Cybersecurity Review Analyst
Listed on 2025-12-22
-
IT/Tech
Cybersecurity, Information Security, Data Security
Empowering Africa’s tomorrow, together…one story at a time.
With over 100 years of rich history and strongly positioned as a local bank with regional and international expertise, a career with our family offers the opportunity to be part of this exciting growth journey, to reset our future and shape our destiny as a proudly African group.
My Career Development Portal:
Wherever you are in your career, we are here for you. Design your future. Discover leading-edge guidance, tools and support to unlock your potential. You are Absa. You are possibility.
The Cybersecurity Review Analyst role exists to ensure the bank maintains a strong cybersecurity posture by leading and coordinating control reviews, assurance activities, and risk assessments across its technology landscape. This role ensures compliance with internal policies and regulatory requirements, identifies control gaps, and provides actionable insights to enhance cyber governance, risk management, and issue remediation. Operating within the First Line of Defence (FLOD), the analyst supports the robustness of cyber risk governance in alignment with the Enterprise Risk Management Framework and contributes to the bank’s combined assurance approach.
The role involves conducting independent assurance engagements, supporting internal audit and regulatory reviews, and promoting continuous improvement across Cyber and Technology functions.
The role holder will undertake assurance engagements with limited supervision, reporting directly to the Information Systems Risk & Control Lead and engage senior stakeholders to strengthen the control environment through workshops, reviews, and strategic input.
The role holder will be responsible for the following:
- Planning and executing end-to-end cybersecurity risk and control reviews across the bank’s technology landscape.
- Conducting risk assessments and issue validations to support internal audit and regulatory engagements.
- Supporting cybersecurity governance, including monitoring emerging threats, managing privileged access, recertification campaigns and supporting the implementation of security frameworks and awareness programs.
- Identifying and reporting control gaps and providing recommendations for remediation and improvement.
- Supporting ad-hoc assurance tasks and contributing to the bank’s combined assurance efforts.
- Tracking, monitoring, and ensuring timely remediation of significant control and material issues.
- Facilitating workshops and stakeholder engagements to promote control awareness and cyber risk governance.
- Providing assurance on the effectiveness of the cybersecurity control environment using FLOD methodology.
- Collaborating with Cyber and Technology teams to drive continuous improvement in control practices.
- Reporting findings and insights to senior management and relevant governance forums.
- Lead end-to-end reviews of cybersecurity controls across infrastructure, applications, and cloud environments.
- Evaluate effectiveness of technical and procedural controls against frameworks.
- Develop and maintain testing methodologies and review schedules.
- Provide assurance reporting to senior stakeholders.
- Review audit logs to identify anomalies and validate control effectiveness.
- Support activities of IT control owners to ensure compliance with internal policies, procedures, and external regulations.
- Identify thematic control issues within Cyber and recommend suitable solutions.
- Conduct cyber risk assessments for new systems, major changes, and third-party integrations.
- Advise project teams and business units on cyber risk mitigation strategies.
- Collaborate with Enterprise Risk and IT to embed cyber risk considerations into business processes.
- Undertake ad-hoc engagements, due diligence work, and demand initiatives as may be required.
- Review vulnerability scan results and threat intelligence reports.
- Track remediation of critical vulnerabilities and systemic issues.
- Review and monitor privileged access management, recertification campaigns and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).