JOB ROLE/ PURPOSE:
Implement and maintain ICT security controls to safeguard the Authority’s Information Technology systems and infrastructure against security risks
PRINCIPLE ACCOUNTABILITIES
1. Participate in the design & building of the URA’s information security architecture in support of the URA’s mission
a) Engage key stakeholders to elicit security requirements adequate to provide assurance of security
You may also like:
- WFP recruitment ( January 2025) : Explore open jobs/Vacancies at World Food Programme
- Africa CDC recruitment ( January 2025) : Explore 15 Open Jobs/Online application
- Nestlé Recruitment ( January 2025) : Explore open Jobs/Application
- UN recruitment ( January 2025) : 596 Open Jobs/Online application
- Canada Embassy recruitment ( January 2025) : 26 Open Jobs/Online Application
b) Evaluate the efficacy of existing security controls & provide expert advisory services in this regard
c) Carry out threat modelling and security reviews for Software Development projects
d) Assist in developing information security policies, standards & guidelines
e) Provide input into the development of URA’s IT Security Strategy
2. Support & maintain Information security solutions to ensure their continued efficacy
a) Test, deploy, maintain, review and administer the infrastructure hardware and software that are required to effectively manage network defenses.
b) Install, config, troubleshoot and maintain server security configurations to ensure their confidentiality, integrity, and availability.
c) Work with other teams to ensure good security practice is followed during deployments
3. Identify, analyse and mitigate threats to URA’s IT Infrastructure
a) Carry out vulnerability assessments & penetration testing to establish the effectiveness of internal controls
b) Use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
c) Analyze digital evidence and investigate security incidents to derive useful information in support of system/network vulnerability mitigation and investigations.
d) Keep abreast with emerging industry security threats that could potentially impact URA’s IT Infrastructure & work towards strengthening URA’s security posture
4. Facilitate information security awareness programs
a) Provide input into the security awareness content
b) Conduct security awareness training using various channels
c) Conduct phishing assessments and other testing to ascertain level of awareness among different categories of staff
PERSON SPECIFICATIONS
Essential Requirements
a) An honors Bachelor’s Degree in IT/Computer Science or related technical science degree from a recognised University.
b) At least 2 years’ experience in security, network administration, software development role gained in a complex IT environment
Desirable Requirements
a) Information Security Certification Such as; CISSP, CSSLP, CEH, Security+, Any GIAC, OSCP, CCSA, CCNA or other Vendor Specific InfoSec Certification
b) Certification in ITIL, LPI
c) Experience in managing Web or Network Firewalls
d) Experience in threat Modelling & Secure SDLC
e) Experience in maintenance of Network Infrastructure
f) Experience in penetration testing & vulnerability assessments of network, web or mobile platforms
g) Experience in digital forensics & incident response
h) Experience in installing & Securing Server Infrastructure
Knowledge
- Knowledge of cyber threat actor categories
- Knowledge of system administration, network, and operating system hardening techniques.
- Knowledge of cyber-attack stages
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
- Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
- Knowledge of OSI model and underlying network protocols
- Knowledge of penetration testing principles, tools, and techniques.
- Knowledge of Application Security Risks
- Knowledge of prevalent cyber threats, tactics, techniques and procedures
- Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
- Knowledge of how traffic flows across the network
- Knowledge of basic system, network, and OS hardening techniques.
- Knowledge of network tools (e.g., ping, traceroute, nslookup)
- Knowledge of operating system command-line tools.
- Knowledge of Security Service Management Frameworks & methodologies ( ISO 27001, ITIL4, DevSecOps )
- Knowledge of concepts and practices of processing digital forensic data.
- Knowledge of installation, integration, and optimization of system components.
- Knowledge of Interpreted & compiled computer languages
SPECIAL SKILLS AND ATTRIBUTES
a) Skill in applying security controls.
b) Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
c) Skill in performing packet-level analysis.
d) Skill in technical writing.
e) Skill in writing about facts and ideas in a clear, convincing, and organized manner.
f) Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.
g) Ability to answer questions in a clear and concise manner.
h) Ability to ask clarifying questions.
i) Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
j) Ability to communicate effectively when writing.
k) Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
l) Ability to operate common network tools (e.g., ping, traceroute, nslookup)
m) Ability to execute OS command line (e.g., ipconfig, netstat, dir, powershell)