Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 2, 2024
    Deadline: Feb 7, 2024
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities. GVA Partners is also a l...
    Read more about this company

     

    Business Analyst

    • We require the service of a highly skilled Business Analyst with experience to join our dynamic team. The successful individual will conduct business analysis for new product releases and new projects.
    • This individual will be involved in requirement analysis, documentation, scope validation, coordination and assessment of requests from stakeholders.

    Responsibilities:

    • Assess the scope of the API project (what the business wants) and defines the milestones
    • Facilitates brainstorming sessions between all the stakeholders, knowledge matter experts and engineering team
    • Establish and evaluates the API requirements and define the API Requirements
    • Documentation (API client requirements, REST services, class diagrams)
    • Translates API client needs into technical API specifications (OpenAPI )
    • Create user stories for the delivery team
    • Elaborate the deliverables of the acceptance phase: acceptance strategy, acceptance notebooks, acceptance reports
    • Carry out the UATs and organize the test phases with the business users and product owners
    • Collaborate with the different members of the project team according to the project phase
    • Produce the necessary documentation for each project phase (API Requirements Documentation)

    Requirements:

    • Bachelor degree in computer science, engineering, statistics or other related fields (Master degree is a plus) with at least 3 years building business software
    • Excellent functional and technical proficiency in software development (Domain Driven Design, UML Diagrams, Design Pattern…)
    • Mandatory knowledge of API design and implementation (REST API, OpenAPI)
    • Experience with an API Management Platform (Apigee, MuleSoft, Axway, Software AG…)
    • Strong knowledge of DevOps methodology and good knowledge of an Agile Project Management Tool (Azure DevOps, JIRA…)
    • Good understanding of Micro services architecture and cloud technologies with knowledge of C# or Java or Python
    • An ability to visualize data using presentations, diagrams, infographics
    • Excellent interpersonal and written communication skills with high level of critical thinking

    go to method of application »

    Cybersecurity Specialist

    Summary of Functions

    • Drive the Automation of the Security Baseline configuration using Enterprise tools Puppet, Ansible
    • Manage the Database security program including onboarding, discovery, use cases, upgrades & regular assessments. Tool is Imperva
    • Based on the nature of security threats perceived, assesses and establishes mitigating steps to ensure appropriate treatment and escalate as appropriate. Co-ordination of security systems disciplines in the face of active threats.
    • Provides expert technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions and architecture.
    • Collaborates and acts as a security architecture liaison with other IT areas and to design and/or recommend new security solutions as needs arise.
    • Liaise with other relevant functions to facilitate the timeous closure of incidents and vulnerabilities
    • Ensure Security controls are regularly evaluated as part of the Security Assessment program with proposed remedial actions to address noted baseline variances
    • Support the implementation of risk assessments exercises across the Information Technology function in order to trap and highlight information security weaknesses and advice on controls to mitigate those risks.
    • Implement standards for testing methodologies, techniques and procedures and conduct robust quality standard programme.
    • Lead IT Controls Assessments and compliance exercises.
    • Support controls design for Operating systems, Applications & Database Security, implementation, assessments & reporting
    • Monitor compliance to Information security policies, procedures and standards via a robust information security program/plan depicting continuous planned and ad-hoc audit and review exercises.
    • Liaise with other relevant functions/stakeholder to implement information security as defined by Nigeria.
    • Manage escalating issues (within the information security domain) along with relevant stakeholders.
    • Maintain key metrics that are indicative of the security posture of the infrastructure.
    • Produce Executive Dashboard Security reporting showing actionable insights from IT Security monitoring tools

    Education, Experience, and Skills required

    • Minimum of First Degree in Computer Science, Engineering, Information Technology/Systems or any related discipline preferred
    • Minimum of 5 years of experience in Cyber security or roles with a focus on Application, Operating systems & Database security.
    • Experience with Windows/Unix/Linux Operating systems with a focus on cybersecurity
    • Relevant industry certifications (i.e. CISSP, CISA, CRISC, CISM, COMPTIA+, Imperva Database administrator, Puppet practitioner, CASP+ CEH, GCIH, GCIA, OSCP)
    • Experience with SIEM (Arcsight), EDR (Falcon Crowdstrike, Packet Analysis, HIPS/NIPS, Network Monitoring tools, Service Now Ticketing, Database Security.
    • Technical experience around Identity Access Management, Controls configuration management & automation using Puppet/Ansible/Chef, Vulnerability assessments and treatment, Technical systems baseline governance & Implementation.
    • Proven experience with best practices, frameworks & standards implementation across technology stacks, Auditing across varying technology, integrating log sources to a SIEM and offense/alerts tuning.
    • Proven experience in penetration testing & Use of offensive Security Red team tools.
    • Proven experience in business continuity & use of defensive Blue team tools.
    • Proven experience in identifying, developing, implementing and evaluating risk response options & providing management with information to enable risk response decisions.
    • Experience in identifying requirements, developing architectures, and deploying enterprise Security architecture, ensuring that the implementation adheres to standards and best-practices.
    • Mastered the principles of how business strategy drives Security.
    • Excellent negotiation and facilitation skills is critical to this role: (Able to convey and sell ideas and strategies to stake holders).
    • Knowledge of SQL is desirable – minimum Intermediate.
    • Experience with database security administration tools, security assessments and secure database configuration
    • Knowledge & Implementation of best practices & Hardening frameworks, DISA, CIS, NIST, ISO, PCIDSS etc.

    go to method of application »

    Development, Security and Operations (DEVSECOPS)

    SCOPE OF WORK AND KEY RESPONSIBILITIES

    • Continuous integration and deployment: Using DevOps tools to automate the build, test, and deployment of software updates, while also running security scans and vulnerability assessments.
    • Containerization: Using containerization technologies like Docker or Kubernetes to create isolated environments for running applications, which can help to improve security by reducing the attack surface.
    • Infrastructure as code: Using infrastructure as code tools to manage the deployment and configuration of infrastructure resources, which can help to ensure that security policies and configurations are consistent across environments.
    • Security automation: Using automation tools to monitor and detect security events in real-time, and to automatically respond to security incidents by triggering alerts or executing remediation actions.
    • Product Development : Improve security and reduce risk of cyber threats in products and products deployed across all platforms and applications
    • Operational & Data Integrity Assurance: Ensuring that all processes run correctly and accurately that the integrity of the data in security systems is assured and aligned with inputs received. Operational processes and procedures and checklist to assure the operational performance remain optimal and ensure maximum availability of the platform and associated services must be managed and maintained. Operational Performance Report and Dashboards for Operational Management purposes are included in the scope. Daily engagements with Group SOC to assure information sent/received to and from Group SOC is expected.
    • Application Support: Corrective and preventive maintenance of the Security System, adhoc and operational reporting and delivering on all Service Requests and incidents logged through the Standard Trouble Ticketing Platform. Management of the application includes space, and performance management.
    • Data Availability: Accurate and complete data available for the IT Security Team and downstream systems dependent on data or reports from Security System

    EXPECTED TASKS AND RESPONSIBILITIES

    • Ensure that our development considers the latest thinking, patterns is software security development and best practice - providing recommendation, with user stories, Services management team on approach and automation related to security
    • Work in a DevSecOps team to develop new software projects against Communications Platform as a Service APIs to enhance the business feature set in the Converged Communications space
    • Create software to solve company’s business problems in Unified Communications Connectivity Platform
    • Ensure that capabilities are deployed through a continuous development pipeline with security requirements satisfied at the time of deployment
    • Proactively monitor and fix issues in test and production platform.
    • Engineer solutions on AWS and other Cloud Platforms using Infrastructure as Code methods such as Terraform and Ansible.
    • Integrate, configure, deploy and manage centrally provided common cloud services (e.g. IAM, networking, logging, Operating systems, Containers) as well as shared service applications on cloud (e.g. Jenkins, Nexus, GitLab Runners, Vault)

    Qualifications & Experience:

    • Bachelor's degree in computer science, computer engineering, information technology, or any other relevant field.
    • Minimum of 3 - 5 years of experience as a DevSecOps engineer.

    go to method of application »

    Project Manager (Surveiliance Systems)

    Job Overview:

    An exciting opportunity exists for a dynamic and talented Project Manager to join a dynamic project team. The resource shall be responsible for:

    • Candidate to oversee and manage end-to-end surveillance system installation projects, including project planning, coordination, risk management, and closure, ensuring timely delivery within budget and scope , while also identifying potential sales opportunities and nurturing client relationships.
    • Candidate must be able to engage in effective interface management among clients, vendors, technical teams, and other project stakeholders, facilitating seamless communication and collaboration for successful project outcomes, and leverage these interactions to market services, attract new business, and strengthen client relationships for repeat business.
    • Candidate will leverage expertise in security technologies and system design to guide the creation of surveillance systems that meet client needs and offer technical support and training to clients’ post-project completion. Also, engage in strategic business development by understanding and communicating customer needs to influence product development and enhancements

    POSITION SUMMARY & KEY AREAS OF RESPONSIBILITY:

    • Engage with clients to understand their specific surveillance requirements and translate these into efficient project plans.
    • Manage interfaces between various stakeholders, including clients, vendors, technical teams, and other project teams.
    • Conduct comprehensive risk management to anticipate and mitigate project risks. Specifically, determine the likelihood of a security breach or incident occurring on surveillance systems Develop contingency plans as necessary.
    • Coordinate with both internal teams and external vendors, facilitating communication and collaboration to ensure seamless progression of project plans.
    • Implement and maintain project documentation, ensuring schedules, reports, and financial data are accurate and up-to-date.
    • Apply established project management standards and methodologies, ensuring high-quality project delivery.
    • Oversee the design and programming of surveillance systems; working with architects and engineers to test and develop security plans for new surveillance system projects, ensuring they align with client requirements and quality standards.
    • Leverage expertise in security technologies (such as CCTV, Access Control, and Alarm Systems) to provide guidance and solve project-related issues.
    • Manage the user interface of security systems to ensure usability and alignment with client needs.
    • Provide necessary training and technical support to clients’ post-project completion.
    • Monitor and manage potential project scope changes, identifying impacts and making necessary adjustments.
    • Regularly evaluate project performance using appropriate systems, tools, and techniques. Initiate corrective actions when necessary.
    • Participate in or lead efforts to improve and streamline internal processes for enhanced project delivery.
    • Stay informed on the latest trends, tools, and technologies in the security and surveillance industry to ensure the company's competitiveness.
    • Managing projects that involve typical installation of surveillance systems design and programming using established standards as required.
    • Provides detailed information to communicate design and operation to customers/clients.
    • Working with architects and engineers to test and develop security plans for new surveillance system projects.
    • Coordinating security staff schedules and activities with other team members involved in the project.
    • Coordination of tasks to System Technicians, Electrical Installers and System Designers.
    • Ensures that delegated tasks are done accurately, on time and within budget and scope of the contract.
    • Attend meetings and briefings by customer.
    • Effectively communicates the status of projects to Stakeholders as required and provides monthly forecasts of revenue, costs, and gross margin

    EXPERIENCE, QUALIFICATIONS AND KEY SKILLS:

    Experience

    • Proven experience in managing and leading complex, end-to-end surveillance installation projects. Previous work with security technologies, including CCTV, Access Control, and Alarm Systems, is highly desirable.
    • 5 years in Project Management and strong experience in working in a professional environment.

    Skills

    Strong skills in the following;

    • Project management
    • Risk management
    • Stakeholder communication
    • Proficiency in surveillance system design and programming is essential
    • Good report writing and communication skills

    Knowledge

    • Familiarity with the latest trends and technologies in the security and surveillance industry; particularly with regards to protection of mass transit transport networks.
    • Understanding of interface management principles and practices.
    • Knowledge of project accounting, costing principles is preferred
    • Contract management knowledge is a plus

    Education

    • Bachelor's degree in a relevant field such as Information Technology, Computer Science, or Engineering (minimum 2:2)
    • Certifications in project management, such as PMP or PRINCE2, are advantageous.

    Method of Application

    Interested and qualified candidates should send their Resume (in PDF or Word format) to: busolao@gvapartners.com and copy to: contact@gvapartners.com using the Job title as the subject of the mai

    Build your CV for free. Download in different templates.

  • Apply Now
  • Send your application

    View All Vacancies at GVA Partners Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail