Cyber Security Fusion Specialist (Analyst)
  • South Africa Johannesburg
  • Mimecast
1 year before
31.12.2023
Analyze
All-Source Analysis
Job Description

You're dream cyber resilience team!


We are looking for a talented and enthusiastic Security Fusion Specialist. You will become a key part of Mimecast’s global Data Fusion (DF) team and will help contribute towards ensuring the Mimecast DF remains a cyber security centre of excellence. The Fusion team aims to derive a complete assessment of activity through fusion, analysis, and co-ordination to support decision makers. The role will work across the tactical, operational, and strategic levels and support driving forward the implementation of the Mimecast Cyber Security Strategy program. The role will suit a candidate with abundance of soft skills and ability to communicate and influence positive decision making across various levels of the Mimecast organization. Mimecast operates within an extremely high cyber threat environment. Maintaining and enhancing its reputation, for secure trustworthy services, is critical for continued growth and as such Mimecast has a low-risk appetite for cyber risk. The goal of the Cyber Security team is to enable Mimecast to achieve business objectives while maintaining risk appetite. This is achieved through contextual efficacy testing and validation of the completes stack of enterprise cyber security controls against risk appetite. Provide technology enablement, security operations consultancy and thought leadership delivered as core capabilities. This includes security risk analysis, decision support, development, and communication of security operational doctrines through consistent validation and assurance, implementation and management of operational policies, requirements and standards, operational cybersecurity architecture, situational awareness of critical capabilities, security tech stack tooling, requirements, and operations. The Security Fusion Specialist will provide usable information that typically assesses events, or adversaries to allow the appropriate deployment of resources to reach desired outcome. Detailing the likelihood and the consequence of an incident occurring and investigate the effectiveness of existing control measures and determines if further prevention and mitigation measures are required.


Key Responsibilities


Support all phases of collection, consolidation, process, and evaluation of all source data.
Generating situational awareness into evolving threats and adversary technical capabilities, tactics, techniques, and procedures.
Identify risk exposure and inform good practice and network security.
Provide critical infrastructure analysis, identify risk exposure, and articulate mitigations.
Identify, develop, and advise on key adversary detection, response capability mechanisms targeting known threat actor tactics, techniques, and procedures (TTPs) to support Defensive Security Operations.
Supply chain risk monitoring
As Data Fusion specialists you will work with various internal and external stakeholders to make sure that Mimecast’s security posture is always being strengthened as we work to continually improve our security configurations, practices, and processes.
Ancillary activities that you would be involved in may include providing security-related assistance to internal staff members, applying commonly used information security standards and frameworks with respect to the systems being used in the security team (e.g., ISO 27001, NIST and Mitre Att&ck).
Production of presentations and briefings.


You'll need


Experience of working with structured analytical methods and tools in high tempo operational environments.
Critical thinking
Data Analytics
Experience in Threat and Risk led global environments that handle millions of records per day.
Excellent team-working skills, and a "can do, let's get it done" attitude is crucial.
A desire to keep learning, extending your skills and pushing the boundaries of your knowledge.
A positive team player
Strong relationship management, collaboration and influencing skills.
Strong interpersonal and communication skills with a proven ability to communicate effectively and confidently at all levels.
High level of drive and motivation to ensure delivery of a broad range of outputs to support our security strategy.


Why Mimecast?


We’re fast thinking. We go big to reach our cyberattack-disrupting goals. And we do what we need to protect the world of business from getting important (and potentially compromising) data stolen. We never leave anyone behind. We deliver quickly – and outstandingly. We’re big on honesty because it makes us better. We’re empowered by our mission. And if cybercriminals have a good day, we work twice as hard to make the rest of their days a nightmare. That’s The Mimecast Way.


And the Mimecast way is also a hybrid-working way. We empower our people to balance their time between home and the office in a way that works best for them, their team, and our stakeholders.


Become a Mimecaster and put corporate data under your protection. Fill our teams with respect. And bring cybercrime-obstructing energy to your work. Be passionate. Be powerful. Be alive with purpose.


DEI Statement


Cybersecurity is a community effort. That’s why we’re committed to building an inclusive, diverse community that celebrates and welcomes everyone – unless they’re a cybercriminal, of course.


We’re proud to be an Equal Opportunity and Affirmative Action Employer, and we’d encourage you to join us whatever your background. We particularly welcome applicants from traditionally underrepresented groups.


We consider everyone equally: your race, age, religion, sexual orientation, gender identity, ability, marital status, nationality, or any other protected characteristic won’t affect your application.


Due to certain obligations to our customers, an offer of employment will be subject to your successful completion of applicable background checks, conducted in accordance with local law.


Quick response

Required Knowledge
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0058   Knowledge of network traffic analysis methods.
  • K0409   Knowledge of cyber intelligence/information collection capabilities and repositories.
  • K0437   Knowledge of general Supervisory control and data acquisition (SCADA) system components.
  • K0449   Knowledge of how to extract, analyze, and use metadata.
  • K0560   Knowledge of the basic structure, architecture, and design of modern communication networks.
  • K0565   Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
  • K0417   Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Required Skills
  • S0288   Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).

Required Abilities
  • A0066  Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • A0083  Ability to evaluate information for reliability, validity, and relevance.
  • A0084  Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
  • A0106  Ability to think critically.