Job Search and Career Advice Platform

Enable job alerts via email!

Specialist : Cyber Incident and Threat Intelligence

Telkom

Centurion

On-site

ZAR 600 000 - 900 000

Full time

13 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading telecommunications company in South Africa seeks a Specialist in Cyber Incident and Threat Intelligence. You will be responsible for identifying, analyzing, and addressing cyber threats while collaborating with SOC teams. Required qualifications include a diploma in IT and certifications like CISM or CISSP. This position requires 5 years of experience in cybersecurity, with a focus on proactive threat detection and incident management.

Qualifications

  • Must have at least one of the preferred certifications: CISM, CRISC, CISSP, SABSA, or ISO27001/2.
  • 5 years of relevant experience.

Responsibilities

  • Identify, analyze, and respond to cyber threats and incidents.
  • Oversee cyber breach resilience processes and systems design.
  • Act as a subject matter expert for cybersecurity incidents.
  • Lead cyber incident simulation exercises.
  • Monitor dark web and threat feeds for emerging threats.
  • Create threat intelligence reports and briefs for stakeholders.

Skills

Analytical & Investigative
Communication & Interpretation
Decision Making
Problem Solving
Project & Task Management
Risk Awareness

Education

NQF 6 : 3 year Diploma / National Diploma in Information Technology

Tools

CISM
CRISC
CISSP
SABSA
ISO27001/2
Job description

Job title: Specialist : Cyber Incident and Threat Intelligence

Job Location: Gauteng, Centurion

Deadline: December 07, 2025

Quick Recommended Links
  • Jobs by Location
  • Job by industries
Core Description

Responsible for identifying, analyzing, and responding to cyber threats and incidents targeting the organization. This role combines deep technical expertise with investigative skills to monitor threat landscapes, detect malicious activities, and provide actionable intelligence to improve the organization’s cybersecurity posture. Works closely with SOC teams, digital forensics, and other cybersecurity functions to ensure proactive threat detection and effective incident response.

Job Responsibilities
  • Oversee the planning, design, implementation, testing, and operation of cyber breach resilience processes and systems on networks and applications.
  • Maintain awareness of the latest and common security threats, attack vectors, and Tactics, Techniques, and Procedures (TTPs) and maintain up-to-date threat profiles.
  • Act as an escalation point and subject matter expert for cybersecurity incidents and threat mitigation.
  • Develop and maintain incident management plans, procedures, controls, playbooks, and incident response strategies.
  • Lead cyber incident simulation exercises.
  • Designing and implementing a disaster recovery plan, ensuring Telkom can effectively respond to unexpected security incidents.
  • Monitor dark web, open-source intelligence (OSINT), and threat feeds to identify emerging threats.
  • Ensure that adequate processes are in place to collect, analyze, and disseminate threat intelligence from internal and external sources.
  • Lead or support cyber incident investigations, including detection, containment, eradication, and recovery processes.
  • Enhance detection rules and use cases in XDR and threat detection platforms.
  • Correlate intelligence with real-time security events to identify and prioritize threats.
  • Develop dashboards, visualizations, and metrics to report on threat trends and incident statistics.
  • Stay up to date with cybersecurity trends, zero-day vulnerabilities, and global threat activity.
  • Lead and ensure collaboration with the SOC team during incident handling.
  • Create threat intelligence reports, indicators of compromise (IOCs), and threat briefs for stakeholders.
Core Competencies

Functional Knowledge

  • Deep understanding of threat actor tactics, techniques, and procedures; proficiency in using threat intelligence frameworks; ability to contextualize and operationalize indicators of compromise
  • Experience evaluating open-source and commercial threat intelligence feeds; competence in producing and validating threat intelligence reports and advisories
Functional Skills
  • Analytical & Investigative
  • Communication & Interpretation
  • Decision Making
  • Problem Solving
  • Project & Task Management
  • Risk Awareness
Attitudes / Leadership Competencies
  • Integrity
  • Assertive
  • Confident
  • Initiator
  • Supportive
  • Persuasive
  • Team Player
  • Problem Ownership
Certifications

Preferred certifications: Must have at least one of the following - CISM, CRISC, CISSP, SABSA or ISO27001 / 2. Additional desired certification: CoBIT, TOGAF, ITIL.

Education
  • NQF 6 : 3 year Diploma / National Diploma in Information Technology
Experience
  • 5 Years relevant experience
Additional Information

Special Requirements: None

Physical Requirements: None

Key Stakeholders
  • Enterprise and IT Architects
  • Internal Business Customers
  • External Customers
  • Consultants and specialists
  • Executive & Governance Forums
  • ICT jobs
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.