{"id":6122,"date":"2019-11-20T10:07:25","date_gmt":"2019-11-20T10:07:25","guid":{"rendered":"http:\/\/consulting.stylemixthemes.com\/demo\/?page_id=6122"},"modified":"2024-12-12T14:18:04","modified_gmt":"2024-12-12T14:18:04","slug":"service-layout-4","status":"publish","type":"page","link":"https:\/\/tlfirst.com\/jobs\/service-layout-4\/","title":{"rendered":"Cybersecurity Analyst"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6122\" class=\"elementor elementor-6122\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fdd095 e-con-full e-flex e-con e-child\" data-id=\"5fdd095\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-004313f elementor-widget elementor-widget-heading\" data-id=\"004313f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Cybersecurity Analyst  <br>\n(Hybrid) Abuja & Lagos<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de6dcad e-flex e-con-boxed e-con e-parent\" data-id=\"de6dcad\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09e65fa elementor-widget elementor-widget-spacer\" data-id=\"09e65fa\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fb3b21 e-flex e-con-boxed e-con e-child\" data-id=\"1fb3b21\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b865415 e-con-full e-flex e-con e-child\" data-id=\"b865415\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a13b07 elementor-widget elementor-widget-heading\" data-id=\"9a13b07\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Analyst   (Hybrid)<b<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f21fb7a e-con-full e-flex e-con e-child\" data-id=\"f21fb7a\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d27fa0 e-con-full e-flex e-con e-child\" data-id=\"6d27fa0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af9a286 elementor-widget elementor-widget-heading\" data-id=\"af9a286\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Job Description<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddab923 elementor-widget elementor-widget-text-editor\" data-id=\"ddab923\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>As a Cybersecurity Analyst, you will safeguard the organisation\u2019s IT systems from potential cyber threats by identifying vulnerabilities, monitoring security incidents, and implementing effective protection strategies.\u00a0<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-479f266 e-con-full e-flex e-con e-child\" data-id=\"479f266\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93768e1 elementor-widget elementor-widget-spacer\" data-id=\"93768e1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36690bc elementor-widget elementor-widget-heading\" data-id=\"36690bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Key Responsibilities<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d621df elementor-widget elementor-widget-text-editor\" data-id=\"5d621df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ol>\n<li>Conducting security assessments and penetration testing.<\/li>\n<li>Monitoring networks and systems for potential threats.<\/li>\n<li>Investigating security breaches and recommending mitigation strategies.<\/li>\n<li>Ensuring compliance with cybersecurity standards and policies.<\/li>\n<li>Researching and implementing the latest security tools and technologies.<\/li>\n<\/ol>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25028a9 e-con-full e-flex e-con e-child\" data-id=\"25028a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24e77e1 elementor-widget elementor-widget-heading\" data-id=\"24e77e1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Requirements<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05931e5 elementor-widget elementor-widget-text-editor\" data-id=\"05931e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ol>\n<li><strong>Education:<\/strong> Bachelor\u2019s degree in Cybersecurity, IT, or a related field. Certifications like CISSP or CEH are an advantage.<\/li>\n<li><strong>Experience:<\/strong> At least 3 years of proven experience in cybersecurity roles.<\/li>\n<li><strong>Skills:<\/strong> Expertise in security tools, network protocols, and incident response.<\/li>\n<li>Willingness to travel domestically as required.<\/li>\n<\/ol>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eefa799 e-con-full e-flex e-con e-child\" data-id=\"eefa799\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d4973e7 e-con-full e-flex e-con e-child\" data-id=\"d4973e7\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6ee720a e-con-full e-flex e-con e-child\" data-id=\"6ee720a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc1a0cc elementor-widget elementor-widget-text-editor\" data-id=\"dc1a0cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote>\n<p>To apply, complete the application form below and send with your CV via email to <a rel=\"noopener\">jobs@tlfirst.com<\/a>.<\/p>\n<\/blockquote>\n<p>Application closes on <strong>31st December, 2024<\/strong><\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67b57b5 e-con-full e-flex e-con e-child\" data-id=\"67b57b5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b92498f elementor-widget elementor-widget-button\" data-id=\"b92498f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper icon_align_  \">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLScjNaZFVt4Vbz-WK-rGBW9o8Lks8eaIYlGibxk14Jkra0Z5aw\/viewform?usp=header\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Apply<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Analyst (Hybrid) Abuja &#038; Lagos Cybersecurity Analyst (Hybrid)<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6122","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/pages\/6122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/comments?post=6122"}],"version-history":[{"count":20,"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/pages\/6122\/revisions"}],"predecessor-version":[{"id":8613,"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/pages\/6122\/revisions\/8613"}],"wp:attachment":[{"href":"https:\/\/tlfirst.com\/jobs\/wp-json\/wp\/v2\/media?parent=6122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}