Johannesburg
25 days ago
Security Specialist
Job Description Why choose Logicalis? It’s not just IT solutions, It’s IT global know-how!  Logicalis is an international multi-skilled solution provider providing digital enablement services to help customers harness digital technology and innovative services to deliver powerful business outcomes.Our customers span industries and geographical regions; and our focus is to engage in the dynamics of our customers’ vertical markets; including financial services, TMT (telecommunications, media and technology), education, healthcare, retail, government, manufacturing and professional services, and apply the skills of our 4,500 employees in modernising key digital pillars; data centre and cloud services, security and network infrastructure, workspace communications and collaboration, data and information strategies, and IT operation modernisation. We are the advocates for our customers for some of the world’s leading technology companies including Cisco, HPE, IBM, CA Technologies, NetApp, Microsoft, Oracle, VMware and ServiceNow

Logicalis employees are innovative, smart, entrepreneurial and customer centric, with a shared ambition of making Logicalis the worlds leading IT Solutions provider!

We offer speedy decision-making, opportunities for personal development, and a supportive, inclusive environment that celebrates our diversity.

Join us and become a part of something epic!

ROLE PURPOSE

The Security Operations Centre will provide defence against security breaches and actively isolate and mitigate security risks. The Security Specialist forms part of the security operations centre SOC team. The SOC Team will identify, analyse, and react to cyber security threats using a reliable set of processes and security technologies. The SOC Team includes the SOC Manager, SIEM Platform Manager, Case Manager, SOC Tier 1,2 and 3 Analysts and Security Specialists. They work with IT operational teams to address security incidents and events

quickly. The SOC Team will provide a critical layer of analysis needed to seek out any irregular activity that could suggest a security incident.

ROLE AND DELIVERY RESPONSIBILITIES:

The job role includes actively participating in the incident detection process as follows:

Possesses in-depth knowledge of network, endpoint, threat intelligence, forensics and malware reverse Analysis, as well as the functioning of specific applications or underlying IT infrastructureActs as an incident “hunter,” not waiting for escalated incidentsClosely involved in developing, tuning, and implementing threat detection analyticsActs as the escalation for Tier 1 and 2 SOC AnalystsResponds to and oversees the remediation of a declared security incidentCompletes the Root Cause Analysis Report for P1 to P4Provides guidance to Tier 1 and 2 SOC AnalystsUses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attackMonitors shift-related metrics ensuring applicable reporting is gathered and disseminated to the SOC ManagerMake recommendations to the SOC ManagerOversees the analysis on running processes and configs on affected systems. Undertakes in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impactedOversees the containment and recoveryOversees the deep-dive incident analysis by correlating data from various sourcesValidates if a critical system or data set has been impactedProvides support for analytic methods for detecting threatsConducts advanced triage based on defined run books of alertsUndertakes threat intelligence research if need beValidates false positives, policy violations, intrusion attempts, security threats and potential compromisesUndertakes security incident triage to provide necessary context prior to escalating to relevant Security Specialists to perform deeper analysis when necessaryFurther analyses alarms by method e.g. credentials compromised and by asset classBased on the correlation rules and alarms within the SIEM and run books, further analyses anomaly tactic using the MITRE ATT&CK frameworkAnalyses event and process metadata in real-time or retrospectively, and identify suspicious files/scripts seen for the first timeCloses tickets in the SIEM platform – this would be automatically created into Service NowManages security incidents using the SIEM platform and defined operational proceduresPerforms a further investigation of potential incidents, and escalate or close events as applicableValidates investigation results, ensuring relevant details are passed on to Tier 2 SOC Level 2 for further event analysisCloses out deeper analysis and review activitiesAssist senior SOC staff with operational responsibilities

PERSON REQUIREMENTS:

EXPERIENCE:

Strong knowledge and experience working with SIEM Solutions, QRadar, McAfee ESM, Azure SentinelProven experience with Office 365, Active Directory, Azure and Microsoft Exchange.Strong knowledge and experience working with Linux Operating systemsGood experience working with Nessus or QualysGood understanding of the MITRE ATT&CK frameworkGood understanding of the ITIL Framework.Brilliant with a support ticketing system and experience in meeting SLA targets.Familiarity with risk management and quality assurance control.Excellent interpersonal skills and professional demeanorExcellent verbal and written communication skillsCandidate must be eligible to obtain National Security Clearance

QUALIFICATIONS:

Grade 12SIEM Technology certification.AZ500,SC100ITIL Foundation qualificationDegree or Diploma in Computer TechnologyCompTIA A+, N+ S+CompTIA CySa, CISSP and CASP+ advantageous

ADDITIONAL SKILLS/ATTRIBUTES:

Advanced Microsoft Excel experience, specifically data interpretationGood understanding of IT infrastructureA high command of the English language both written and verbal is essential.Self-motivated with the ability to work unsupervised.Attention to detailPunctualityExcellent verbal and written communication skillsAbility to remain flexible and adapt to changing priorities with promptness, efficiency, and easePossess proficient analytical and decision-making skillsDemonstrated capacity for gathering and scrutinizing data to identify issues, opportunities, and patternsProficient relationship building skills – predict customer behavior and respond accordinglyA strong service-oriented (‘can-do’) culture, with a strong focus on the ‘internal customer’ approach, committed to exceeding customer expectationsGood communicator with the customer environmentDynamic but aware of the views and feelings of othersAble to operate as a good team playerDrive and EnergyDemonstrate clear purpose, enthusiasm, and commitment
Confirm your E-mail: Send Email