Security Analyst
Listed on 2025-12-07
-
IT/Tech
Cybersecurity, Network Security
About Us
G Adventures is the world’s largest small-group adventure travel company and we’ve been making epic travel memories happen on all seven continents for over 30 years.
Our mission is simple: to change lives through travel. And not just our travelers’ either. Since day one, our tours have been built to establish meaningful relationships with local communities, directly benefiting the people and places we visit at every step of our tours.
With the demand for travel coming back strong, we are set up and excited for this next chapter in our company’s story — and we’d love for you to be a part of it.
Our DNA revolves around building, nurturing, and developing a diverse culture of people and a true sense of belonging, where everyone is encouraged to bring their authentic self to work each and every day. You’ll have the opportunity to grow your career, and yourself, alongside a passionate, talented, and welcoming community that works hard to spread goodness around the world.
If all that sounds like your kind of thing, well, we can’t wait for you to join us.
The Role
The Security Analyst is responsible for protecting the organization's systems, digital identities, and data from cyber threats through proactive monitoring, threat detection and incident response. This role involves collaborating with cross-functional teams to implement and maintain secure systems, conducting vulnerability assessments and ensuring compliance with industry standards and regulations. It also plays a key role in developing and refining security policies, incident response plans and disaster recovery procedures, while continually improving the organization's overall security posture.
This is a hybrid role based out of South Africa, where a minimum number of days as set by the region, is required in the Cape Town office.
What You'll be DoingThreat Detection, Monitoring & Incident Response
- Monitor and analyze security logs, alerts, and vulnerabilities in real time to detect anomalous or malicious activity.
- Analyze identity-related security events (e.g., impossible travel, session hijacking, brute force attempts) within Okta and correlated SIEM logs.
- Oversee alert management, including triaging and escalation processes for on-call coverage.
- Develop and maintain use cases, detection rules, and alerts in security monitoring platforms (e.g., SIEM) to enhance visibility and coverage.
- Configuration and tuning to ensure the SIEM is ingesting signals from all relevant sources, including Identity Provider (IdP) logs.
- Identify and assess threat campaigns and suspicious activity, leading or supporting investigations into security breaches, policy violations, identity compromise events and anomalous behavior.
- Coordinate incident response processes, perform root cause analysis, and recommend long-term mitigations to prevent recurrence.
- Develop and maintain runbooks for common incident scenarios, including account takeover and credential compromise.
- Participate in proactive defense initiatives, including blue-team exercises, tabletop simulations, and security audits, to improve preparedness and identify potential threats.
- Provide clear, actionable insights to relevant teams to support timely prevention, detection, and resolution of security incidents.
Security Operations, Risk Management & Compliance
- Conduct comprehensive network and system vulnerability assessments, track identified vulnerabilities throughout their lifecycle, and coordinate timely remediation and follow-up with responsible teams.
- Ensure patch management processes are executed promptly in coordination with impacted stakeholders.
- Manage and secure the Okta IdP environment, including configuration of policies for MFA, SSO, and Adaptive Authentication.
- Oversee Identity Lifecycle Management (provisioning/deprovisioning) to ensure least-privilege access and prevent unauthorized access.
- Implement and tune Identity Threat Protection mechanisms to block high-risk sign-in attempts automatically.
- Track new vulnerability lifecycle from discovery to closure.
- Implement, configure, tune, and manage security tools and solutions, including EDR platforms, firewalls, and IDS/IPS systems, to align…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: