More jobs:
Specialist, Incident Response
Job in
Johannesburg, 2000, South Africa
Listed on 2025-11-24
Listing for:
Standard Bank of South Africa Limited
Full Time
position Listed on 2025-11-24
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant, Information Security
Job Description & How to Apply Below
Overview
Location:
ZA, GP, Johannesburg, Simmonds Street
As a Specialist Incident Response Analyst, you will play a central role in detecting, investigating, and responding to cyber incidents in a non-tiered SOC environment. You will own incidents end-to-end from triage through containment and recovery while applying an adversarial mindset to anticipate attacker behaviour. Alongside technical response, you will contribute to policy improvement, coaching, and industry engagement, ensuring the bank’s response capability matures continuously.
This role includes after-hours standby as part of an on-call rotation.
- A degree Information Technology is required.
- IT Risk/security certification such as CISM, CISSP or CISA, GCIA, GCIH, OSCP is required.
- AWS/Azure Cloud Certifications.
Experience
Required:
- 5-7 years experience in IT Security, preferably in a Financial Institution, with noted experience in developing threat models, threat analysis, cyber and incident management, offensive security, high level static and dynamic malware analysis.
- 5-7 years experience in strong IT understanding, gaining insight into digital and platform operating models and cyber security trends and solutions.
- Strong experience in incident management, threat modelling, malware analysis, and offensive security techniques.
- Broad IT systems knowledge and awareness of digital platform operating models.
- Detect & Investigate:
Analyse alerts from SIEM, EDR, and threat intelligence sources; distinguish true vs false positives. - Contain & Remediate:
Lead active incidents through containment, eradication, and recovery actions. - Threat Hunting:
Proactively search for adversary activity using attacker TTPs and threat intel. - Malware & Phishing Triage:
Perform static/dynamic malware analysis and investigate phishing campaigns. - Offensive Security Awareness:
Apply penetration testing/red team knowledge to strengthen detection and response. - Forensic Support:
Collect and analyse logs, endpoint, and network artifacts for root cause analysis. - On-Call Duties:
Provide after-hours escalation support on a rotational basis. - Documentation & Reporting:
Produce incident reports, lessons learned, and contribute to playbook improvements.
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×