Jumia Anniversary Teasing

IT Security Officer at Growth in Value Alliance (GVA) Partners Limited

Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities.

We are recruiting to fill the position below:

Job Title: IT Security Officer

Location: Lagos

Employment Type: Contract

Job Description

An exciting opportunity exists for a dynamic and IT security engineer to join a dynamic project team for a 6 months project.

The resource shall be responsible for the following:

  • Participate in the delivery cybersecurity through vulnerability and threat identification, incident detection and response, forensic investigations, Patch and Vulnerability Management. Engage with infrastructure and applications teams in mitigation and remediation efforts.
  • Engage with other IT units to establish and enforce security best practices, protection objectives and process improvements.
  • Review and make recommendations regarding on-premise, datacentre and cloud infrastructure, networking and security settings and posture.
  • Create and maintain key metrics that are indicative of security posture of the infrastructure.
  • Keep abreast of threat intelligence feeds to stay abreast of industry reports and emerging threat that may affect

Functions:

  • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
  • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
  • Lead the implementation of Information Security projects
  • Drive internal and external vulnerability assessment, penetration tests engagements and manage results to remediation.
  • Respond to escalated security events and drive security incident response processes to ensure timely resolution with minimal disruption.
  • Design, document, and deploy secure infrastructure solutions to enhance and evolve the security posture of the business to ensure integrity, availability and confidentiality of all critical enterprise data.
  • Provide expertise on security tools, including but not limited to firewalls, Web Application firewalls, IDS/IDP, anti-malware software
  • Liaise with stakeholders in respect of operational implementation of security policies and best practices
  • Prevent data loss and service interruptions by researching new technologies that will effectively protect the enterprise network.

Supervisory / Managerial Responsibilities:

  • Ensure conformance to Cybersecurity Blueprint / Roadmap
  • Provide inputs to company strategic plan on all initiatives to ensure that Security gaps / vulnerabilities are identified & closed
  • Establish and ensure credibility through strong relationships, value-add to operations and professionalism

Experience:

  • Minimum of 5 years’ experience in an area of Security specialisation; with experience working with others
  • Experience working in a Large organization and preferably in the Telecommunications industry
  • Strong background as an Engineer/Architect in application security infrastructure and various network technologies to include devices such as firewalls, VPN, intrusion / extrusion detection, vulnerability & risk assessment tools, encryption technologies, virus / worm / malware prevention, E-business and web application technologies, Data Loss Prevention, whole disk & device encryption solutions, two-factor authentication, common Windows (desktop & server) platforms,
  • Experience with Microsoft, Solaris, Unix, Oracle and MSSQL
  • Experience working in telecommunications industry
  • Managing networkand / or networks ecurity
  • Knowledge should be current with information security best practices and global trends
  • Knowledge of security best practices such as; defense in-depth, least privileges, need-to-know, separation of duties, access controls, encryption
  • User account identity, authorization and authentication management.
  • Security incident and event management
  • Experience in researching new or emerging technologies and processes that may be incorporated as solutions to reoccurring security concern

Training:

  • PenetrationTesting
  • Vulnerability lifecycle management
  • Advanced Security Incidence Reponse
  • Systems Auditing, Database Security, Firewall Design, Intrusion detection system administration Implementation
  • Security enforcement on systems level, security audit and vulnerability management
  • Telecommunications, Network, wireless & Internet Security

Application Closing Date

25th May, 2021.


Jumia Anniversary Teasing
>