Enable job alerts via email!

Threat Hunter/SOC Analyst (Midstream, Centurion)

DataFin

Centurion, Pretoria

On-site

ZAR 500,000 - 700,000

Full time

Today
Be an early applicant

Job summary

A cybersecurity solutions provider in Centurion is seeking a Threat Hunter/SOC Analyst to monitor security patterns and mitigate risks. With a focus on maintaining client relationships and staying current with evolving threats, the role demands 2-3 years of experience in cybersecurity. Beneficial certifications include CompTIA Security+ and CISSP. Join us to protect monitored environments and advance your cybersecurity skills.

Qualifications

  • At least 2-3 years of experience as a Threat Hunter/SOC Analyst.
  • Experience with vulnerability assessment and management.
  • Certifications in cybersecurity are advantageous.

Responsibilities

  • Actively search for vulnerabilities in the system.
  • Mitigate cybersecurity risks that affect environments.
  • Identify and track advanced threats before attacks.
  • Supervise system endpoints like devices and desktops.
  • Design and implement networking best practices.

Skills

Threat detection
Risk assessment
Penetration testing
Client relationship management
Incident response

Education

CompTIA Security+ Certification (S+)
CompTIA Network+ Certification (N+)
Certified Information Systems Security Professional (CISSP)
Job description
Overview

ENVIRONMENT: MONITOR the security patterns to identify, isolate, detect and where required, remediate the threats before attackers exploit such vulnerabilities, as part of the offering of a dynamic provider of Tailored Cybersecurity Solutions in Centurion wanting your expertise as its next Threat Hunter/SOC Analyst. You will be required to maintain the company's existing relationships with clients. Applicants will require at least 2-3 years’ work experience in a similar role. Any of the following Certifications will prove beneficial - CompTIA Security+ Certification (S+), CompTIA Network+ Certification (N+), Certified Information Systems Security Professional (CISSP), Offensive Security Certified Expert (OSCE), etc.

Responsibilities include actively searching for vulnerabilities, mitigating cybersecurity risks, identifying advanced threats, tracking and mitigating threats before IT systems are attacked, supervising endpoints, designing and implementing networking best practices, investigating network systems or endpoints to identify threat patterns, performing risk assessment and penetration testing, reporting identified threats, coordinating with management to resolve cyber threats and patch security systems to prevent recurrence, and advancing skills with the latest cybersecurity technologies.

The role emphasizes maintaining client relationships and staying current with evolving cyber threats to protect monitored environments and subscribed customers.

Responsibilities
  • Actively searching for vulnerabilities.
  • Mitigate cybersecurity risks that affect the monitored environment and/or subscribed customers.
  • Identify advanced threats.
  • Track and mitigate advanced threats before organisational IT systems are attacked.
  • Supervise the endpoints of the system, such as IP addresses, devices, phones, and desktops.
  • Design and implement networking best practices with a clear understanding of how data processes in the network.
  • Investigate the network systems or endpoints to identify threat patterns or indicate compromise and analyse the threat.
  • Search for security gaps by performing risk assessment, penetration testing, and identifying internal risks.
  • Report the identified threats to the Security officer or Security Operations Centre.
  • Coordinate with the management team to resolve the cyber threats and patch the security system to prevent the same attack from recurring.
  • Advance your skills with the latest technologies and tricks in Cybersecurity.
Requirements
  • Minimum of 2 - 3 years’ experience as a Threat Hunter/ SOC Analyst.
Beneficial qualifications
  • CompTIA Security+ Certification (S+)
  • CompTIA Network+ Certification (N+)
  • Certified Ethical Hacker (CEH)
  • Certified Information Systems Security Professional (CISSP)
  • Offensive Security Certified Expert (OSCE)
  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.