For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business an...
Read more about this company
Lead the IT security team in line with best practice such as ISO27001
Identify potential threats to the confidentiality, integrity and availability of the company’s systems and network.
Identify appropriate security technologies based on risks, policies, and architecture.
Support the IT Architecture Review process and evaluate associated security of the proposed architectures.
Contribute towards establishing credible security awareness throughout the organization.
Create and establish processes around vulnerability management.
Plan, buy, and roll out security hardware and software, ensuring IT and network infrastructure is designed according to best security practices.
Perform real-time analyses of immediate threats.
Triage when security threats materialize.
Keep abreast of developing security threats and assist management to understand potential security problems that may arise from acquisitions or other big business moves.
Prevent staff from misusing or misappropriating data.
Ensure that only authorized users have access to restricted data and systems.
Keep ahead of security needs by implementing programs or projects that mitigate risks, e.g. regular system patches.
Determine root causes of breaches and deal with those responsible if internal while also planning to avoid repeats in future.
Ensure IT security baselines and considerations are embedded in the procurement process for all applications.
Keep informed of industry trends in cyber-security.
Drive purchase of security solutions to combat IT security risk.
Perform other tasks and duties as assigned by the Director, ITSSC.
Qualifications
Bachelor’s and/or Advanced degree in Computer Science or any related disciplines. Professional certifications such as CISA, ISO27001, CISSP, CISM, CEH, will be an asset.
+9 years’ relevant experience in Information Security, IT Control and IT Risk.
Hands-on experience in security systems review, Acunetix, Windows Server, Linux server, SIEM, Nipper, Nessus.
Demonstrable experience with change management, user access management, segregation of duties matrix, and incident response.
Thorough understanding of the latest security principles, techniques, and protoco
AI's Impact on Jobs and Organisations (Nigeria report)This report examines the extent to which AI is affecting jobs and organisations in Nigeria. It brings together perspectives from HR professionals and managers across different industries.
30 Contract Staffing Risks That Could Get Your Company SuedThis piece outlines 30 contract staffing risks that have real legal consequences under Nigerian law. If you are a business owner, HR professional, or staffing agency operator, you will find this highly valuable.
10 Steps to Building an Effective Talent PipelineLearn how to keep a list of good candidates ready in advance, before a role becomes vacant. Discover step by step the process of building a talent pipeline that works.
2026 / 2027 NEPL / OERNL Joint Venture Tertiary Scholarship Scheme (National Merit Award)The NEPL/OERNL Joint Venture in pursuance of its Corporate Social Responsibility invites suitably qualified applicants for its 2026/2027 Tertiary Scholarship Scheme, commencing Tuesday, March 3, 2026, and concluding on Wednesday, April 1, 2026. For applicants from Non-Host/Transit Communities