Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Nov 22, 2021
    Deadline: Nov 23, 2021
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business an...
    Read more about this company

     

    Specialist, IT Infrastructure Assessment & Review

    Key Roles & Responsibilities

    • Safeguard IHS by detecting, preventing and mitigating information security threats to the company’s infrastructure.
    • Provide quarterly network vulnerability assessment of the company’s IT infrastructure by integrating the following tasks:
      • Gather intelligence
      • Document active and stealth nodes
      • Enumerate all trust relationships
      • Identify exposure using commercial tools
      • Scan network vulnerability
      • Analyze, categorize and validate vulnerabilities
      • Catalogue exposure
      • Examine external visible points of presence
      • Query DNS records and enumerate external nodes
      • Perform TCP/UDP scan of nodes
      • Conduct manual testing and repeat identification
    • Support management in realizing cybersecurity ROI
    • Collaborate with Group Cyber-security team to drive cybersecurity initiatives.
    • Design and implement security controls to safeguard and monitor events for information systems, enterprise network, routers and switches
    • Support the implementation of IS projects.
    • Assess vulnerabilities related to the company’s network by following general accepted methodology for network assessments.
    • Carry out port scans to identify insecure port configurations.
    • Continuously monitor the company’s external visible points of presence.
    • Provide second-line support for IT security-related issues.
    • Collect evidence and documentation of all network-related exposures.
    • Deploy Sophos endpoint for 2000 endpoints and 200 servers and for monitoring/ response to detected malware attacks.
    • Monitor the company’s Operations Management Suite (OMS) platform for endpoints and severs. Identify and responding to security threats on the platform.
    • Monitor firewall logs.
    • Conduct network device review covering the following:
      • Router security reviews:
      • Clear Text Rlogin Protocol Service
      • Simple Network Management Protocol (SNMP)
      • Clear text (Tenet) review
      • Console Connection Timeout
      • Outbound Administrative Access Review
      • Packet Assembler/ Disassembler
    • Review IDS policies based on the company’s requirements and best practices.
    • Carry out threat monitoring by reviewing firewall and IPS alerts. Follow up with appropriate action.
    • Investigate and block phishing email.
    • Perform other tasks and duties as assigned by the Senior Manager, IT Security Operations.

    Experience & Qualifications Required

    • Bachelor's Degree in Computer Science, Engineering, or other related disciplines.
    • Plus 5 years relevant experience in information security and network vulnerability management.
    • Professional certifications will be an asset, e.g. ISO27005: Information Security Risk, CEH, EC-Council Certified Security Analyst (ECSA).
    • Strong background in security infrastructure and various network technologies, e.g. firewalls, VPN, intrusion/ extrusion detection, vulnerability and risk assessment tools, encryption technologies, data loss prevention, whole disk and device encryption solutions, two-factor authentication, common windows (desktop and server) platforms.
    • Demonstrable experience with network and infrastructure vulnerability scanners such as Nessus, NEXPOSE, Nipper, etc.
    • Demonstrable knowledge of security best practices such as defence in-depth, least privileges, need-to-know, separation of duties, access controls, and encryption.
    • Hands on experience with security systems, e.g. firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
    • Proven experience in network security, networking technologies and network monitoring tools.
    • Must possess thorough understanding of the latest security principles, techniques, and protocols.

    Organizational Competencies:

    • Be Bold
    • Customer Focus
    • Innovation
    • Integrity

    Functional Competencies:

    • Penetration Testing
    • Vulnerability Lifecycle Management
    • Security Incident Response
    • Systems Auditing
    • Database Security
    • Firewall Design
    • Intrusion Detection
    • System Administration Implementation
    • Telecommunications, Network, Wireless & Internet Security

    Behavioural Competencies:

    • Analytical Thinking
    • Problem Solving
    • Collaboration & Teamwork

    Method of Application

    Note: Please apply with an updated resume / CV.

    Interested and qualified? Go to IHS Towers on www.linkedin.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at IHS Towers Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail