Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Nov 22, 2021
    Deadline: Nov 23, 2021
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business an...
    Read more about this company

     

    Specialist, IT Infrastructure Assessment & Review

    Key Roles & Responsibilities

    • Safeguard IHS by detecting, preventing and mitigating information security threats to the company’s infrastructure.
    • Provide quarterly network vulnerability assessment of the company’s IT infrastructure by integrating the following tasks:
      • Gather intelligence
      • Document active and stealth nodes
      • Enumerate all trust relationships
      • Identify exposure using commercial tools
      • Scan network vulnerability
      • Analyze, categorize and validate vulnerabilities
      • Catalogue exposure
      • Examine external visible points of presence
      • Query DNS records and enumerate external nodes
      • Perform TCP/UDP scan of nodes
      • Conduct manual testing and repeat identification
    • Support management in realizing cybersecurity ROI
    • Collaborate with Group Cyber-security team to drive cybersecurity initiatives.
    • Design and implement security controls to safeguard and monitor events for information systems, enterprise network, routers and switches
    • Support the implementation of IS projects.
    • Assess vulnerabilities related to the company’s network by following general accepted methodology for network assessments.
    • Carry out port scans to identify insecure port configurations.
    • Continuously monitor the company’s external visible points of presence.
    • Provide second-line support for IT security-related issues.
    • Collect evidence and documentation of all network-related exposures.
    • Deploy Sophos endpoint for 2000 endpoints and 200 servers and for monitoring/ response to detected malware attacks.
    • Monitor the company’s Operations Management Suite (OMS) platform for endpoints and severs. Identify and responding to security threats on the platform.
    • Monitor firewall logs.
    • Conduct network device review covering the following:
      • Router security reviews:
      • Clear Text Rlogin Protocol Service
      • Simple Network Management Protocol (SNMP)
      • Clear text (Tenet) review
      • Console Connection Timeout
      • Outbound Administrative Access Review
      • Packet Assembler/ Disassembler
    • Review IDS policies based on the company’s requirements and best practices.
    • Carry out threat monitoring by reviewing firewall and IPS alerts. Follow up with appropriate action.
    • Investigate and block phishing email.
    • Perform other tasks and duties as assigned by the Senior Manager, IT Security Operations.

    Experience & Qualifications Required

    • Bachelor's Degree in Computer Science, Engineering, or other related disciplines.
    • Plus 5 years relevant experience in information security and network vulnerability management.
    • Professional certifications will be an asset, e.g. ISO27005: Information Security Risk, CEH, EC-Council Certified Security Analyst (ECSA).
    • Strong background in security infrastructure and various network technologies, e.g. firewalls, VPN, intrusion/ extrusion detection, vulnerability and risk assessment tools, encryption technologies, data loss prevention, whole disk and device encryption solutions, two-factor authentication, common windows (desktop and server) platforms.
    • Demonstrable experience with network and infrastructure vulnerability scanners such as Nessus, NEXPOSE, Nipper, etc.
    • Demonstrable knowledge of security best practices such as defence in-depth, least privileges, need-to-know, separation of duties, access controls, and encryption.
    • Hands on experience with security systems, e.g. firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
    • Proven experience in network security, networking technologies and network monitoring tools.
    • Must possess thorough understanding of the latest security principles, techniques, and protocols.

    Organizational Competencies:

    • Be Bold
    • Customer Focus
    • Innovation
    • Integrity

    Functional Competencies:

    • Penetration Testing
    • Vulnerability Lifecycle Management
    • Security Incident Response
    • Systems Auditing
    • Database Security
    • Firewall Design
    • Intrusion Detection
    • System Administration Implementation
    • Telecommunications, Network, Wireless & Internet Security

    Behavioural Competencies:

    • Analytical Thinking
    • Problem Solving
    • Collaboration & Teamwork

    Check how your CV aligns with this job

    Method of Application

    Note: Please apply with an updated resume / CV.

    Interested and qualified? Go to IHS Towers on www.linkedin.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at IHS Towers Back To Home
Average Salary at IHS Towers
₦ 330K from 30 employees
Mysalaryscale.com
View Hot Nigerian Jobs Today »

Career Advice

View All Career Advice
 

Subscribe to Job Alert

 

Join our happy subscribers

 
 
 
Send your application through

GmailGmail YahoomailYahoomail