Black Pen Recruitment is a diversified specialist recruitment consultancy situated in the heart of Cape Town, led by highly respected recruitment professionals, each accomplished in their own right to consult and deliver on staff placement assignments.
Read more about this company
Are you an experienced Cyber Security Expert in the FinTech industry? Are you looking for a remote job? Then we have the opportunity for you!
We are looking to hire a Cyber Security Expert located within Nigeria to join their exciting remote team. We are one of the first movers in bringing Cryptocurrency to the masses in Africa and the Middle East.
In this role you will operate independently and as part of a team to ensure software, hardware, and related components are protected from cyber-attacks. Your responsibilities will include developing security systems, analyzing current systems for vulnerabilities, and handling all cyber-attacks in an efficient and effective manner. Showing strong IT skills and a deep understanding of cyber hacker methodology.
This is an exciting position in a fast paced ever growing, profitable, venture-backed company.
If this sounds like the perfect job opportunity and a dream come true to be a part of such an exceptional well developed company, then apply.
Responsibilities
Develop unique, effective security strategies for software systems, networks, data centers, and hardware
Implement/build-in security systems to software, hardware, and components
Research best ways to secure company-wide IT infrastructure
Build firewalls to protect network infrastructures
QA software and hardware for security vulnerabilities and risks
Monitor software for external intrusions, attacks, and hacks
Close off security vulnerability in the case of an attack
Identify cyber attackers, report to upper management, and cooperate with police or other legal forces to detain perpetrator
Safeguard information system assets by identifying and solving potential and actual security problems
Protect system by defining access privileges, control structures, and resources
Recognize problems by identifying abnormalities, reporting violations
Implement security improvements by assessing current situation; evaluating trends; anticipating requirements
Determine security violations and inefficiencies by conducting periodic audits
Upgrade system by implementing and maintaining security controls
Keep users informed by preparing performance reports, communicating system status.
Maintain quality service by following organization standards
Team:
Exude your upbeat energy and enthusiasm each and every day to motivate your team to be the best they can in every aspect of what they do
Celebrate the success of others by recognizing the contributions of committed team members and their achievements
Align your values with the Mission, Vision and Values of the Client
Be a role model for the Client’s organizational culture by creating a positive impact at every touchpoint with people, with every word you say or put in print and everything you do
Communicate in a fashion that is respectful and well understood
Collaborate with your peers to collectively think of innovative ideas that drive business through technology
Build and utilize working relationships with internal business partners across the organization and external business contacts.
Requirements
Bachelor's degree in Computer Science, Information Systems, or equivalent education or work experience
4+ years of prior relevant experience
Advanced industry-specific training and certification
Advanced understanding of common networking ports and protocols, traffic flow, system administration, models, defense-in-depth and common security elements.
Hands-on experience analyzing high volumes of logs, network data, and other attack artifacts in support of incident investigations
Experience with vulnerability scanning solutions
Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security
Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic Unix commands
Skills of perception and QA, ability to identify vulnerabilities and overall issues
Forensic approach to challenges
Ability to think like a hacker and anticipate hacker moves
Desire to self-educate on the ever-changing landscape of cyber hacking tactics
30 Contract Staffing Risks That Could Get Your Company SuedThis piece outlines 30 contract staffing risks that have real legal consequences under Nigerian law. If you are a business owner, HR professional, or staffing agency operator, you will find this highly valuable.
10 Steps to Building an Effective Talent PipelineLearn how to keep a list of good candidates ready in advance, before a role becomes vacant. Discover step by step the process of building a talent pipeline that works.
2026 / 2027 NEPL / OERNL Joint Venture Tertiary Scholarship Scheme (National Merit Award)The NEPL/OERNL Joint Venture in pursuance of its Corporate Social Responsibility invites suitably qualified applicants for its 2026/2027 Tertiary Scholarship Scheme, commencing Tuesday, March 3, 2026, and concluding on Wednesday, April 1, 2026. For applicants from Non-Host/Transit Communities