13 Jan 2025

L2 Incident Analysis at Liquid Intelligent Technologies Zambia

Never Miss a Job Update Again. Click Here to Subscribe

We have started building our professional LinkedIn page. Follow

Job Description


Role Requirements

Provides support for complex computer network exploitation and defence techniques to include deterring, identifying and investigating computer and network intrusions.

Provide incident response and remediation support.

Performing comprehensive computer surveillance/monitoring and identifying vulnerabilities.

Developing secure network designs and protection strategies and audits of information security infrastructure.

Provides technical support for continuous monitoring, computer exploitation and reconnaissance, target mapping and profiling and network decoy and deception operations in support of computer intrusion defence operations.

Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures and trends.

Performs research into emerging threat sources and develops threat profiles.

Provides technical support for a comprehensive risk management program identifying mission critical processes and systems, current and projected threats and system vulnerabilities.

Facilitate Red Team / Blue Team exercises and identify gaps in current monitoring tools and processes.

Develop playbooks for various incident scenarios and have a knowledge of automation processes and products.

Mentor junior analysts to become more effective at their jobs.

Candidate Requirements

Bachelor’s Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications.

One or more these industry Cybersecurity Certifications: CISM, CISA, CISSP-ISSEP, CISSP-ISSAP, GIAC Certified Incident Handler (GCIH), Certified Computer Security Incident Handler (CSIH), CEH, OSCP, CompTiA Linux+, Security+.

Prior experience to advise, plan, deploy, configure, manage and monitor large scale and complex cyber defense and IT risk management and information or cybersecurity solutions.

Managed security services experience across complex architectures.

Applications are invited from suitably qualified candidates to fill the role highlighted above.

Sharing is Caring! Click on the Icons Below and Share


Method of Application

Please forward your Application and CV to [email protected] clearly indicating the title of the Job applied for in the subject.

Closing date for all applications is Friday the 21st January 2025 .




Subscribe



Apply for this Job

x