As a Specialist Incident Response Analyst, you will play a central role in detecting, investigating, and responding to cyber incidents in a non-tiered SOC environment. You will own incidents end-to-end from triage through containment and recovery while applying an adversarial mindset to anticipate attacker behaviour. Alongside technical response, you will contribute to policy improvement, coaching, and industry engagement, ensuring the bank's response capability matures continuously. This role includes after-hours standby as part of an on-call rotation.
Qualifications
A degree Information Technology is required.
IT Risk/security certification such as CISM, CISSP or CISA, GCIA, GCIH, OSCP is required.
AWS/Azure Cloud Certifications.
Experience Required:
5-7 years experience in IT Security, preferably in a Financial Institution, with noted experience in developing threat models, threat analysis, cyber and incident management, offensive security, high level static and dynamic malware analysis.
5-7 years experience in strong IT understanding, gaining insight into digital and platform operating models and cyber security trends and solutions.
Strong experience in incident management, threat modelling, malware analysis, and offensive security techniques.
Broad IT systems knowledge and awareness of digital platform operating
models.
Additional Information
Key Responsibilities:
Detect & Investigate:
Analyse alerts from SIEM, EDR, and threat intelligence sources; distinguish true vs false positives.
Contain & Remediate:
Lead active incidents through containment, eradication, and recovery actions.
Threat Hunting:
Proactively search for adversary activity using attacker TTPs and threat intel.
Malware & Phishing Triage:
Perform static/dynamic malware analysis and investigate phishing campaigns.
Offensive Security Awareness:
Apply penetration testing/red team knowledge to strengthen detection and response.
Forensic Support:
Collect and analyse logs, endpoint, and network artifacts for root cause analysis.
On-Call Duties:
Provide after-hours escalation support on a rotational basis.
Documentation & Reporting:
Produce incident reports, lessons learned, and contribute to playbook improvements.
Behavioural Competencies:
Articulating Information
Checking Things
Directing People
Documenting Facts
Embracing Change
Examining Information
Interpreting Data
Making Decisions
Producing Output
Providing Insights
Taking Action
Team Working
Technical Competencies:
Data Analysis
Diagramming and Modelling
Documenting
Information Security
IT Knowledge
IT Systems
Research & Information Gathering
Please note:
All our recruitment processes comply with the applicable local laws and regulations. We will never ask for money or any from of payment as part of our recruitment process. If you experience this, please contact our Fraud line on +27 800222050 or TransactionFraudOpsSA@standardbank.co.za
Beware of fraud agents! do not pay money to get a job
MNCJobs.co.za will not be responsible for any payment made to a third-party. All Terms of Use are applicable.