Cybersecurity Analyst
Western Cape, South Africa
Key Responsibilities
Identity and Access Management (IAM)
- Perform daily health checks for the IAM solution and remediate accordingly.
- Manage user lifecycles (creation, modification, deletion) and ensure access aligns with job roles and least privilege principles.
- Conduct monthly/periodic user access reviews to identify and remove unnecessary privileges.
- Perform daily health checks for the VM solution and remediate accordingly.
- Scan vendor-specific and third-party vulnerability alerts and reports to ensure TFG-related infrastructure and applications are monitored.
- Analyse and investigate vulnerability advisories to identify potential issues.
- Collaborate with team members to develop communications to affected stakeholders regarding identified vulnerabilities.
- Configure, run and evaluate vulnerability scans.
- Provide vulnerability management reports to key stakeholders including remediation strategies for recorded vulnerabilities.
Network Security
- Perform daily health checks for the network access control solution and remediate accordingly.
- Respond promptly to network access-related incidents, provide initial analysis, remediate issues timeously to ensure there is limited impact to user productivity.
- Document and report network access-related incidents, ensuring accurate and comprehensive records.
- Follow established incident response procedures, playbooks and contribute to their enhancement.
Data Protection
- Perform daily health checks for the data leakage prevention solution and remediate accordingly.
- Assist first-line analysts in reviewing DLP incidents.
- Assist second-line analysts with DLP investigations.
- Engage with business stakeholders to improve DLP policies to reduce false positives
- Work with IT teams to ensure DLP security configurations align with organisational standards.
Experience and Qualifications
- Relevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience.
- One or more certifications in: Network Access Control, Security+, Microsoft Certifications, Vulnerability Management
- Must have 1-3 years’ experience in a Cybersecurity related role
- Familiarity with network access control tools, vulnerability management tools, data leakage prevention tools
Skills
- Basic understanding of network protocols, operating systems, and security technologies.
- Strong analytical and problem-solving skills.
- Knowledge of security principles and best practices.
- Knowledge and skill in using automation tools.
- Effective communication and collaboration skills.
Behaviours:
- Action Oriented - readily takes on new challenges and opportunities with a sense of urgency and eagerness
- Communicates Effectively - conveys information and communicates ideas in a clear, concise and impactful manner
- Courage - confronts and tackles challenging situations with courage
- Decision Quality - consistently makes timely, well-rounded and informed decisions
- Ensures Accountability - takes accountability and ensures others are held to account on agreed upon performance targets
- Manages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problems
- Plans and Aligns - develops plans and prioritises initiatives that align to the organisational goals and objectives
- Tech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growth
Preference will be given, but not limited to candidates from designated groups in terms of the Employment Equity Act.
Who we are is because of our people. They are our greatest asset. TFG is an internationally diversified retail portfolio of 34 speciality lifestyle and apparel brands that Inspire our Customers to live their Best Lives and are woven into the lives of millions. Our vision is to create the most remarkable omnichannel experiences for our customers. TFG is more than a workplace, it's a launchpad for your growth. Join us and explore endless growth opportunities across our diverse brands. We’re a purpose-led business, and on this team, you’ll share the pride of making an impact across a whole industry.
We’re the designers, the makers, the shakers and the teams behind the scenes.
Are you with us?
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation Computer Science IAM Incident response Network security Vulnerabilities Vulnerability management Vulnerability scans
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Security Operations Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Architect jobs
- Open IT Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Information System Security Officer jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Analytics-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open Vulnerability management-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security assessment-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open Java-related jobs
- Open EDR-related jobs
- Open TS/SCI-related jobs