×
Register Here to Apply for Jobs or Post Jobs. X

Lead Security Analyst - Isando

Job in Johannesburg, 2000, South Africa
Listing for: ZEDA Limited
Full Time position
Listed on 2026-02-11
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, IT Project Manager
Job Description & How to Apply Below

The Lead Security Analyst (L4) is positioned between tactical SOC management and technical engineering leadership, ie, the bridge between detection, response, and enterprise threat resilience. The Lead Security Analyst (L4) is accountable for overseeing Zeda’s enterprise-wide threat detection and incident response capability.

This role provides operational leadership for the Security Operations Centre (SOC), ensuring 24×7 monitoring, investigation, and resolution of security incidents. The Lead Analyst designs detection strategies, optimises toolsets (SIEM, SOAR, EDR), manages major incident response, and ensures the SOC operates within defined KPIs and SLAs. The incumbent drives cross-functional response coordination, ensures continuous improvement in detection maturity, and contributes to enterprise cyber resilience through advanced automation, playbook orchestration, and analytics.

Key

deliverables and outputs SOC Leadership and Operational Oversight
  • Lead day-to-day operations of Zeda’s SOC, ensuring 24×7 threat monitoring and response
  • Manage incident queues, escalation processes, and resource allocation across shifts
  • Ensure consistent quality and accuracy of investigations and incident reports
  • Establish KPIs/KRIs for SOC performance (MTTD, MTTR, alert-to-incident ratio)
  • Coordinate across IT and business units during a major incident command.
Threat Detection and Response Strategy
  • Design and maintain Zeda’s detection and response strategy aligned to the enterprise risk appetite
  • Oversee tuning and optimisation of SIEM and EDR correlation rules
  • Validate coverage against MITRE ATT&CK tactics and regulatory control requirements
  • Develop advanced detection content, threat models, and analytics dashboards
  • Continuously assess and enhance response processes through automation.
Incident Management and Forensics
  • Lead high-severity investigations, containment, eradication, and recovery actions
  • Ensure incident playbooks are tested, documented, and continuously improved
  • Coordinate digital forensics and evidence-collection activities when required
  • Drive post-incident reviews and ensure corrective actions are implemented
  • Maintain compliance with ISO 27001 incident management requirements.
SOC Technology Management and Automation
  • Oversee integration of SOC tools (SIEM, SOAR, EDR, threat-intel platforms)
  • Evaluate and recommend new technologies to strengthen detection capability
  • Implement automation scripts and SOAR playbooks to improve efficiency
  • Maintain system health, performance, and data integrity across monitoring tools
  • Manage relationships with SOC vendors and managed-service providers.
Threat Intelligence and Continuous Improvement
  • Integrate internal and external threat intelligence into operational workflows
  • Track emerging TTPs and adjust detection content accordingly
  • Conduct regular threat-hunting and red/blue exercises
  • Benchmark SOC maturity against global best practice (NIST CSF, MITRE D3

    FEND)
  • Report improvement initiatives and roadmap progress to the Senior Manager: IT Security.
People Leadership and Capability Building
  • Lead, mentor, and develop the SOC team across L1–L3 levels
  • Conduct performance reviews and define individual development plans
  • Facilitate certification pathways and simulation training
  • Foster a culture of continuous learning and operational excellence
  • Promote collaboration with Security Engineering, Risk & Compliance, and Architecture teams.
Internal and External Stakeholders

The role requires close engagement and collaboration with key internal and external stakeholders.

Internal Stakeholders

Senior Manager: IT Security;
Head:
Information Security, Infrastructure, Applications, Data and Integration teams, Risk and Compliance, Legal, and Internal Audit, Enterprise Architecture and PMO.

External Stakeholders

MSSPs, forensic partners, and technology vendors, External auditors and law enforcement (for notifiable breaches).

Academic Qualifications
  • NQF Level 6 Qualification in Information Technology, Computer Science, Cybersecurity, or related field
  • Professional certification:
    CompTIA CySA+, EC-Council CEH, GIAC GCIH, or similar
  • Strong knowledge of SOC operations, incident management, network security, and cyber defence…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary