RMB Nigeria LimitedRandburg, Gauteng, South Africa
7 days ago
Job description
Job Description
Hello Future Cyber Security Specialist Welcome to FNB, the home of the #changeables. We design for the shapeshifters and deliver products and services that make us incredibly proud of people that make it happen. As part of our talent team, you will be surrounded by unique talents, diverse minds, and an adaptable environment that lives up to the promise of staying curious. Now’s the time to imagine your potential in a team where experts come together and ignite effective change.
Overview of the role and requirements :
Understand the
AI threat landscape and attacks to design and build a monitoring and response framework.
Design and execute security frameworks for cloud environments
to enhance monitoring and detection capabilities.
Provide technical leadership during Cyber Security Incident Response Team (CSIRT) engagements.
Plan, design, and facilitate tabletop exercises
for internal business units to strengthen incident response readiness.
Collaborate with team members to architect and build effective detection mechanisms and cybersecurity frameworks.
Conduct proactive threat hunting focused on identifying tactics, techniques, and procedures (TTPs) used by threat actors, particularly within cloud and AI ecosystems.
Partner with cross-functional teams to assess and mitigate risks associated with cloud infrastructure and AI systems.
What you will need :
5+ years' experience in a similar role
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, Engineering, or a related discipline.
Offensive Security Certified Professional (OSCP) certification is required.
Demonstrated experience in cybersecurity, with a strong focus on AI and cloud security.
Additional certifications in cloud technologies, artificial intelligence, or machine learning are advantageous
You will be responsible for :
Cyber Security Detection Framework
Business Owners of all playbooks (Definition, Coordination and Review)
Enhance and Automate Security Alerting (Use Cases and Playbooks)
Understand the Threat Landscape
Make use of threat intelligence information together with organizations vulnerabilities to understand potentially new organizational threats or threats that are no longer of concern + Identify NEW Threats that require use cases for alerting into the SOC
Design and Maintain Alerts by translating complex security requirements into technical use case specifications
Document Threat Attack Paths through Threat Modelling Techniques (Take lead on the identification of threats and risks) + Host use case workshops with application and system owners to identify attack vectors and write monitoring rules to detect attacks in the environment + Create correlation rules and / or logic to detect malicious activity + Identify what log sources is required to build the Use Case + Develop the Use Case - Separate signal from noise, distilling meaningful and actionable alerts from the collection of event information (EFFECTIVENESS) + Test and Productionise the Use Case
Alert Optimisation
To reduce false alerts, improve alert quality for effective intervention and reduce alert fatigue + Log Analytics – To uncover patterns in user behaviours and identify potential problems pro-activity
Pro-Active Threat Hunting
To proactively hunt for and investigate security events to identify artefacts of a cyber-attack.
To proactively and iteratively detect, isolate and neutralize advanced threats that evade automated security solutions.
To track and neutralize adversaries who could either be an insider (employee) or outsider (organized crime group)
Search for cyber threats before an attack happens, when threats are identified the hunter needs to gather as much information on the behaviour, goals and methods of adversaries as possible to hand over to the Incident Response team.
Responsible for reviewing system log events to proactively detect advanced threats that evade traditional security solutions.
Set up basic hunts for the SOC analysts to run on a regular basis + Hunts – Indicators of Compromise (IOC) Investigations. Identification of threats and breaches that may have previously gone unnoticed through other means. Hunting results can also help drive improvement in monitoring systems. Previous unknown IOC’s and malware may also be identified
Event Analytics + Review Events that transpired and look for common trends to see if there is any further remediation required or + Improvements to current security products to detect and block more effectively
Log Analytics + Find suspicious activity, + To detect recurring patterns and + Pick up insecure protocols being used within the organization
Cyber Security Incident Response Lead (Participate or Lead a CSIRT Incident Response event)
Providing response and initial management of any incident classified as P1 or P2 security incident
Lead or Participate in a CSIRT Incident Response event. + Co-ordinate the effective handling of the incident + Identifying the root cause and recommending actions to be taken to contain and remediate the event + Manage or provide in-depth technical investigations
Security Incident Response Lead (Participate or Lead a CSIRT Incident Response event. (In-Depth technical investigations))
Responsible for compiling the Incident Report to close out the incident
Threat Intelligence for FRB (Outside In and Inside Out)
Threat Assessment Monitoring + Responsible for threat landscape assessment and monitoring; brand abuse, information leakage, fake apps, phishing sites and other scam detection and take down, as well as general and telecommunications malware analysis and IOC generation.
Threat Intelligence Feeds
Undertake analysis and monitoring of security feeds and other open source intelligence to research and gather information on vulnerabilities and exploits relevant to the bank. + Identify and evaluate new sources of intelligence, and integrate in SIEM to provide single view of potential threats.
Produce Cyber Threat Intelligence (Reporting) - Cybersecurity and information threat assessment based on published threats and the companies known vulnerabilities. (Outside In Intelligence) + Produce actionable intelligence for FRG and the business units (Inside Out Intelligence) + Liaise with internal and external technical stakeholders, providing intelligence regarding threat actor techniques, tactics and procedures to ensure correct and timely focused threat detection and mitigation. + Produce quality tactical threat intelligence reports (This will result in promoting awareness of emerging cyber threats with recommended responses)
We can be a match if you can :
Strong personal characteristics, energy, drive, focus, motivation, responsibility
Self-motivated with ability to work without supervision
Outcomes Driven (“Can Do” Attitude)
Time Management
Ability to perform within a Crisis Situation
You will have access to :
Opportunities to network and collaborate.
Challenging Work.
Opportunities to innovate.#Post#FNB#LI-NN2# #
Job Details
Take note that applications will not be accepted on the below date and onwards, kindly submit applications ahead of the closing date indicated below.
31 / 10 / 25All appointments will be made in line with FirstRand Group’s Employment Equity plan. The Bank supports the recruitment and advancement of individuals with disabilities. In order for us to fulfill this purpose, candidates can disclose their disability information on a voluntary basis. The Bank will keep this information confidential unless we are required by law to disclose this information to other parties.Introduce yourself to our recruiters and we will get in touch if there's a role that seems like a good match.Should you have any queries, please log it
#J-18808-Ljbffr
Create a job alert for this search
Specialist Security • Randburg, Gauteng, South Africa
Related jobs
Promoted
Cyber Security Specialist
MimecastJohannesburg, ZA
Job title : Cyber Security Specialist.Job Location : Gauteng, Johannesburg.Reporting to the Senior Director of Security Operations, you will leverage cutting-edge tools, threat intelligence, and cr...Show moreLast updated: 5 days ago
Promoted
Security Software Developer
E&D RecruitersPretoria, South Africa
Electronic Engineering) or BEng / BSc (Computer Engineering) or Computer Science.Experience writing software in C and C++ for embedded platforms.
Experience or knowledge in communications security and...Show moreLast updated: 4 days ago
Promoted
Surveillance Monitorng Officer (Pretoria)
Sun InternationalPretoria, ZA
Job title : Surveillance Monitorng Officer (Pretoria).Job Location : Gauteng, Pretoria.Responsible to monitor the gaming floor and operation to ensure gaming and procedural compliance and protectio...Show moreLast updated: 28 days ago
Promoted
General Security Engineer
Zensar TechnologiesJohannesburg, ZA
Job title : General Security Engineer.Job Location : Gauteng, Johannesburg.Job Title : General Security Engineer.Location : Johannesburg (Hybrid – 3 days onsite per week).
Contract Duration : 6 Months ...Show moreLast updated: 1 day ago
Promoted
Security Engineer
wePlacePretoria, South Africa
Responsible for company-wide cybersecurity and related documents, process and record management to ensure that systems and products are safe and effective.
Ensures data integrity, and that informati...Show moreLast updated: 30+ days ago
Promoted
Application Security Specialist
MukuruJohannesburg, ZA
Job title : Application Security Specialist.Job Location : Gauteng, Johannesburg.We’re looking for an Application Security Specialist to join our forward-thinking Information Security Team.This is ...Show moreLast updated: 4 days ago
Promoted
HOD IT : IT Security and Infrastructure - (PERMANENT)
PM ConnectionSandton, South Africa
Our client is seeking to hire a highly skilled and strategic HOD : IT, IT Security and Infrastructure to lead our IT operations, ensure the security and efficiency of our IT infrastructure, and driv...Show moreLast updated: 30+ days ago
Promoted
IT Security Engineer
CodeConnect Staffing (Pty) LtdPretoria North, South Africa
Work Model : 2 days remote per week (post-probation).A well-established medical devices company is seeking a skilled IT Security Engineer to lead company-wide cybersecurity operations.This role will...Show moreLast updated: 30+ days ago
Promoted
Network Security Architect
Data CentrixJohannesburg, South Africa
Qualifications & Experience Required : .Matric plus a relevant IT diploma / degree (or equivalent experience).At least 4 years of experience in technical architecture or related roles.Relevant prof...Show moreLast updated: 30+ days ago
Promoted
Divisional Cybersecurity Officer
Pollock & Associatessandton, Gauteng, South Africa
The role will assess and monitor cybersecurity risks, lead divisional maturity assessments, and develop roadmaps to address identified vulnerabilities.
You will advise IT Managers on secure architec...Show moreLast updated: 22 days ago
Promoted
Security Engineer
Network RecruitmentPretoria, South Africa
Our client has a presence in over 60 countries and is a global leader in health solutions.Youll work closely with cross-functional teams to implement robust security measures, manage audits, and dr...Show moreLast updated: 17 days ago
Promoted
AWS Consultant Developer
Select OneMidrand, South Africa
Bachelors degree in Computer Science, Information Technology, Engineering, or related field.MBA or Masters degree in a business or technology field is a plus.
Amazon Connect Communications Specialis...Show moreLast updated: 7 days ago
Promoted
Network Security Architect
DatacentrixJohannesburg, ZA
Job title : Network Security Architect.Job Location : Gauteng, Johannesburg.Datacentrix is seeking a highly skilled Network Security Architect to join our team.
The ideal candidate will possess deep...Show moreLast updated: 1 day ago
Promoted
Senior IT Auditor (Security)
Salix RecruitmentJohannesburg, South Africa
Are you an experienced IT auditor with a deep understanding of information security practices? Are you ready to play a critical role in securing digital landscape and protecting global mining opera...Show moreLast updated: 15 days ago
Promoted
Data Protection Engineer
Liham Consulting Pty (Ltd)Johannesburg, South Africa
Implementing solutions with a focus on MS Data Protection, Dell Data Protection, Veeam, and Druva.Creating and enforcing data protection policies compliant with government and industry regulations....Show moreLast updated: 30+ days ago
Promoted
Protocol Software Developer
E&D RecruitersPretoria, South Africa
Electronic Engineering) or BEng / BSc (Computer Engineering).Development of Layer 2 and Layer 3 protocol software components.
Verify protocol stack against specifications.Please apply via our website : Â .Show moreLast updated: 30+ days ago
Promoted
Spec : Cyber Security
BcxpWorkFromHome, South Africa
To oversee and direct the build, maintenance and monitoring of cyber security services and solutions to ensure customers are protected against cybercrime.
Key Deliverables / Primary Functions.Lead e...Show moreLast updated: 1 day ago
Promoted
Security Engineer
The Hiring HousePretoria, South Africa
Risk Management and Compliance.Engineering degree (Computer, Software, Mechanical or Electronic).Minimum education (desirable) : .
OSCP (Offensive Security Certified Professional).PNPT (Practical Netw...Show moreLast updated: 30+ days ago