×
Register Here to Apply for Jobs or Post Jobs. X

Intermediate Cyber Security Analyst; L2​/L3

Job in Cape Town, 7100, South Africa
Listing for: 60 Degrees
Full Time position
Listed on 2026-01-14
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below
Position: Intermediate Cyber Security Analyst (L2/L3)

Senior Cyber Security Analyst

Company:
Opliciti South Africa (Pty) Ltd

Geographical responsibility:
Global

Reports to:

Managing Director RSA, Head of Security Operations UK

Job Purpose

The Senior Security Analyst is a core member of the SOC, responsible for detecting, investigating, and mitigating cyber threats across complex client environments. Utilizing modern tools and expertise, the analyst conducts advanced investigations, enhances detection capabilities, and promotes ongoing improvements in incident response and threat hunting. This role combines deep technical expertise with strategic oversight—enhancing monitoring, automation, and defence capabilities while mentoring junior analysts.

The analyst also stays informed of emerging threats and vulnerabilities, ensuring clients in critical sectors remain protected against evolving attack vectors.

Job Interactions

Internally:
Interacts with the professional services teams, security operations teams and company Directors. Externally:
Engages with clients for escalations, investigations and service reviews, and supports business development through technical insights, pre‑sales consultations, and solution alignment.

Job Responsibilities
  • Monitor client environments/security systems as part of a dedicated security team or a shared services security team for alerts/incidents, analyse logs and traffic patterns, providing appropriate response in accordance with processes agreed with in contractual terms i.e. Service Description.
  • Provide support where required, to multiple customer environments concurrently; drive customer satisfaction and continuously seek to improve operational performance.
  • Work with internal and external client stakeholders to conduct in‑depth investigations on security events, raise incidents, contain and provide remediation and/or recommendations supporting the incident management process.
  • Act as an escalation point for any incidents and investigations that may be required.
  • Develop and understanding of client environment and requirements, build relationships with relevant stakeholders to provide effective communication through support channels.
  • Understand and apply use‑cases and develop playbooks enabling efficiency, improvements.
  • Develop and implement automation, notification, response and remediation processes.
  • Lead threat hunting investigations and apply any new feeds and sources relevant to detecting threats to the client.
  • Contribute to, and help in development of, security Dashboards/Reporting and processes.
  • Stay up to date and regularly educate team on the changing cyber security landscape and share information.
  • Support the ongoing maintenance of the company’s Information Security Management System (ISMS).
  • Be able to optimise work streams beyond BAU and assigned tasks, such as identifying enhancements and opportunities for continuous improvement.
Skills and Experience - Essential
  • To have a passion for security and rise to challenges.
  • Possess excellent communication, interpersonal and good leadership skills.
  • Good time management and ability to solve problems and manage different workloads.
  • Sufficient networking knowledge with the ability to understand network traffic, to be able to explain activity and advise next steps.
  • Minimum 4 years of experience working as a Cyber Security Analyst or equivalent.
  • Experience working in a SOC environment with tools as SIEM, SOAR, EDR etc.
  • Experience with Azure, Microsoft Sentinel and the Microsoft Security stack.
  • Proficiency in Kusto Query Language (KQL) and comfortable developing queries for detection and reporting.
  • Experienced with development of playbooks and applied automation for efficient workflows.
  • Comprehensive understanding of common malware types along with detection and prevention methods.
  • Understanding of Cloud computing/architecture and security.
  • Good awareness and understanding of the MITRE ATT&CK Framework.
  • Solid understanding of the different stages of the Cyber‑Kill‑Chain.
  • Be able to interact comfortably with stakeholders across multiple organisations, building strong relationships across all business units at all levels.
Desirable
  • Prior experience in an MSSP delivering security services to multiple clients.
  • Experience with multiple SIEM Technologies (Splunk, MS Sentinel, Log Rhythm, ELK, QRadar, Arcsight, Wazuh etc.).
  • Experience with cloud platforms such as AWS and GCP.
  • Experience with high‑profile enterprise clients e.g. – Oil & Gas, Manufacturing, Supply Chain etc.
  • Experience with using Microsoft Logic Apps/Power Automate or third‑party orchestration tools.
  • Experience with Power

    BI and developing visualisations via custom queries.
Qualifications

At least one or more of the following:
Industry standard certifications such as Microsoft, CompTIA, SANS, CREST, GIAC, ISC2 and or any other cyber security relation certifications.

#J-18808-Ljbffr
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary