Supervisor – Vulnerability Management Supervisor – Security Infrastructure Tools Officer – Security Infrastructure Tools Officer – Policy & IT Risk Management – 3 Positions Officer – Vulnerability Management Officer – Cyber Security Surveillance

Job Summary:
The job holder is responsible for the management of technical vulnerabilities and implementation of security controls in the organization’s Business Systems. The role includes carrying out vulnerability assessments, penetration testing, identifying security gaps, ensuring that the network, databases, business systems and services comply with the approved policy, best practice, security requirements and set minimum baseline standards. 
Key Responsibilities:

Review KRA Business systems for technical vulnerabilities and ensure appropriate safeguards are in to provide mitigations.
Coordinate vulnerability assessments, penetration tests, security reviews on business systems, services and databases using various tools and personal knowledge.
Ensure compliance with the approved policy, best practice, security requirements and set minimum baseline standards for the business systems.
Coordinate development of system security requirements for the various systems at acquisition/development and carry out security tests on the systems before deployments
Identify, recommend, and configure suitable tools to enhance Information systems security.
Monitor systems and applications for security issues, vulnerabilities and recommend remediation including patching and upgrades, rules updates
Attend Change Advisory Committee meetings for enhancement of business operations.
Ensure compliance to ISO (9001/2015 and 27001/2013) and ISMS and data security requirements.
Day-to-day information security operations, supervision, reporting, management of performance and development of staff in the function

Academic Qualifications
 Bachelor’s degree in Computer Science or IT related field.
Professional Qualifications 
Must have at least one of the following certifications or training in CEH/CHFI/ECIH/CISSP.
Relevant Work Experience  
At least three (3) years related IT security work experience in a large or busy organization.
Technical Skills Required:

Experience in Vulnerability Assessments and Penetration testing.
Experience in Digital Forensics, cyber security threat Analysis or incident management
Proficiency in implementation and use of security testing tools/solutions.
Broad-based IT experience with technical knowledge of Network, Virtualization, Hardware, Storage, Operating systems, and Applications.
Good command of SQL language.
Good command of Unix/Linux/windows
Knowledge in Information security risk management
Experience in Information Security Management System
Experience in Project Management

Key Competencies:

Excellent stakeholder engagement skills
Analytical mind with problem-solving aptitude
Excellent listening, communication and presentation skills
Reliable and thorough with a deep commitment to accuracy
Self-motivated and able to work independently
A team player
Ability to prioritize competing work commitments and deliver on time

go to method of application »

Use the link(s) below to apply on company website.  

Apply via :