Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 12, 2020
    Deadline: Feb 19, 2020
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business an...
    Read more about this company

     

    Senior Specialist, Security Monitoring

    Job Description

    • In this role, you will contribute towards overall reduction of information security (IS) - related incidents by coordinating internal and third - party resources for continuous monitoring and identification of threats to end - user applications, networks, systems, and other access routes to other assets (including prevention / detection, email / spam filtering, web filtering).

    Key Roles & Responsibilities

    • Ensure intelligent reporting and fine-tuning of file integrity monitor, Network Access Control (NAC), firewall and Security Operations Centre (SOC) rules.
    • Create scenario-based risk intelligent rules.
    • Ensure that sufficient trails are maintained, retained and retrievable for forensic analysis and investigation.
    • Implement logging policies across different layers of systems and across enterprise platforms.
    • Create intelligent alerting based on risk scenarios.
    • Implement and manage log retention policy across multiple platform and systems.
    • Review logs / alerts (closed-opened) and reports of all in-place security and infrastructural devices.
    • Direct scheduling and ad-hoc security and compliance reporting.
    • Monitor team members for alerts tracking.
    • Network with other internal organizations to ensure coordination of compliance efforts.
    • Participate in the creation of enterprise security policies, standards, and baselines.
    • Provide support for the monitoring team as well as security incident and events management solution logging requirements and integration.
    • Keep abreast of new / revised or improved security solutions, processes and development of new threats and attack vectors.
    • Keep abreast of SOC regulatory standards.
    • Participate in the deployment of tested security patches and updates.
    • Conduct security tool selection, pilot and implementation.
    • Maintain SOC awareness program.
    • Communicate SOC action plans and security bulletins.
    • Identify, investigate and resolve security breaches detected by installed security solutions.
    • Make suggestions to implement projects that increase security and ensure the highest quality of service.

    Organizational Competencies:

    • Be Bold
    • Customer Focus
    • Innovation
    • Integrity

    Functional Competencies:

    • IT Operations
    • Incident Management
    • Security Assessments
    • Security Monitoring & Reporting
    • Vulnerability Lifecycle Management
    • Continuity & Disaster Recovery
    • Business Communication
    • Security Solutions Deployment

    Behavioural Competencies:

    • Collaboration & Teamwork

    Experience & Qualifications

    • Bachelor's Degree in Computer Science or any related disciplines.
    • +7 years’ relevant experience in IS, with at least 4 years in security monitoring and solutions deployment.
    • Hands-on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
    • Demonstrable experience with network security and networking technologies as well with systems, security, and network monitoring tools.
    • Demonstrable familiarity with web-related technologies (web applications, web services, service-oriented architectures), and network / web-related protocols.
    • Thorough understanding of the latest security principles, techniques, and protocols
    • Problem-solving skills and ability to work under pressure

    Method of Application

    Interested and qualified? Go to IHS Towers on www.linkedin.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at IHS Towers Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail