Cyber Security Operations Specialist

Posting Country:  Congo, the Democratic Republic of the
Date Posted:  30 Jan 2026
Full Time / Part Time: 
Contract Type:  Permanent

At Vodacom, we’re working hard to build a better future. A more connected, inclusive and sustainable world. As a dynamic global community, it's our human spirit, together with technology, that empowers us to achieve this. 

We challenge and innovate in order to connect people, businesses, and communities across the world. Delighting our customers and earning their loyalty drive us, and we experiment, learn fast and get it done, together.

With us, you can be truly be yourself and belong, share inspiration, embrace new opportunities, thrive, and make a real difference. 
 

Role purpose

 A Cyber Security Operations Specialist is a professional responsible for protecting an organization's information systems and data from cyber threats. This role typically involves monitoring networks for security breaches, investigating incidents, implementing security measures, and responding to security incidents

Key accountabilities

  • A Cyber Security Operations Specialist is a professional responsible for protecting an organization's information systems and data from cyber threats. This role typically involves monitoring networks for security breaches, investigating incidents, implementing security measures, and responding to security incidents
  • Continuously monitor security systems and networks for unusual activity or potential threats.
  • Analyse security alerts and logs to identify and respond to incidents.
  • Investigate security incidents and breaches to determine their cause and impact.
  • Coordinate the response to security incidents, including containment, eradication, and recovery.
  • Maintain a concise, audit-ready Incident Response Plan that defines severity matrix, escalation paths, decision authority, evidence handling, and communications (internal, executive, legal, regulator).
  • Own a version-controlled repository of actionable playbooks (phishing, business email compromise, ransomware, webshell, data exfiltration, insider risk, credential theft, cloud token abuse)
  • Ensure that logs from servers, cloud apps, domain controllers, proxies, domain controllers, email and smtp gateways, PUAM, firewalls are collected, easy to read, time-synchronized, and stored securely.
  • Build and maintain smart alert rules that spot real attacks (based on MITRE ATT&CK) and reduce noisy false alarms.
  • Create dashboards and weekly reports that show what we’re seeing and how fast we respond.
  • Stay updated on the latest cyber threats, vulnerabilities, and attack vectors.
  • Utilize threat intelligence and threat hunting techniques to enhance the organization’s security posture.
  • Work closely with Technology teams, management, and external partners to ensure a cohesive security strategy.
  • Participate in security audits and assessments.
  • Conduct forensic analysis of security incidents to determine root causes and prevent future occurrences.
  • Perform other tasks assigned by Line Manager.    

MINIMUM EXPERIENCE & ESSENTIAL KNOWLEDGE

  • Minimum of 3-5 years of experience in Security Operations and Threat hunting.
  • Bachelor's degree in computer science, information technology, cyber security, or a related field.
  • Relevant certifications such as Microsoft Certified Security Operations Analyst Associate, Blue Team Level 1 (BTL1), CompTIA CySA+, or Certified SOC Analyst (CSA), ECIH or equivalent would be beneficial.
  • Proficiency in security tools (e.g., SIEM, IDS/IPS, firewalls).
  • Knowledge of networking protocols and architecture.
  • Familiarity with operating systems (Windows, Linux) and cloud environments
  • Strong analytical and problem-solving abilities to assess risks and respond effectively to incidents.
  • Excellent analytical and problem-solving skills.
  • Strong communication skills to effectively convey technical information to non-technical stakeholders. [French and English]
  • Ability to work independently and as part of a team in a fast-paced environment.
  • This position may require occasional after-hours work for incident response.
  • A keen eye for detail to detect anomalies in data and logs
  • Knowledge of legal, regulatory and privacy requirements, such as Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data Security Standards and GDPR

Commitment from Vodacom

Vodacom is committed to attracting, developing and retaining the very best people by offering a flexible, motivating and inclusive workplace in which talent is truly recognized, developed and rewarded. We believe that diversity plays an important role in the success of our business and we are committed to creating an inclusive work environment which respects, values, celebrates and makes the most of people’s individual differences - we are not only multinational but multicultural too. At Vodacom you will have access to our excellent flexible benefits programme that you would expect from any global company.