We are looking for an information security analyst to join our information security team and make sure our infrastructure’s tactical security measures are at the best level possible.
We believe that our greatest assets are our culture and the caliber of our personnel, and we have a sound strategy that emphasizes People, Processes, and Technology. As a result, we need to hire exceptional people to support our main business processes.
The IT division of TFG provides competitively priced expert services and cutting-edge ICT solutions to TFG and its affiliates. Interacting with highly qualified employees who are passionate about teamwork, creativity, and offering top-notch customer service is a requirement of working for TFG.
The Key Performance Areas of this role will be as follows:
- Be a part of the Cyber Security Incident Response Team (CSIRT) in locating, eliminating, and resolving security vulnerabilities.
- Keep up-to-date on all aspects of the IT security market, including new or updated security products, enhanced security procedures, and the detection and remediation of vulnerabilities and threat vectors.
- To increase overall corporate security and the “defense in depth” strategy, suggest new security measures or improvements to the current controls.
- Take part in the implementation, integration, and initial setup of all new security solutions as well as improvements to current security solutions in accordance with standards and best practices.
- Keep all IT security systems operationally configured in accordance with any specified baselines.
- employing open source intelligence to create trouble tickets, do initial validation, and triage to identify whether occurrences constitute security events (OSINT).
- Examine all device logs and reports, regardless of whether they are controlled directly (by security tools, for example) or indirectly (i.e., workstations, servers, network devices, etc.). Determine the effects of the action and create strategies for the most appropriate resolution
- Search for sophisticated threats while analyzing data to spot harmful actions. Handle incidents in real time while autonomously building and using procedures to identify and stop harmful activity. Gather information about digital material, logs, and viruses to do an analysis of cyber intrusions.
- Keep abreast of attack strategies and make tactical use of knowledge. Based on your understanding of advanced threat behaviors, suggest new processes and procedures or change existing ones. Utilizing OSINT, Threat Intelligence, and enrichment resources, identify and assess threats.
- Utilizing data extraction methods for additional analysis, develops and improves monitoring and incident response content and procedures. creates and improves procedures, processes, and documentation. Choose precise behavioral patterns and produce content using a variety of techniques.
- Keep an eye on all security measures to ensure proper and effective operation
Requirements
- Keep an eye on all security measures to ensure proper and effective operation
- one or more industry-recognized certificates, such as the SSCP, Security+, CHFI, or CEH.
- 3 to 6 years of experience working in IT-related areas; expertise in security and technical services is necessary.
- knowledge of system assessment, reporting, and monitoring tools (ArcSight, IBM QRadar, Splunk, Sentinel, Exabeam, SIEMonster, AlientVault, etc.)
- knowledge of basic information technologies (Windows, VMware, and Cisco as well as some UNIX, and Linux).
- the capacity to operate independently under strict deadlines.
- the capacity to create and sustain professional connections in a multilingual context.
- exceptional writing abilities for creating reports and briefings.
- brings internal control gaps and associated risks to management’s attention.
- knowledge of mobile architecture, network security, application security, and/or data protection, as well as cloud security operations (SaaS, PaaS, IaaS).
- knowledge of security tools (WAF, Proxy, DNS, IDS, firewalls, anti-virus, data loss prevention, etc.).
- knowledge of malware analysis and vulnerabilities (threat and attack analysis).
- understanding of network security and monitoring technologies.
- superior intelligence and problem-solving skills
In accordance with the Employment Equity Act, preference will be given to candidates from recognized categories, but not exclusively.
Discounts on goods from several TFG firms, both online and in-store, are available to our employees. Because TFG is concerned about its employees’ welfare, we offer a 24-hour helpline for counseling support. Flexible contributions to TFG’s retirement fund are an option for employees. Through its internal medical plan, TFG provides its employees and their immediate families with affordable access to top-notch medical care. We offer a variety of learning and development opportunities, including academic programs, bursaries, internships, leadership, skill development, and leadership, to assist our employees in improving their abilities for employment at our head office and throughout all of our brands in all regions.
Apply On Company Site