Job category: Medical Research and Laboratory Sciences
Location: Roodepoort
Contract: Permanent
Business Unit: Constantia Kloof
Remuneration: R 569,942.00
EE position: No
Introduction
The purpose of an Information Security Analyst role is to safeguard the organisation's information systems and data by identifying and analysing vulnerabilities, implementing and monitoring security measures, investigating potential security incidents to protect our systems, networks and data. The Information Security Analyst contributes to maintaining compliance with relevant regulations, identifying and mitigating security risks, and ensuring the confidentiality, integrity, and availability of information.
KPA 1: Security Monitoring and Incident Response
- Monitor, triage and report on Endpoint platform detections daily.
- Monitor, triage and report on Firewall platforms detections daily.
- Monitor, triage and report on SIEM platform detections daily.
- Investigate and respond to security incidents and breaches.
- Co-ordinate with the incident response team to contain and mitigate threats.
- Document and report security incidents, providing recommendations for improvement.
- Identify and implement mitigating controls together with the relevant stakeholders.
KPA 2: Improve the technical cyber security landscape
- Identify and develop improvement plans related to information security.
- Coordinate the execution of improvement plans within ICT and report on progress to ICT Management.
- Develop and manage vulnerability and patch management program.
KPA 3: Investigate, analyse and respond to real-time alerts within the environment
- Investigate and analyse alerts created by the implemented cyber security platforms.
- Categorise alerts into true or false positive categories on the respective cyber security platforms.
- Determine the correct course of action to address security alerts identified by the cyber security platforms.
- Liaise with relevant stakeholders to mitigate the security alert.
KPA 4: Security Compliance and Auditing
- Assist in maintaining compliance with relevant regulations and standards.
- At regular intervals, generate and analyse security platform reports to identify compliance breaches.
- Determine the correct course of action to address compliance breaches.
- Depending on the severity of the compliance breach, escalate breach to the relevant stakeholders.
- Monitor the progress of remediation of compliance breach.
- Update risk registers on a regular basis.
- Monitor the effectiveness of security controls and propose enhancements.
- Participate in internal and external security audits.
- Provide support for compliance-related initiatives.
KPA 5: Monitor security-related resources for new and emerging cyber threats and technologies
- Stay current with emerging threats and vulnerabilities and report to ICT Management and advise ICT Stakeholders thereof.
- Research and evaluate new security-related technologies and make implementation recommendations to ICT Management.
- Develop and deliver security awareness training to end users.
KPA 6: Vulnerability Management
- Conduct regular vulnerability scans and assessments on the SANBS environment utilising current security tools.
- Analyse scan results, prioritising vulnerabilities and allocate into the various ICT business units to remediate.
- Develop and manage remediation plans for vulnerability assessments.
- Plan and conduct penetration testing.
- Coordinate and plan remediation tasks to harden the SANBS ICT landscape.
- Track and report on vulnerability management progress.
- Stay current with emerging threats and vulnerabilities.
Education:
- Two or more of the following certifications: CEH, CompTIA Security, CompTIA Pentest, CompTIA CySa (CyberSecurity Analyst), CISSP, GSEC, an IT related degree or diploma, MCSE, MCSA, CCNA, CCNP, CCVP, any Azure related security certification, any AWS security related certification, PCNSE Palo Alto Network Certified Network Security Engineer, CCFA Crowdstrike certified Falcon Administrator.
- At least one year experience as a cyber security analyst managing and securing application and database solutions, both on-premise and cloud based.
Experience and knowledge requirements:
- Technical knowledge of enterprise-class networking technologies such as firewalls, routers, switches and wireless access points.
- Thorough understanding of Microsoft’s enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems.
- Working knowledge of Linux operating systems.
- Working experience with the following technologies: SIEM, vulnerability scanning and endpoint protection tools, next generation firewalls.
Other (knowledge and skills):
- Experience implementing and/or enforcing security and compliance frameworks such as CIS, NIST, COBIT, and ISO 27001.
#J-18808-Ljbffr