×
Register Here to Apply for Jobs or Post Jobs. X

Security Analyst

Job in Cape Town, 7100, South Africa
Listing for: G Adventures
Full Time position
Listed on 2025-12-07
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Job Description & How to Apply Below

About Us

G Adventures is the world’s largest small-group adventure travel company and we’ve been making epic travel memories happen on all seven continents for over 30 years.
Our mission is simple: to change lives through travel. And not just our travelers’ either. Since day one, our tours have been built to establish meaningful relationships with local communities, directly benefiting the people and places we visit at every step of our tours.
With the demand for travel coming back strong, we are set up and excited for this next chapter in our company’s story — and we’d love for you to be a part of it.
Our DNA revolves around building, nurturing, and developing a diverse culture of people and a true sense of belonging, where everyone is encouraged to bring their authentic self to work each and every day. You’ll have the opportunity to grow your career, and yourself, alongside a passionate, talented, and welcoming community that works hard to spread goodness around the world.
If all that sounds like your kind of thing, well, we can’t wait for you to join us.

About

The Role

The Security Analyst is responsible for protecting the organization's systems, digital identities, and data from cyber threats through proactive monitoring, threat detection and incident response. This role involves collaborating with cross-functional teams to implement and maintain secure systems, conducting vulnerability assessments and ensuring compliance with industry standards and regulations. It also plays a key role in developing and refining security policies, incident response plans and disaster recovery procedures, while continually improving the organization's overall security posture.

This is a hybrid role based out of South Africa, where a minimum number of days as set by the region, is required in the Cape Town office.

What You'll be Doing

Threat Detection, Monitoring & Incident Response

  • Monitor and analyze security logs, alerts, and vulnerabilities in real time to detect anomalous or malicious activity.
  • Analyze identity-related security events (e.g., impossible travel, session hijacking, brute force attempts) within Okta and correlated SIEM logs.
  • Oversee alert management, including triaging and escalation processes for on-call coverage.
  • Develop and maintain use cases, detection rules, and alerts in security monitoring platforms (e.g., SIEM) to enhance visibility and coverage.
  • Configuration and tuning to ensure the SIEM is ingesting signals from all relevant sources, including Identity Provider (IdP) logs.
  • Identify and assess threat campaigns and suspicious activity, leading or supporting investigations into security breaches, policy violations, identity compromise events and anomalous behavior.
  • Coordinate incident response processes, perform root cause analysis, and recommend long-term mitigations to prevent recurrence.
  • Develop and maintain runbooks for common incident scenarios, including account takeover and credential compromise.
  • Participate in proactive defense initiatives, including blue-team exercises, tabletop simulations, and security audits, to improve preparedness and identify potential threats.
  • Provide clear, actionable insights to relevant teams to support timely prevention, detection, and resolution of security incidents.

Security Operations, Risk Management & Compliance

  • Conduct comprehensive network and system vulnerability assessments, track identified vulnerabilities throughout their lifecycle, and coordinate timely remediation and follow-up with responsible teams.
  • Ensure patch management processes are executed promptly in coordination with impacted stakeholders.
  • Manage and secure the Okta IdP environment, including configuration of policies for MFA, SSO, and Adaptive Authentication.
  • Oversee Identity Lifecycle Management (provisioning/deprovisioning) to ensure least-privilege access and prevent unauthorized access.
  • Implement and tune Identity Threat Protection mechanisms to block high-risk sign-in attempts automatically.
  • Track new vulnerability lifecycle from discovery to closure.
  • Implement, configure, tune, and manage security tools and solutions, including EDR platforms, firewalls, and IDS/IPS systems, to align…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary