Senior Security Specialist- Threat Hunter

Johannesburg, South Africa

Old Mutual Limited

Old Mutual Limited (OML) is a premium African financial services group that offers a broad spectrum of financial solutions to retail and corporate customers.

View all jobs at Old Mutual Limited

Let's Write Africa's Story Together!

Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.

Job Description

Purpose for the Role

The role of the Senior Specialist Threat Hunter is to proactively work together with cybersecurity team. This role requires a highly skilled individual capable of identifying and mitigating sophisticated cyber threats that bypass traditional security measures. The ideal candidate will bring a deep understanding of the cyber threat landscape and the ability to design and implement innovative threat hunting strategies.

Key Responsibilities:

  • Lead the development and execution of advanced threat hunting campaigns to detect and analyze potential threats and vulnerabilities.

  • Utilize a range of tools and techniques to mine through data and identify patterns indicating malicious activities.

  • Design and refine custom detection methodologies to improve the proactive capabilities of our security infrastructure.

  • Collaborate with SOC analysts to enhance incident response strategies and reduce detection time for threats.

  • Conduct deep-dive investigations into network anomalies and provide detailed analysis regarding intrusion attempts and false positives.

  • Develop and deliver comprehensive reports to stakeholders detailing threat analysis results, potential impacts, and recommended countermeasures.

  • Stay abreast of emerging security threats and continuously update and refine hunting strategies to adapt to evolving adversarial tactics.

  • Mentor junior team members and contribute to the development of educational programs to enhance team capabilities in threat detection and response.

Job Requirements (Qualifications, Skills and Experience )

  • Bachelor's or Master’s degree in Computer Science, Cybersecurity, or a related field.

  • Minimum of 6 years’ experience in cybersecurity, with at least 3 years in threat hunting or a similar role.

  • Expertise in using advanced cybersecurity tools and platforms for threat detection and analysis.

  • Strong technical proficiency in network, endpoint, and cloud security architectures.

  • Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Certified Incident Handler (GCIH) are preferred.

  • Demonstrated ability to think like an attacker and anticipate cyber adversary tactics.

  • Exceptional analytical skills and the ability to manage complex projects under tight deadlines.

  • Excellent communication and leadership skills, capable of working effectively in both team-oriented and independent environments.

Preferred Skills:

  • Proficiency in scripting languages such as Python, Bash, or PowerShell to automate tasks and manipulate data.

  • Experience with SIEM tools, especially in creating and tuning custom rules and alerts.

  • Deep understanding of the latest cybersecurity threats, including APTs, ransomware, and phishing.

All About OMI:

https://www.oldmutual.co.za/about/old-mutual-insure/

https://www.linkedin.com/posts/old-mutual-insure_i-work-at-old-mutual-insure-of-course-activity-7161674472469524483-w0j6?utm_source=share&utm_medium=member_desktop

Designs and builds the organisation's cybersecurity systems and infrastructure. Provides specialist knowledge on maintaining a secure cyber security framework. Analyses and monitors the organisation’s cybersecurity measures and responds to actual penetration attempts by malicious hackers.

Responsibilities

Information Security

Lead in detecting and analyzing security incidents, including attacks, breaches, and identified vulnerabilities, and remediate any security gaps in line with the security incident management procedure.

Company Data Protection

Design and implement disaster recovery and contingency plans to protect company data.

Horizon Scanning

Explore and develop a detailed understanding of external developments or emerging issues and evaluate their potential impact on, or usefulness to, the organization.

Data Exploration

Conduct research and select relevant information to enable analysis of key themes and trends using primary data sources and business intelligence tools.

Policies and Procedures Development

Contribute to the drafting of policies, procedures, and related guidelines within an area of expertise to meet defined key principles and ensure compliance with external requirements.

Business Requirements Identification

Collect business requirements using a variety of methods, such as interviews, document analysis, workshops, and workflow analysis, to express the requirements in terms of target user roles and goals.

Faults Diagnosis and Correction

Provide fault isolation and resolution for complex challenges to limit and address issues promptly.

Technical Developments Recommendation

Discuss and recommend technical developments to improve the quality of the website/portal/applications software and supporting infrastructure to better meet users’ needs.

Operational Compliance

Maintain and renew a deep knowledge and understanding of the organization's policies and procedures and of relevant regulatory codes and codes of conduct, and ensure own work adheres to required standards. Or identify, within the team, patterns of noncompliance with the organization's policies and procedures and with relevant regulatory codes and codes of conduct, taking appropriate action to report and resolve these and escalating issues as appropriate.

Database Specifications

Contribute to the approval process for database specifications to ensure all agreed standards and protocols are followed and data integrity is preserved.

Personal Capability Building

Develop own capabilities by participating in assessment and development planning activities as well as formal and informal training and coaching; gain or maintain external professional accreditation, where relevant, to improve performance and fulfill personal potential. Maintain an in-depth understanding of technology, external regulation, and industry best practices through ongoing education, attending conferences, and reading specialist media.

Skills

Adaptive Thinking, Application Development, Computer Literacy, Confidentiality, Data Compilation, Data Compression, Data Controls, Data Modeling, Data Privacy, Data Recovery, Digital Literacy, Gateway Servers, IT Network Security, Probing Questions, Test Case Management

Competencies

Action Oriented

Communicates Effectively

Cultivates Innovation

Ensures Accountability

Manages Complexity

Nimble Learning

Optimizes Work Processes

Persuades

Education

Bachelor of Commerce (BCom): Information Management (Required), NQF Level 7 - Degree, Advance Diploma or Postgraduate Certificate or equivalent

Closing Date

02 April 2025 , 23:59

The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.

The Old Mutual Story!

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Threat Intel Jobs

Tags: Bash Business Intelligence CEH CISSP Cloud Compliance Computer Science GCIH GIAC Incident response Network security PowerShell Privacy Python Scripting SIEM SOC Threat detection Vulnerabilities

Perks/benefits: Conferences Team events

Region: Africa
Country: South Africa

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.