BETSoftware is one of the most diverse betting software providers in Sub-Saharan Africa, with a rapidly growing international footprint. Our multiskilled Team is responsible for providing advanced software solutions, while supporting incredibly high transactional volumes in a fast-paced industry, making BETSoftware a lively and engaging place to be. Our prog...
Read more about this company
This position is a shift work based with a rotational schedule – This is a 365 day/7 days per week /24 hours a day department.
Monitoring and analysis of cyber security events
Monitoring of network traffic to detect potential threats and then escalating where necessary.
Analysing security breaches to identify the root cause and escalate to the Intermediate Security Analyst for resolutions.
Services monitored will include, but are not limited to SIEM, IDS/IPS, Firewall, Web Application Firewalls, Data Loss Prevention (DLP), Databases
Security Event Correlation and Reporting to appropriate Intermediate Security Analyst or Incident Response staff or relevant sources to determine increased risk to the business
Research and stay aware current IT security trends and news.
Recognize potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information Help colleagues install security software and understand information security management.
Monitoring that all Security tools are working properly.
Research security enhancements and make recommendations to management.
Updates inaccurate and add missing knowledge base documents where required
Handles escalations effectively, ensuring a minimal number of duplicate escalations created
When acknowledging alerts, ensures alerts are closed at the end of every shift
Monitors alerts and incidents diligently by actioning them in a timeous manner
Investigates alerts using the systems provided and adds investigation details to escalated incident descriptions
Reports back on identified trends that may be forming and/or proactive actions taken to reduce spam
Use advanced analytic tools to determine emerging threat patterns and vulnerabilities.
Qualifications
Matric or equivalent certification required.
Minimum of one (1) year in a Security (SOC) role and three (3) years preferred in Support.
Experience and Knowledge with SIEM, IDS/IPS, Firewall, Web Application Firewalls, Data Loss Prevention (DLP) and Security Event Correlation
Excellent analytical and problem-solving skills
Experience with technical writing
Possess an understanding of security standards and risk management
Have excellent written and verbal communication skills
Possess the ability to adjust and adapt to changing priorities in a dynamic environment
Be able to multi-task and be pro-active in addressing issues and requests
Possess technical acumen and the ability to understand and interpret technical specifications
Security + beneficial but not required
Living the spirit:
Embrace authenticity by recognizing that each team member's unique perspective, background, and ideas enrich our collective approach to security.
By daring to be ourselves, we contribute to a diverse and dynamic environment, fostering innovation and adaptability.
We thrive on the exhilaration of safeguarding our organization's digital assets in an ever-evolving landscape of cyber threats.
Each day presents new challenges, and we approach them with curiosity, resilience, and a sense of adventure. This attitude fuels our drive to stay at the forefront of IT security.
We firmly believe that a unified team is the cornerstone of our success. We actively collaborate, share knowledge, and support each other. Our spirit of teamwork extends beyond our immediate team to include our colleagues from various departments. We encourage and embrace the idea of Teamwork makes the dream work as we all work together to achieve business goals
We wholeheartedly embrace the responsibilities that come with the role, from monitoring security access to analysing security breaches. We proactively raise our hands, taking initiative to protect our organization's assets and uphold the highest standards of information security.