Posted on :
15 Dec, 2021
15 Dec, 2021
The Security Specialist researches, develops, implements, test and review an organization’s information security in order to protect information and prevent unauthorized access. Systems are protected by defining Incident Response and architecture to integrate detection into Letshego Information Systems.
Job Title: Senior- SOC Specialist
Location: Gaborone, South East, Botswana
Reference #: Senior- SOC Specialist
Contract Type: Permanent
Salary: Market Related
Protects the company from unauthorised access to information and breaches by analysing vulnerabilities and threats with the view to implement and administer controls such as SIEM, AI-based detection systems, Rating systems, Threat Intelligence and Internet monitoring systems.
Minimise the company’s attack surface by continuously improving the modelling of logs and event rule sets to detect all critical events for correlation to locate incidents and to prioritise the Incidence handling:
Monitor the entire Letshego environment for vulnerabilities, configuration weakness, security control gaps, threats and breaches and drive remediation action,
Monitor the entire Letshego network for outages and critical alerts. Network monitoring is critical to ensure the availability of data,
Creation and support of systems to ensure that all incidents are cleared,
Do Pro-active planning based on threats found to minimise risk against similar future attacks,
Raise And maintain Letshego Security Maturity at Threat hunting level,
Pro-actively align security to current attack vectors,
Implement Internet monitoring for damage control and proactive planning purposes.
Incident Response planning and maintenance. Assistance with Incident responses.
Work closely with the Forensics team to protect evidence while assisting in ensuring fast isolation of breached systems to lateral movement and further damage.
Intelligence checking all systems, prioritising AI-based system, ensuring that:
The only hardware that should be on the Letshego network prioritising there and that the hardware is in the correct security zone(s) based on sensitivity and criticality of data.
Only approved software communicate on Letshego hardware and that no BOYD and guest devices have malicious software communicating via the Letshego network especially not towards areas that require higher levels of security
That all software operating in the Letshego environment is the most secure version (without impacting business)
That all systems are configured to the highest security level while allowing those that need to use it simple access
Those access rights especially privilege access rights do not get abused
That there are no Malware or Spam outbreaks
That PII, IP and other sensitive data does not flow anywhere unless it supports business
That hacking attempts are found early and controlled
That systems remain available to support the business by monitoring for congestion, space and other capacity issues
That data remains integral at all times
That processes that support the business that requires network or Internet access remain available & secure, e.g. Communications like VoIP, video conferencing systems, power systems, access control, network-based training & marketing systems, and airconditioning.
Pickup when flows that should be encrypted are not and locate encrypted flows that do not belong on the network
Security Monitoring Architecture and Integration to be aligned with Letshego chosen architecture frameworks to support policy and business:
Proper architecture documentation must be maintained for the overall network (High level) and each solution,
Solutions must be aligned to fit seamlessly into Network Security Architecture, and exceptions and risks should be raised appropriately.
Minimises the company’s attack surface by enhancing Endpoint protection using the appropriate technology for optimum protection:
Use a combination of protective and Detective solutions to ensure security when systems are on the Letshego LAN and when they are Out of the Office.
Ensure patching and upgrades of all software as per Letshego Standards
Vulnerability Management and System Hardening:
Vulnerability Management to ensure that Vulnerabilities are prioritised and managed within reasonable timeframes and that controls are implemented where residual risk remains high;
Report Assets and vulnerabilities whenever required by the business using banks chosen metrics;
Deals with Supply chain and Supply chain research and makes recommendations to ensure that third party processes and policy (or lack there off) do not expose Letshego Sensitive data, and that chosen provider has capacity and capability to provide in Letshego Support needs.
Work with project teams to ensure that all projects produce results that can be monitored from an availability, confidentiality and Integrity perspective and that part of the project ensures integration into monitoring systems.
Works with Internal Audit team and peers in the department to ensure those audit findings are managed to closure.
Researches, recommend and review new IT security systems and solutions to ensure the Bank uses modern solutions to address exposure to fast-changing global security risks and make recommendations to IT Management for medium to long term planning;
Identifies opportunities for improving business processes through information systems and non-system driver changes; assists in the preparation of proposals to develop new systems or operational changes;
Assist to create and implement security-related disaster recovery plans by conducting disaster recovery planning and testing on controls within the scope of the role, in case of a disruption to business operations ensuring that at least the same level of security exists during disasters and their aftermath and where not possible that business is aware of the risk and its potential impact;
Continuously make all staff in radar more aware of their responsibility in making the organisation more secure. Attention should be focused primarily on staff whose duties gives them privileged access or whose functions can make or break security and privacy;
Documents security systems technically and administratively;
•Bachelor’s Degree in Computer Science or Diploma in Information Systems with five years of Information Security experience in a Security
•As many Security Industry related Certifications as possible, e.g. CISSP, CISA, CASP+, CEH, OSCP, any GIAC qualifications, any SANS
qualifications and specifically SOC Analyst and Incident handling qualifications.
•Product Specific Qualifications like Cisco Security Certs, CCSA/E, F5-CA/CTS/CSE, Fortinet NSE4-8 but some specifically in SIEM, Logging
and Network Management and Security Operations Solutions.
•Proof of continuous learning.
•Understanding and knowledge of control frameworks ISO 27002 and CIS
•Information Security Engineering Experience
•Information Security Architecting Experience
•Substantial Technical experience in the following areas a must:
oSIEM & AI detective network-based tools
oGood understanding of the working of all technical security controls with an in-depth understanding of how different systems logs information and how to normalise collect and information to be able to correlate events and locate incidents
oIn-depth understanding of all protocols and especially SNMP, SYSLOG and how to inspected encrypted protocols
oVulnerability Management including S/W & H/W Asset control
•Secure Administrative Experience on mentioned security tools
•Technical writing including the creation of policies, standards, procedures & guidelines
•IT Security Audit fundamentals
•Sound IT Security systems concepts and principles
•Complex modelling techniques
•In-depth understanding of Security Operations Centres and management of Incidents
•Analytical and conceptual expertise
•Incident Response Analysis & handling
•Planning, documentation, analysis and business requirements management techniques
•Evaluation of profitability/risk
•Testing, verification and validation techniques
•Creation of the Business Requirements Document
•Administrative and reporting abilities
•Knowledge of business processes within the context of Financial Services
•Improvement of business and engineering processes
•Digital Leakage & Prevention
•Identity & Access Management
•Confidentiality, ethical behaviour, privacy & integrity
•Policies, procedures, standards and guidelines
•Ability to formulate concepts
•Communication of technical information to a non-technical audience
•Communication of business information to a technical audience
Application Deadline: 31/12/2021