CrawlJobs Logo

Cyber Security Operations Specialist

vodafone.com Logo

Vodafone

Location Icon

Location:
Congo, the Democratic Republic of the , Kinshasa

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

A Cyber Security Operations Specialist is a professional responsible for protecting an organization's information systems and data from cyber threats. This role typically involves monitoring networks for security breaches, investigating incidents, implementing security measures, and responding to security incidents

Job Responsibility:

  • Continuously monitor security systems and networks for unusual activity or potential threats
  • Analyse security alerts and logs to identify and respond to incidents
  • Investigate security incidents and breaches to determine their cause and impact
  • Coordinate the response to security incidents, including containment, eradication, and recovery
  • Maintain a concise, audit-ready Incident Response Plan that defines severity matrix, escalation paths, decision authority, evidence handling, and communications (internal, executive, legal, regulator)
  • Own a version-controlled repository of actionable playbooks (phishing, business email compromise, ransomware, webshell, data exfiltration, insider risk, credential theft, cloud token abuse)
  • Ensure that logs from servers, cloud apps, domain controllers, proxies, domain controllers, email and smtp gateways, PUAM, firewalls are collected, easy to read, time-synchronized, and stored securely
  • Build and maintain smart alert rules that spot real attacks (based on MITRE ATT&CK) and reduce noisy false alarms
  • Create dashboards and weekly reports that show what we’re seeing and how fast we respond
  • Stay updated on the latest cyber threats, vulnerabilities, and attack vectors
  • Utilize threat intelligence and threat hunting techniques to enhance the organization’s security posture
  • Work closely with Technology teams, management, and external partners to ensure a cohesive security strategy
  • Participate in security audits and assessments
  • Conduct forensic analysis of security incidents to determine root causes and prevent future occurrences
  • Perform other tasks assigned by Line Manager

Requirements:

  • Minimum of 3-5 years of experience in Security Operations and Threat hunting
  • Bachelor's degree in computer science, information technology, cyber security, or a related field
  • Proficiency in security tools (e.g., SIEM, IDS/IPS, firewalls)
  • Knowledge of networking protocols and architecture
  • Familiarity with operating systems (Windows, Linux) and cloud environments
  • Strong analytical and problem-solving abilities to assess risks and respond effectively to incidents
  • Excellent analytical and problem-solving skills
  • Strong communication skills to effectively convey technical information to non-technical stakeholders. [French and English]
  • Ability to work independently and as part of a team in a fast-paced environment
  • A keen eye for detail to detect anomalies in data and logs
  • Knowledge of legal, regulatory and privacy requirements, such as Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data Security Standards and GDPR

Nice to have:

Relevant certifications such as Microsoft Certified Security Operations Analyst Associate, Blue Team Level 1 (BTL1), CompTIA CySA+, or Certified SOC Analyst (CSA), ECIH or equivalent would be beneficial.

Additional Information:

Job Posted:
January 31, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Operations Specialist

Third Party Cyber Security Assessor

HSBC's Global IT Organisation ranks among the largest technology functions world...
Location
Location
Poland
Salary
Salary:
Not provided
https://www.hsbc.com Logo
HSBC
Expiration Date
February 24, 2026
Flip Icon
Requirements
Requirements
  • 2+ years of experience in Cyber technical or specialist roles or similar experience
  • Strong knowledge and experience of IT systems and infrastructure and data security
  • Good understanding of service management principles
  • Experience in Third Party Security Assessment Process, control testing or audit disciplines
  • Relevant Cybersecurity certifications or knowledge is a plus
  • Genuine enthusiasm for cyber security and willing to share knowledge and experience technology resources, articles, and other inspiration with others
  • Strong communication skills in business English and German – both in verbal and written form
  • Experience in managing and influencing stakeholders from diverse backgrounds and cultures
Job Responsibility
Job Responsibility
  • Complete cyber control assurance, security and risk assessments for third party engagements
  • Deliver all aspects of TPSA Service and Operation, ensuring efficient delivery and continuous improvement
  • Collaborate with HSBC Business and third-party stakeholders, TPSA region leads and TPSA Team members to meet defined SLAs
  • Ensure security assessments comply with relevant regulations, standards and internal controls
  • Communicate requirements and manage stakeholders effectively to deliver cyber outcomes
What we offer
What we offer
  • Annual performance-based bonus
  • Additional bonuses for recognition awards
  • Multisport card
  • Private medical care
  • Life insurance
  • One-time reimbursement of home office set-up (up to 800 PLN)
  • Corporate parties & events
  • CSR initiatives
  • Nursery discounts
  • Financial support with trainings and education
  • Fulltime
!
Read More
Arrow Right

Information Assurance Specialist

The Information Assurance/Security Engineer will provide security engineering an...
Location
Location
United States , Bethesda
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance with CI Polygraph
  • Bachelor’s degree in Network Engineering, Computer Science or related technical field plus 5-7 years of Cyber Security/Operations support
  • DoD 8140 IAT Level II Certification (CCNA-Security, CySA+, CND, Security+)
  • Documenting network schemas and cyber operation tool solutions
  • Knowledgeable regarding compliance with: ICD 503, FISMA, OMB, NIST, and DoD (8150.01 March 12, 2014) [Risk Management Framework and Cyber Network Defense…], and other mandated security regulations and standards
  • Knowledge and experience with managing and monitoring compliance with Privileged User Access (PUA), Data Transfer Access (DTA), and Removable Media Custodian (RMC) privileges, forms, and signatures
  • Support to vulnerability management, patching, information assurance and/or ATO process for Classified DoD or IC environments
  • Demonstrated documentation writing for security plans, tests, and reports
  • Must demonstrate strong teamwork, communication (both verbal and written), and presentation skills
  • Must demonstrate strong initiative to accept new technical challenges in complex security engineering assignments
Job Responsibility
Job Responsibility
  • Provide security engineering and information assurance support to the Government’s Assessment and Authorization (A&A) process to maintain Authority to Operate (ATO) and Authority to Connect (ATC) for mission applications and services
  • Designs, develops, monitors and documents security controls, security testing, security reporting, and plan of actions and milestones (POA&Ms) throughout systems and application lifecycles in support of mission systems
  • Provides security engineering design inputs, security design reviews, and security best practices as part of technical and change requests
  • Configures and validates secure systems, physical controls, and tests security products and systems to detect security weaknesses
  • Maintains XACTA security records for supported systems
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right

Senior Information Technology Specialist

Barbaricum is currently seeking a proficient Senior Information Technology Speci...
Location
Location
United States , Fort Belvoir
Salary
Salary:
Not provided
barbaricum.com Logo
Barbaricum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active DoD Secret Clearance
  • Bachelor’s degree and 10 years of relevant experience
Job Responsibility
Job Responsibility
  • Support the resolution of IT and system problems, to recommend solutions to higher level IT specialists and management, and to meet assignments as estimated and scheduled
  • Provides technical advice to IT and other professionals and the client
  • Support backup and disaster recovery, cyber security, monitoring, auditing, and compliance, troubleshooting and resolving end user support issues, and delivery of technology solutions
  • Provide verification of operational status of government computer systems and related third party interfaces and comply with Federal regulations, policies, codes, and security and safety standards
  • Experience supporting and managing cloud instance by utilizing elastic cloud computing for resourcing needs
Read More
Arrow Right
New

Vp, Information Security

About BlackRock: BlackRock’s purpose is to help more and more people experience ...
Location
Location
China , Shanghai
Salary
Salary:
Not provided
blackrock.com Logo
BlackRock Investments
Expiration Date
April 30, 2026
Flip Icon
Requirements
Requirements
  • At least 10 years of full-time work experience in information security management and/or related functions (Technology Risk Management, Technology Infrastructure Management) with information security management qualifications such as CISSP, SANs, CRISC, CISM etc.
  • Knowledge of enterprise technology platforms, from the desktop through to back end infrastructure would be considered an advantage
  • Exceptional interpersonal skills with ability to communicate with senior leaders and technology teams alike.
  • Ability to work independently and adapt to changing business priorities
  • Detail oriented individual, with a keen eye towards details
  • Experience and good knowledge of Identity Governance and Identity Lifecycle management
  • Proficiencies in one or more of the following technical IT security domains or equivalent: Network Security, Cloud Governance, Cyber Operations, Forensics, Access and Identity Management Governance etc.
  • Knowledge of domestic China cyber and technological regulations, or experience in dealing with regulators and clients in relation to cybersecurity focused topics during regulatory examinations or client due diligence sessions will be a plus
  • Strong proficiencies in both English and Mandarin (Verbal/Written)
  • Hands-on team leadership and management experience, ideally coupled with suitable management qualifications
Job Responsibility
Job Responsibility
  • Be responsible for providing information security leadership in the BEM, driving security activities and projects, as well as developing and optimizing the FMC’s capabilities across core disciplines of Information security
  • Information Security Governance and Reporting
  • Cyber Security Operations Management, in partnership with other BlackRock Entities in China
  • Security Risk Assessments and Vulnerability Management
  • Application Security
  • Maintain and evolve security policies and standards for the BlackRock China, in conjunction with evolving regulatory and operational security requirements
  • Provide security advisory to Business and IT partners in the development of security controls and solutions to manage cyber risks for the firm
  • Identity and Access Management, including privilege access management
  • Compliance to regulatory security requirements
  • Take on the pivotal role in overseeing and governing the AIM program spanning the realms of identity & access governance, entitlements recertification's and associated identity & access lifecycle management procedures. The individual will also be required to guide the AIM Program Lead and provide support in administering the access rights to China employees for required access to core systems where the need arises.
What we offer
What we offer
  • Strong retirement plan
  • Tuition reimbursement
  • Comprehensive healthcare
  • Support for working parents
  • Flexible Time Off (FTO)
  • Fulltime
Read More
Arrow Right

Group Cyber Security Specialist

The Group Cyber Security Specialist plays a critical hands-on role in delivering...
Location
Location
United Kingdom , Manchester
Salary
Salary:
Not provided
arrowglobal.net Logo
Arrow Global Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience in a technical cyber security, SOC, or security engineering role within complex environments
  • Strong hands-on experience with core security tooling, including EDR, SIEM, Secure Email, Secure Web, CASB, and vulnerability management platforms
  • Solid understanding of incident response lifecycle, threat investigation techniques, and operational security processes
  • Proven experience supporting multi-business-unit, federated, or decentralised IT environments
  • Working knowledge of cloud security principles across Azure and AWS environments
  • Ability to manage multiple priorities across BAU operations, security incidents, and project delivery
  • Strong analytical capability with excellent written and verbal communication and documentation skills
  • Experience driving security remediation and working effectively with IT teams and managed service providers
  • Familiarity with security frameworks and regulatory expectations (e.g. ISO 27001, NIST CSF, FCA or equivalent)
  • Confident stakeholder engagement skills, including the ability to influence, present risk, and communicate effectively with technical and non-technical audiences across geographies
Job Responsibility
Job Responsibility
  • Act as the Group cyber security SME for projects across multiple business units, providing early engagement, risk identification, and secure-by-design guidance
  • Review and challenge solution designs to ensure security controls are embedded from the outset and aligned with Group policies and architectural standards
  • Validate that new systems, applications, integrations, and third-party suppliers meet Group security and assurance requirements
  • Partner with the Group Cyber Architect to ensure implementations align with strategic roadmaps, security patterns, and target architectures
  • Monitor, triage, and respond to SOC/MSSP alerts, supporting threat analysis, incident investigations, and remediation planning
  • Analyse operational security events to identify recurring issues and proactively drive control improvements and SOC maturity
  • Own and enhance security runbooks, detection rules, and BAU processes to strengthen response capability and reduce false positives
  • Manage the end-to-end vulnerability management lifecycle, including scanning, prioritisation, reporting, and stakeholder engagement
  • Identify systemic vulnerability trends, provide technical remediation guidance, and drive SLA-based remediation with BU IT teams
  • Coordinate and manage third-party penetration testing activities, from scoping through to remediation and closure of findings
  • Fulltime
Read More
Arrow Right

Cyber Security Devsecops Specialist

The DevSecOps Specialist will be crucial in integrating security practices withi...
Location
Location
Congo, the Democratic Republic of the , Kinshasa
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 3-5 years of experience in Cyber Security
  • Bachelor's degree in computer science, information technology, cyber security, or a related field
  • Security-related certifications such as DevOps Institute's DevSecOps Foundation
  • Certified Kubernetes Security Specialist (CKS)
  • AWS, Azure, or GCP Certified DevOps Engineer
  • Strong knowledge of cyber security principles and best practices
  • Exposure to DevSecOps Standards and Frameworks such as NIST Cybersecurity Framework (CSF), ISO/IEC 27001, CIS Controls, and OWASP Top Ten
  • Well-versed in DevOps and DevSecOps frameworks, such as the DevOps Institute's DevSecOps Foundation, and thoroughly understand Continuous Integration and Continuous Delivery (CI/CD) best practices
  • Strong collaboration and communication skills, with the ability to work effectively across development, operations, and security teams
  • Problem-solving and critical thinking are essential, including analytical skills to identify security vulnerabilities and threats and strategic thinking to implement effective security solutions
Job Responsibility
Job Responsibility
  • Identify security risks through threat modelling, develop robust mitigation strategies, and implement advanced security measures throughout the software development lifecycle
  • Application threat modelling, assessing code and applications to ensure they are vulnerability-free before being shipped to production environments
  • Maintaining the security of application or APIs throughout the product lifecycle
  • Monitoring and securing the CI/CD pipeline, conducting comprehensive security audits, responding to and investigating security incidents, and establishing/enforcing stringent security protocols
  • Provide security expertise to development and operations teams, fostering a culture of security awareness and adherence to best practices
  • Staying current on the latest cyber threats and security technologies
Read More
Arrow Right

Secure by Design SME IT/ Digital

In this role you will provide Security Architectural support to projects that ha...
Location
Location
United Kingdom , Newbury
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Educated to degree level and/or relevant technical experience (preferably 7+ years) with a proven track record of delivering complex cross-domain IT/IS solutions architectures/designs in the telecommunications industry
  • Minimum of 5+ years of experience in a Security role
  • Knowledge of common information technology management / compliance frameworks such as ISO/IEC 27001, SOC 2, SOX, ITIL, COBIT, and NIST
  • Knowledge of legal, regulatory and privacy requirements, such as Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data Security Standard
  • An ability to think strategically and drive change
  • A deep understanding of Security risks and mitigating solutions
  • A diverse security background with knowledge in several areas including DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies
  • Knowledge in Windows, UNIX and Linux operating systems
  • Practices and methods of enterprise architecture and security architecture
  • IT security architecture development and definition
Job Responsibility
Job Responsibility
  • Provide Security Architectural support to projects that have engaged with Secure by Design, providing guidance to projects and BAU activities
  • Ensure Security is embedded in IT and Digital Systems including planning, designing, and building phase
  • Define technical security controls for efficient implementation
  • Ensure compliance with Legal and Regulatory requirements
  • Fulfil Key Customers obligations and Stakeholders expectation
  • Ensure security architecture activity is timely delivered to support other technology and business functions
  • Contribute to, define and assess complex design proposal
  • Develop and document end-to-end architecture that will protect the IT and Digital Systems from the significant and persistent cyber security threat
  • Ensure system architecture is developed adequately to protect the availability, confidentiality and integrity of IT Systems
  • Develop architecture in conjunction with Group and European region technical architects and influence them to support the UK position
What we offer
What we offer
  • Great pay
  • Bonuses
  • Up to 28 days off plus bank holidays
  • Paid time for charity work
  • Discounts
  • Vouchers
  • A pension plan
  • Fulltime
Read More
Arrow Right

Cyber Security IAM & PKI Specialist

At Bombardier, we design, build and maintain the world’s peak-performing aircraf...
Location
Location
Canada , Dorval; Mississauga
Salary
Salary:
Not provided
bombardier.com Logo
Bombardier
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • You hold a bachelor’s degree in cyber security, information security, computer science, or relevant field of study.
  • You have over 6 years of experience with identity lifecycle management (Joiner/Mover/Leaver), access governance, and least‑privilege access models.
  • You have a strong knowledge of authentication and authorization protocols (SAML, OAuth 2.0, OpenID Connect, LDAP, Kerberos).
  • You have hands‑on experience with enterprise IAM (Identity & Access Management) platforms (e.g., Azure Entra ID, SailPoint, Okta, CyberArk, MFA).
  • You have proven experience designing, operating, and evolving enterprise PKI (Public Key Infrastructure) environments (internal and public CAs).
  • You have a strong understanding of certificate lifecycle management, TLS/SSL, and cryptographic trust models.
  • You have experience securing non‑human identities such as applications, services, workloads, and APIs.
  • You have experience with human identities in medium to high trust environments such as formal digital signature of documents and software.
  • You are familiar with key management practices, HSMs (Hardware Security Modules), and cloud‑native key services.
  • You have experience integrating IAM (Identity & Access Management) and PKI signals into SIEM/XDR platforms.
Job Responsibility
Job Responsibility
  • Identity Architect - Act as the SME (Subject Matter Expert) for the identity technology stack, plan and prioritize the technology roadmap, track deployments.
  • PKI (Public Key Infrastructure) Specialist - Own, develop and drive the current state and future state plan for PKI.
  • Identity Threat Engineer/Specialist - Collaborate with the SOC (Security Operations Centre) to mature and enhance telemetry, processes and response to cyber threats.
What we offer
What we offer
  • Insurance plans (Dental, medical, life insurance, disability, and more)
  • Competitive base salary
  • Retirement savings plan
  • Employee Assistance Program
  • Tele Health Program
  • Fulltime
Read More
Arrow Right