Senior Security Specialist- Threat Hunter
Johannesburg, South Africa
Applications have closed
Old Mutual Limited
Old Mutual Limited (OML) is a premium African financial services group that offers a broad spectrum of financial solutions to retail and corporate customers.Let's Write Africa's Story Together!
Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.
Job Description
Purpose for the Role
The role of the Senior Specialist Threat Hunter is to proactively work together with cybersecurity team. This role requires a highly skilled individual capable of identifying and mitigating sophisticated cyber threats that bypass traditional security measures. The ideal candidate will bring a deep understanding of the cyber threat landscape and the ability to design and implement innovative threat hunting strategies.
Key Responsibilities:
Lead the development and execution of advanced threat hunting campaigns to detect and analyze potential threats and vulnerabilities.
Utilize a range of tools and techniques to mine through data and identify patterns indicating malicious activities.
Design and refine custom detection methodologies to improve the proactive capabilities of our security infrastructure.
Collaborate with SOC analysts to enhance incident response strategies and reduce detection time for threats.
Conduct deep-dive investigations into network anomalies and provide detailed analysis regarding intrusion attempts and false positives.
Develop and deliver comprehensive reports to stakeholders detailing threat analysis results, potential impacts, and recommended countermeasures.
Stay abreast of emerging security threats and continuously update and refine hunting strategies to adapt to evolving adversarial tactics.
Mentor junior team members and contribute to the development of educational programs to enhance team capabilities in threat detection and response.
Job Requirements (Qualifications, Skills and Experience )
Bachelor's or Master’s degree in Computer Science, Cybersecurity, or a related field.
Minimum of 6 years’ experience in cybersecurity, with at least 3 years in threat hunting or a similar role.
Expertise in using advanced cybersecurity tools and platforms for threat detection and analysis.
Strong technical proficiency in network, endpoint, and cloud security architectures.
Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Certified Incident Handler (GCIH) are preferred.
Demonstrated ability to think like an attacker and anticipate cyber adversary tactics.
Exceptional analytical skills and the ability to manage complex projects under tight deadlines.
Excellent communication and leadership skills, capable of working effectively in both team-oriented and independent environments.
Preferred Skills:
Proficiency in scripting languages such as Python, Bash, or PowerShell to automate tasks and manipulate data.
Experience with SIEM tools, especially in creating and tuning custom rules and alerts.
Deep understanding of the latest cybersecurity threats, including APTs, ransomware, and phishing.
All About OMI:
https://www.oldmutual.co.za/about/old-mutual-insure/
Designs and builds the organisation's cybersecurity systems and infrastructure. Provides specialist knowledge on maintaining a secure cyber security framework. Analyses and monitors the organisation’s cybersecurity measures and responds to actual penetration attempts by malicious hackers.ResponsibilitiesInformation Security
Lead in detecting and analyzing security incidents, including attacks, breaches, and identified vulnerabilities, and remediate any security gaps in line with the security incident management procedure.
Company Data Protection
Design and implement disaster recovery and contingency plans to protect company data.
Horizon Scanning
Explore and develop a detailed understanding of external developments or emerging issues and evaluate their potential impact on, or usefulness to, the organization.
Data Exploration
Conduct research and select relevant information to enable analysis of key themes and trends using primary data sources and business intelligence tools.
Policies and Procedures Development
Contribute to the drafting of policies, procedures, and related guidelines within an area of expertise to meet defined key principles and ensure compliance with external requirements.
Business Requirements Identification
Collect business requirements using a variety of methods, such as interviews, document analysis, workshops, and workflow analysis, to express the requirements in terms of target user roles and goals.
Faults Diagnosis and Correction
Provide fault isolation and resolution for complex challenges to limit and address issues promptly.
Technical Developments Recommendation
Discuss and recommend technical developments to improve the quality of the website/portal/applications software and supporting infrastructure to better meet users’ needs.
Operational Compliance
Maintain and renew a deep knowledge and understanding of the organization's policies and procedures and of relevant regulatory codes and codes of conduct, and ensure own work adheres to required standards. Or identify, within the team, patterns of noncompliance with the organization's policies and procedures and with relevant regulatory codes and codes of conduct, taking appropriate action to report and resolve these and escalating issues as appropriate.
Database Specifications
Contribute to the approval process for database specifications to ensure all agreed standards and protocols are followed and data integrity is preserved.
Personal Capability Building
Develop own capabilities by participating in assessment and development planning activities as well as formal and informal training and coaching; gain or maintain external professional accreditation, where relevant, to improve performance and fulfill personal potential. Maintain an in-depth understanding of technology, external regulation, and industry best practices through ongoing education, attending conferences, and reading specialist media.
Skills
Adaptive Thinking, Application Development, Computer Literacy, Confidentiality, Data Compilation, Data Compression, Data Controls, Data Modeling, Data Privacy, Data Recovery, Digital Literacy, Gateway Servers, IT Network Security, Probing Questions, Test Case ManagementCompetencies
Action OrientedCommunicates EffectivelyCultivates InnovationEnsures AccountabilityManages ComplexityNimble LearningOptimizes Work ProcessesPersuadesEducation
Bachelor of Commerce (BCom): Information Management (Required), NQF Level 7 - Degree, Advance Diploma or Postgraduate Certificate or equivalentClosing Date
02 April 2025 , 23:59The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.
The Old Mutual Story!
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Bash Business Intelligence CEH CISSP Cloud Compliance Computer Science GCIH GIAC Incident response Network security PowerShell Privacy Python Scripting SIEM SOC Threat detection Vulnerabilities
Perks/benefits: Conferences Team events
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.