Enable job alerts via email!

Cybersecurity Analyst II at The Foschini Group

The Foschini Group

Cape Town

On-site

ZAR 40,000 - 80,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a Cybersecurity Analyst II to join their dynamic IT team in Cape Town. This role involves monitoring security alerts, managing logs, and responding to incidents to ensure robust cybersecurity measures. You'll have the opportunity to develop and implement detection rules, automate response tasks, and perform threat hunting using advanced tools. If you're passionate about cybersecurity and eager to make a significant impact in a diverse retail environment, this position offers an exciting challenge with ample growth opportunities.

Qualifications

  • 4-6 years of experience in a SOC or cybersecurity role is essential.
  • Familiarity with security tools like WAF, Proxy, IDS, and firewalls.

Responsibilities

  • Monitor security alerts and manage logs for critical assets.
  • Investigate security incidents and respond promptly to threats.

Skills

Microsoft Sentinel
Defender for Endpoint
Threat Intelligence
Incident Response
Communication Skills
Collaboration
Stress Management

Education

4-6 years' experience in SOC or cybersecurity

Tools

Microsoft Defender XDR
Symantec DCS
FortiAnalyzer
CrowdStrike
Azure Sentinel

Job description

Cybersecurity Analyst II at The Foschini Group
The Foschini Group
  • Permanent Intermediate position
  • Cape Town
  • Posted 25 Apr 2025 by The Foschini Group
Responsibilities
  • Continuously monitor security alerts and events from sources like Microsoft Sentinel, Defender for Endpoint, and Defender for Cloud.
  • Manage logs: ingestion, use case definition, and alert creation for critical assets.
  • Create, implement, and fine-tune detection rules, alerts, and queries in Microsoft Sentinel and Defender; leverage UEBA for anomaly detection.
  • Develop and customize automation playbooks to streamline incident response.
  • Perform threat hunting using IOCs and threat intelligence.
  • Create and maintain risk profiles for users, systems, and applications.
  • Identify patterns, trends, and anomalies to detect threats.
  • Investigate and analyze security incidents to identify potential threats.
  • Respond promptly to incidents, including initial analysis, impact assessment, containment, eradication, and recovery.
  • Document incidents thoroughly and follow incident response procedures.
  • Manage end-to-end cybersecurity incidents, including stakeholder engagement and reporting.
  • Automate repetitive response tasks to improve efficiency and threat intelligence.
Qualifications & Experience
  • 4-6 years' experience in a SOC or cybersecurity role.
  • Preferred experience with Microsoft Defender XDR, EDR, JAMF, Symantec DCS, DNS, network security tools, Mimecast, Symantec DLP, FortiAnalyzer, Sophos, CrowdStrike, Azure Sentinel.
  • Experience with Windows, VMware, Cisco, UNIX, Linux.
  • Knowledge of security tools like WAF, Proxy, IDS, firewalls, anti-virus, IAM, MFA, DLP.
  • Understanding of Cloud Security (SaaS, PaaS, IaaS), Mobile Architecture, Network & Application Security.
Skills & Behaviors
  • Excellent communication skills in English.
  • Strong collaboration and knowledge sharing.
  • Effective reporting and presentation skills.
  • Ability to work independently under pressure.
  • Stress management and continuous learning mindset.
  • Action-oriented, courageous, decision-maker, accountable, and tech-savvy.
About Us & Team

TFG is a diversified retail portfolio with a focus on inspiring customers and creating remarkable omnichannel experiences. Our IT team is responsible for technological systems and infrastructure, ensuring adaptability, scalability, and risk management. Join us to grow and make an industry impact.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.