×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst

Job in Johannesburg, 2000, South Africa
Listing for: Telebest
Full Time position
Listed on 2026-01-29
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Job Description & How to Apply Below

Our client has an opportunity available for an Information Security Analyst.

Requirements:

  • 5 years’ experience within either an Information Security position or Cybersecurity, which include protection against social engineering, or security vulnerability remediation, of which:
    • 2 years’ IT administration experience.
    • 2 years’ Ethical Hacking experience.
  • In-depth knowledge of Cloud security platform.
  • In-depth knowledge of Firewalls and Malicious Code Defence including APT.
  • Knowledge of Cybersecurity technical assessments, standards, tools, and processes.
  • Knowledge of common attack vectors.
  • Knowledge of Vulnerability assessment tools.
  • Endpoint and network security tools or techniques.
  • Bachelor’s degree in Information Security or similar.
  • Industry certifications.

KPAs:

  • Support with development and maintenance of Cyber Security Road Maps and interventions.
  • Create and maintain appropriate standard operating procedures for Cyber Security and information protection.
  • Identify, respond, predict and analyse security breaches and threats to determine their root cause.
  • Research, investigate and develop proficiency in current and emerging threats, vulnerabilities, and security technology developments.
  • Work closely with other stakeholders to design, architect, consult and implement security solutions to ensure readiness for security technologies.
  • Contribute to project risk management consulting and technical reviews, drafting mitigation plans and delivering on any actionable items allocated.
  • Draft procedures and policies with regards to cyber security.
  • Monitor and analyse Cybersecurity operational services.
  • Identify and resolve vulnerabilities in networks, servers, systems, and applications by performing vulnerability scans.
  • Audit vendor services and report on non-performance or execution deficiencies to the Information Security Officer.
  • Maintain compliance with core risk management concepts, such as vulnerability management and threat intelligence.
  • Create a collaborative program to coordinate and drive operational activities related to Cyber Security.
  • Advise Technology business partners on regulatory, compliance and legal requirements as it relates to securing data.
  • Lead and collaborate on lessons learned and root cause activities.
  • Manage internal control framework ensuring internal controls are reviewed periodically by departments as well as driving internal control adherence and compliance.
  • Monitor and drive compliance against the audit framework.
  • Conduct technical security reviews and perform technical risk assessments.
  • Act as a change management architect in periods of change to ensure continuity to operations.
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary