VALIDITY PERIOD: 29/01/2021 – 12/02/2021


The IT Security Officer role is responsible for protecting FINCA Uganda information assets such as IT infrastructure, edge devices, networks, and data. More granularity against internal and external attacks. S/he will be responsible for preventing unauthorized access and attacks on IT assets.

Information Technology security officer will help to protect FINCA Uganda information assets by employing a range of technologies and processes to prevent, detect and manage cyber threats. The IT security officer will further protect IT infrastructure (including networks, hardware and software) from a range of criminal activity. S/He will monitor networks and systems, detect security threats (‘events’), analyze and report on threats, intrusion attempt, either resolving them or escalating them, depending on the severity.

Key duties and responsibilities:

  1. Analyzing and assessing vulnerabilities in the infrastructure (software, hardware, and networks), investigating available tools and countermeasures to remedy the detected vulnerabilities.
  2. Performing regular audits to ensure security practices are compliant.
  3. Deploying endpoint detection and prevention tools to thwart malicious hacks.
  4. Setting up patch management systems to update applications automatically.
  5. Implementing comprehensive vulnerability management systems across all assets on-premises and in the cloud.
  6. Designing new security systems or upgrading existing ones.
  7. Identifying IT security weaknesses and implementing solutions.
  8. Working hand in hand with the IS security personnel in planning for disaster recovery in the event of any security breaches.
  9. Monitoring for attacks, intrusions and unusual, unauthorized or illegal activity.
  10. Testing and evaluate security products.
  11. Using advanced analytic tools to determine emerging threat patterns and vulnerabilities.
  12. Engaging in ‘ethical hacking’, for example, simulating security breaches.
  13. Identifying potential weaknesses and implement measures, such as firewalls and encryption.
  14.  Monitoring identity and access management, including monitoring for abuse of permissions by authorized system users.
  15. Liaising with stakeholders in relation to IT security issues and provide future recommendations.
  16. Generating reports for both technical and non-technical staff and stakeholders.
  17. Maintaining an IT risk register and assist with internal and external audits relating to IT security.
  18. Monitoring and responding to ‘phishing’ emails and ‘pharming’ activity.
  19. Assisting with the creation, maintenance and delivery of cyber security awareness training for colleagues.
  20. Ensuring regular DR tests are done and results properly documented.
  21. Driving own Performance Development, collating relevant documentation, preparing for and arranging reviews and 1:1’s.


To perform the job successfully, an individual should demonstrate the following competencies:

  1. Strong IT skills and knowledge including hardware, software and networks.
  2. Meticulous attention to detail.
  3. Ability to use logic and reasoning to identify the strengths and weaknesses of IT systems.
  4. A forensic approach to challenges.
  5. A deep understanding of how hackers work and ability to keep up with the fast pace of change in the criminal cyber-underworld.
  6. Ability to seek out vulnerabilities in IT infrastructure.

 Qualifications, Skills and Experience 

  1. Bachelor’s Degree in Information Technology/Computer Science or related field and those with a professional Certification (SANS, CISSP, CISA, CISM, CCNA/P, Security+) is an added advantage.
  2. 3 years of working experience in an IT environment.
  3. Proven IT Disaster Recovery experience
  4. Proven experience supporting IT security and implementing IT security technologies
  5. Technical writing experience

All interested and qualified candidates are required to apply be email to or fill in the application form