Join our global team of extraordinary technologists!
Ready to elevate your career to new heights with an industry-leading technology consultancy? Look no further than BUI - a distinguished Microsoft Azure Expert MSP, Microsoft Solutions Partner for the Microsoft Cloud, and Microsoft Security Experts MXDR Partner. We focus on delivering cutting-edge solutions across Cloud, Security, Networking, and Managed Services, and we cater to mid-market and enterprise-level organisations on a global scale.
At BUI, we're guided by three foundational principles: innovation, delivery, and results. As a member of our team, you would work with exceptional architects, consultants, developers, engineers, and security experts to create sophisticated IT solutions that empower our customers to modernise, transform, and propel their businesses forward.
The Position
Cyber MXDR Analyst
Ideal Candidate Profile
A Cyber MXDR Analyst is highly detail-oriented, with a strong focus on accuracy and consistency. This trait is essential for monitoring logs, triaging alerts, and following standard operating procedures without missing critical indicators.
You are also calm under pressure, able to maintain composure during high-severity incidents and respond with urgency in a methodical and structured manner, even in a 24/7 shift-based environment. Reliability and a process-driven mindset are crucial.
Role Purpose
Cyber MXDR Analysts serve as the first line of defence in a Security Operations Centre (SOC), monitoring security alerts, performing triage, and escalating incidents to minimize organizational risk. This function operates around the clock, using SIEM and EDR platforms to analyse environments, investigate threats, respond to incidents, report findings, and contribute to continual improvement efforts.
Responsibilities
Threat Monitoring & Triage:
Monitor, triage, and respond to alerts from SIEM, EDR, tickets, email, and phone
Perform initial analysis to assess severity and impact
Categorise events using threat intelligence and playbooks
Escalate incidents to Cyber MXDR Consultants or customers as required
Meet Service Level Agreement (SLA) targets such as Mean Time to Triage (MTTT) and Mean Time to Respond (MTTR)
Incident Response & Investigation:
Conduct incident investigations and support active response efforts
Collaborate with Cyber MXDR Consultants and Senior Consultants during escalations
Participate in incident and vulnerability management processes
Correlate vulnerabilities with known threats and assess potential exposures
Document investigation steps, outcomes, and lessons learned
Security Operations & Optimisation:
Recommend improvements to SOC/MXDR processes, procedures, and policies
Provide input on tuning detection rules, alert logic, and reducing false positives
Identify ineffective alerts and suggest enhancements
Support evaluation and troubleshooting of security solutions and infrastructure
Follow SOPs for incidents, problems, and change management
Collaboration, Communication & Reporting:
Communicate effectively with customers, teammates, and management
Maintain customer build documents, security procedures, and process documentation
Contribute to monthly reporting and participate in client meetings
Engage in team briefings, handovers, and Microsoft Teams channels for situational awareness
Continuous Learning:
Stay current with emerging threats, attack techniques, and regulatory requirements
Participate in training, simulations, and knowledge-sharing workshops
Qualifications
A bachelor's degree/diploma in a relevant area with a preference for Information Security, Computer Science, or Computer Engineering.
+ Vulnerability Detection and Response (VMDR)
+ Cyber Security Asset Management (CSAM)
+ Scanning Strategies and Best Practices
Preferred Experience
Security Monitoring & Detection:
Monitor and analyse alerts using Microsoft Sentinel
Respond to Malware and Targeted attacks using Microsoft Defender XDR and Microsoft Sentinel
Use IDS/IPS tools to detect suspicious activity
Perform log analysis and Windows event log reviews
Support basic network and host forensics
Infrastructure & Network Fundamentals:
Administer and troubleshoot Windows and Linux systems
Understand networking infrastructure and protocols (TCP/IP, FTP, HTTPS, SSH)
Work with firewalls and security stack devices
Support the Change Management processes
Vulnerability & Threat Management:
Use vulnerability scanning tools (Nessus, Qualys)
Conduct network scans with tools like NMAP
Apply knowledge of CVSS/CMSS scoring systems
Track vulnerabilities and mitigation efforts to support programme effectiveness
Tooling, Scripting & Troubleshooting:
Use packet analysis tools (Wireshark, Carbon Black)
Write basic scripts in Python or Bash for automation and analysis
Troubleshoot issues and perform root cause analysis
* Leverage SharePoint and Power BI for documentation and reporting.
Beware of fraud agents! do not pay money to get a job
MNCJobs.co.za will not be responsible for any payment made to a third-party. All Terms of Use are applicable.