Enable job alerts via email!

Manager: Cyber Security Operations

BCX Zambia

Centurion

On-site

ZAR 500,000 - 800,000

Full time

Yesterday
Be an early applicant

Job summary

A leading cybersecurity firm in Centurion is looking for an experienced Cybersecurity Manager to lead organizational strategy and manage security incidents. The ideal candidate will have extensive experience in threat modeling and SOC management. This position requires a commitment to protecting digital assets and a solid understanding of compliance standards. Candidates must hold a relevant degree and have at least 5 years of experience in cybersecurity.

Qualifications

  • 5+ years of experience in threat modeling and incident response.
  • Proven experience managing a Security Operations Center (SOC).
  • Understanding of compliance and regulatory standards.

Responsibilities

  • Lead cybersecurity strategy and operations for the organization.
  • Manage security incidents from identification through remediation.
  • Collaborate with teams to validate security events and analysis.

Skills

Analytical Skills
Customer Focus
Information Security
Budget Management
Cybersecurity

Education

NQF 6: 3 year Degree/Diploma in IT/Computer Science
NQF 4: Grade 12

Tools

CISSP
CompTIA Security+
Certified Ethical Hacker (CEH)
Job description
Business Unit & Job Details

Company: BCXP

Location: Centurion, Gauteng, ZA

Date: 14 Oct 2025

Business Unit: Cybersecurity Department

Department: Sales & Solutions

Job Grade/Level: M5

Core Description

Responsible for leading the organization’s cybersecurity strategy, operations, and team. This role ensures the protection of digital assets, compliance with regulatory standards, and the implementation of robust security protocols across systems and networks.

Key Deliverables / Primary Functions
  • Contribute towards the development of the Cyber Security Solutions strategy and define the operational cyber security roadmap to ensure the successful implementation of the strategy to achieve business objectives.
  • Keep abreast of the latest cyber security trends and monitor the cyber threat and solution landscape to identify and provide expertise on innovative cyber solutions.
  • Foster relationships with industry partners and customers to ensure monitoring compliance and smooth incident response.
  • Manage team efforts to monitor for security events and provide first and final escalation analysis.
  • Lead staff in proactive change management for defensive controls and maintaining an effective defence for clients over time.
  • Lead staff to proactively identify, prevent and respond to security incidents.
  • Lead and manage security incidents from identification through remediation.
  • Collaborate with technical security assessment (intrusion testing) and cyber threat intelligence teams to validate security events and perform advanced analysis.
  • Develop salient information security metrics and present to senior leadership.
  • Lead, mentor, and develop SOC analysts and incident responders.
  • Perform tasks related to security incident response, such as monitoring and discovery of existing threats.
Core Functional Skills & Capabilities
  • Analytical Skills
  • Customer Focus
  • Information Security
  • Budget Management
  • Cybersecurity
Core Behavioural Competencies
  • Applying expertise & Technology
  • Deciding & Initiating Action
  • Delivering Results & Meeting customer expectations
  • Job Match
  • Presenting and Communicating information
Minimum Qualifications
  • NQF 6: 3 year Degree/Diploma/ National Diploma in IT/Computer Science or related field.
Additional Education – Preferred / Advantage
  • OR NQF 4: Grade 12.
Experience
  • 5 years of experience in threat modeling, threat hunting and intelligence, incident response tabletop exercises, and process automation. Proven experience running or building a SOC environment.
  • OR 7 years of experience in threat modeling, threat hunting and intelligence, incident response tabletop exercises, and process automation. Proven experience running or building a SOC environment.
Certifications
  • CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, Security+.
  • CompTIA Security+ Certification.
  • Certified Ethical Hacker (CEH).
  • Vendor certification.
Professional Memberships in Relevant Industry

None stated.

Level of Engagement & Span of Control
  • Engagement will be at all levels within the organization, internal and external to the business.
  • Span of control = 8.
Special Requirements / Employment Condition
  • Valid Driver's license.
  • Willing to travel.
Workplace / Physical Requirements

Billable.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.