Cybersecurity Analyst II at TFG – Apply Now!

Full-time

TFG (The Foschini Group)

Take Your Cybersecurity Career to the Next Level with TFG

TFG is seeking a dynamic and experienced Cybersecurity Analyst II to join our high-performing Information Technology team. Based in the Western Cape, this role offers an exciting opportunity to work on cutting-edge security technologies in a purpose-led, people-focused environment.

As a Cybersecurity Analyst II, you will be pivotal in safeguarding TFG’s digital infrastructure by proactively monitoring, identifying, and mitigating threats, as well as participating in the continuous development of our security operations.


Key Responsibilities:

🔍 Security Monitoring & Threat Detection

  • Continuously monitor alerts and events from Microsoft Sentinel, Defender for Endpoint, and Defender for Cloud.

  • Develop and fine-tune analytical rules, alerts, and queries to enhance detection accuracy.

  • Leverage UEBA (User and Entity Behaviour Analytics) to identify anomalies.

  • Build and customize Sentinel and Defender playbooks for automated incident response.

  • Engage in proactive threat hunting using Indicators of Compromise (IOCs) and threat intel.

  • Maintain detailed risk profiles for systems, users, and applications.

🛡 Incident Response

  • Analyze and respond to security incidents across their entire lifecycle: detection, investigation, containment, eradication, and recovery.

  • Document incidents and improve existing response playbooks.

  • Handle stakeholder engagement, provide timely feedback, and manage end-to-end incident communication.

  • Automate repetitive tasks to enhance efficiency.

🧪 Testing, Exercises, and Validation

  • Participate in Blue, Red, and Purple team activities.

  • Join Cyber Crisis Simulations and Table-Top Exercises to assess readiness and response.

🧠 Business Context & Risk Management

  • Understand TFG’s value chain and critical business processes.

  • Conduct risk assessments and align business architecture with cybersecurity priorities.

🖥 Endpoint Detection and Response (EDR)

  • Oversee endpoint compliance, run regular health checks, and ensure secure configurations.

  • Integrate EDR data with SIEM, XDR, and threat intelligence platforms.

🚀 Technology Leadership & Optimization

  • Drive continuous improvement and platform optimization.

  • Contribute to R&D efforts and understand SaaS-based budgeting and licensing.

💬 Communication & Reporting

  • Produce high-quality reports and dashboards.

  • Present insights to senior leadership and work across multi-cultural teams.


Qualifications & Experience:

  • 4–6 years in a SOC or cybersecurity-related role.

  • Proficiency with Microsoft Defender XDR, Azure Sentinel, JAMF, Symantec DLP, FortiAnalyzer, CrowdStrike, and more.

  • Solid understanding of Windows, VMware, Cisco, Linux/Unix, and common cybersecurity tools (WAF, IDS, MFA, IAM, etc.).

  • Strong background in cloud security (SaaS, PaaS, IaaS) and mobile architecture.


Key Skills & Behaviours:

  • Excellent verbal and written communication skills.

  • Collaborative, resilient, and adaptable under pressure.

  • Technically astute with strong problem-solving capabilities.

  • Passionate about learning and development.

  • Action-oriented with a strong sense of accountability.


Why Join TFG?

At TFG, we believe that our people are our greatest asset. With a diverse portfolio of 34 lifestyle and apparel brands, we offer unmatched opportunities for growth, innovation, and impact. Join a company that’s shaping the future of omnichannel retail while supporting your professional journey.


Find similar jobs at:
👉 https://careerjunctionza.co.za/jobs/


✅ CV Tips for Cybersecurity Roles:

  1. Highlight Certifications: Mention credentials like CISSP, CEH, Microsoft Security Certifications, or CompTIA Security+.

  2. Showcase Tools & Technologies: List specific platforms like Microsoft Sentinel, Defender, or CrowdStrike with examples of real-world use.

  3. Quantify Achievements: e.g., “Reduced false positives by 30% through optimized detection rules.”

  4. Demonstrate Incident Response Experience: Include examples of incidents handled and response outcomes.

  5. Use Action Verbs: Words like Monitored, Mitigated, Automated, Presented, Collaborated improve readability and impact.

  6. Tailor Your Summary: Clearly position yourself as a cybersecurity professional focused on threat detection, response, and business risk mitigation.


🌐 Company Website: https://www.tfglimited.co.za

To apply for this job please visit fa-expc-saasfaprod1.fa.ocs.oraclecloud.com.