Yesterday
Cybersecurity Analyst
TFG
South Africa,
Perform daily health checks for the IAM solution and remediate accordingly.Manage user lifecycles (creation, modification, deletion) and ensure access aligns with job roles and least privilege principles.Conduct monthly/periodic user access reviews to identify and remove unnecessary privileges.Perform daily health checks for the VM solution and remediate accordingly.Scan vendor-specific and third-party vulnerability alerts and reports to ensure TFG-related infrastructure and applications are monitored.Analyse and investigate vulnerability advisories to identify potential issues.Collaborate with team members to develop communications to affected stakeholders regarding identified vulnerabilities.Configure, run and evaluate vulnerability scans.Provide vulnerability management reports to key stakeholders including remediation strategies for recorded vulnerabilities.Network SecurityPerform daily health checks for the network access control solution and remediate accordingly.Respond promptly to network access-related incidents, provide initial analysis, remediate issues timeously to ensure there is limited impact to user productivity.Document and report network access-related incidents, ensuring accurate and comprehensive records.Follow established incident response procedures, playbooks and contribute to their enhancement.Data ProtectionPerform daily health checks for the data leakage prevention solution and remediate accordingly.Assist first-line analysts in reviewing DLP incidents.Assist second-line analysts with DLP investigations.Engage with business stakeholders to improve DLP policies to reduce false positivesWork with IT teams to ensure DLP security configurations align with organisational standards.Experience and QualificationsRelevant degree or advanced diploma in Computer Science, Information Systems, Business or related field, or equivalent combination of education/experience.One or more certifications in: Network Access Control, Security+, Microsoft Certifications, Vulnerability ManagementMust have 1-3 years’ experience in a Cybersecurity related roleFamiliarity with network access control tools, vulnerability management tools, data leakage prevention toolsSkillsBasic understanding of network protocols, operating systems, and security technologies.Strong analytical and problem-solving skills.Knowledge of security principles and best practices.Knowledge and skill in using automation tools.Effective communication and collaboration skills.Behaviours:Action Oriented - readily takes on new challenges and opportunities with a sense of urgency and eagernessCommunicates Effectively - conveys information and communicates ideas in a clear, concise and impactful mannerCourage - confronts and tackles challenging situations with courageDecision Quality - consistently makes timely, well-rounded and informed decisionsEnsures Accountability - takes accountability and ensures others are held to account on agreed upon performance targetsManages Complexity - interprets and simplifies complex and contradictory information when resolving organisational problemsPlans and Aligns - develops plans and prioritises initiatives that align to the organisational goals and objectivesTech Savvy - leverages new technology to enhance productivity, improve problem solving, and support business growthPreference will be given, but not limited to candidates from designated groups in terms of the Employment Equity Act.Who we are is because of our people. They are our greatest asset. TFG is an internationally diversified retail portfolio of 34 speciality lifestyle and apparel brands that Inspire our Customers to live their Best Lives and are woven into the lives of millions. Our vision is to create the most remarkable omnichannel experiences for our customers. TFG is more than a workplace, it's a launchpad for your growth. Join us and explore endless growth opportunities across our diverse brands. We’re a purpose-led business, and on this team, you’ll share the pride of making an impact across a whole industry.We’re the designers, the makers, the shakers and the teams behind the scenes.Explore more InfoSec / Cybersecurity career opportunitiesFind even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.#J-18808-Ljbffr
Attention! You will be redirected to another site