make recommendations to SOC Team Lead and SOC Manager regarding additional analysis and required remediation.
- Determine the impact on critical systems or data sets and advise on remediation steps.
- Validate false positives, policy violations, intrusion attempts, security threats, and potential compromises.
- Suggest containment and recovery steps based on analysis findings.
- Document workload and output from each shift for service performance measurement.
- Formally document learnings and update relevant documentation such as shift logs and tickets.
- Provide support for analytic methods to detect threats and conduct further triage based on defined run books.
- Consolidate data through alert triage, providing necessary context before escalating to Operations and Security Engineering Teams for deeper analysis.
- Manage security events, incidents, and service requests via the ticketing systems.
- Identify alarms by intent and method, including reconnaissance, system compromises, and ingested log sources:
- Firewalls and network devices
- Infrastructure server and end-user systems
- Threat intelligence platforms
- Cloud and hybrid-IT provisioning, access, and infrastructure systems (Amazon Web Services)
- Antivirus systems
- Intrusion detection and prevention systems
- Similar in Scope source systems
- Validate and update initial tickets in the SIEM platform and Service Desk.
- Monitor event queues, investigate potential incidents, and escalate or close events as necessary.
- Validate investigation results and pass relevant details to the SOC Team Lead.
- Assess security controls based on cybersecurity principles and frameworks (e.g., CIS CSC, NIST SP 800-53).
- Analyze network traffic, characterize threats, and coordinate with cyber defense staff for validation.
- Document and escalate incidents, perform trend analysis, and report findings.
- Review security architecture, identify gaps, and recommend risk mitigation strategies.
- Plan and recommend modifications based on exercise results or system environment.
- Perform daily summary reports of network events and activity relevant to cyber defense practices.
- Provide timely detection, identification, and alerting of possible attacks, intrusions, and anomalous activities.
- Utilize cyber defense tools for monitoring and analyzing system activity, identifying and analyzing malicious behavior.
- Conduct analysis of network traffic, including network ma
-
Specialist: Cybersecurity Threat Analyst
3 days ago
Midrand, South Africa Nexio Full time**ROLE PURPOSE** As part of the Customer-facing Nexio SOC team, the Cybersecurity Threat Analyst will be responsible for monitoring enterprise networks and systems, deterring, identifying, investigating, and mitigating, any and all threats that are directed against those systems regardless of their classification level or type. The Cybersecurity Threat...
-
Midrand, South Africa Nexio Full time**ROLE PURPOSE** As part of the Customer-facing Nexio SOC team, the Cybersecurity Threat Analyst will be responsible for monitoring enterprise networks and systems, deterring, identifying, investigating, and mitigating, any and all threats that are directed against those systems regardless of their classification level or type. The Cybersecurity Threat...
-
Midrand, South Africa Nexio Full time**ROLE PURPOSE** As part of the Customer-facing Nexio SOC team, the Cybersecurity Incident Manager is a crucial role within an organization's cybersecurity team. The primary responsibility of the Cybersecurity Incident Manager is to detect, respond to, investigate, and mitigate cyber threats and incidents that occur within the organization's network and...
-
Principal Specialist Cyber Security
3 weeks ago
Midrand, South Africa Cell C Full timePrincipal Cyber Security Specialist At Cell C, we are not just a telecommunications company; we are a people‑centric, consumer‑focused organization committed to delivering exceptional experiences to our customers. In line with our dedication to customer‑centricity, we are seeking a seasoned professional Principal Specialist: Cyber Security to join our...
-
Principal Specialist Cyber Security
7 days ago
Midrand, Gauteng, South Africa Cell C Full time R1 200 000 - R1 800 000 per yearAt Cell C, we are not just a telecommunications company; we are a people-centric and consumer-focused organization committed to delivering exceptional experiences to our customers. In line with our dedication to customer-centricity, we are seeking a seasoned professionalPrincipal Specialist: Cyber Securityto join our dynamic team of #Unstoppables.Purpose of...
-
L1 Incident Analyst
1 week ago
Midrand, South Africa Liquid Tech (Pty) Ltd. Full time**Role Purpose** To deliver day-to-day managed security services (MSS), related to SOC deliverables. Critical in this regard is to execute according to Standard Operating Procedure (SOP) expectations and meeting all related service level agreements (SLAs). It is further expected that these services will be enhanced and matured so that customer value can be...
-
Data Analyst
2 weeks ago
Midrand, South Africa JustTheJob.co.za Full timeData Analyst - Midrand Job Summary Job & Company Description : An industry requiring specialist skills, deserves specialist recruitment. I am a Specialist Risk Analytics & Data recruiter working with very prestigious corporate concerns in Gauteng. Assisting you in exploring new commercial opportunities within the market is my main priority. This will allow...
-
Service Analyst
7 days ago
Midrand, South Africa Nexio Full time**ROLE PURPOSE** Nexio is a specialist ICT solution provider that helps clients build, support, and manage their IT infrastructures. We have operations in all 9 provinces across the country, over 200 clients and over 600 employees and as a Level 1 BBBEE we put to practice our commitment to South Africa’s transformation agenda, we are at the forefront of...
-
L3 Security Incident Handling Analyst
2 weeks ago
Midrand, South Africa Nexio Full time**ROLE PURPOSE** As part of the Customer-facing Nexio SOC team, the L3 Security Incident Handling Analyst will be responsible for monitoring enterprise networks and systems, detecting events and reporting on any and all threats that are directed against those systems regardless of their classification level or type. The L3 Security Incident Handling Analyst...
-
Business Development Manager
7 days ago
Midrand, Gauteng, South Africa Network1 Full time R900 000 - R1 200 000 per yearOur client is seeking an experienced and dynamic Business Development Manager to join their Gauteng team. This is a pivotal role for a strategic thinker with a proven track record in driving revenue growth through innovative sales strategies. Key Responsibilities:Sales Strategy Implementation: Develop and execute sales strategies to achieve revenue growth...