Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Mar 6, 2026
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities. GVA Partners is also a l...
    Read more about this company

     

    Wintel & Virtualization SME

    Job Description:

    • Build and administer Windows Server environments for dev/test/prod aligned to project requirements.
    • Perform server provisioning: OS installation, system configuration, and baseline hardening per enterprise standards.
    • Administer Active Directory integration: domain join, GPO application, service accounts, group memberships, and delegated access.
    • Manage Windows security: local and domain policies, Defender/EDR integration, audit policies, TLS/cipher configuration, certificate management.
    • Implement and maintain patching and updates (WSUS/SCCM or enterprise tools), including maintenance windows and rollback planning.
    • Configure Windows services and roles as required (IIS, Failover Clustering, DNS/DHCP where applicable).
    • Support application/middleware prerequisites: .NET frameworks, VC++ runtimes, Windows features, registry settings, and permissions.
    • Configure storage, disks, volumes, and file sharing (SMB/NTFS permissions), including performance and resiliency considerations.
    • Set up and validate network settings: DNS, NTP, firewall rules, proxy configuration, and connectivity to dependent systems.
    • Administer virtualization/cloud workloads where applicable (Hyper-V/VMware/Azure/AWS), including templates and resource sizing.
    • Implement monitoring/observability agents, log forwarding, and define operational alerting thresholds.
    • Troubleshoot OS and platform issues: event logs, performance counters, service failures, patch conflicts, and authentication issues.
    • Execute implementation activities: build validation, deployment support, cutover execution, and hypercare stabilization.
    • Document standard builds, configurations, and operational procedures; create handover materials for BAU operations.
    • Collaborate with security, network, storage, and application teams to resolve dependencies and meet project timelines.

    Typical deliverables

    • Windows build & hardening checklist, AD/service account plan, patch compliance report, certificate inventory, monitoring setup, deployment & cutover runbook, operations handover pack.

    Requirements

    • Minimum of 5+ years post-NYSC professional experience
    • Proven experience with data migration from PowerMax 8500 to VMAX 3
    • Strong working knowledge of VMware and Unix (M6) environments
    • Hands-on experience with large-scale storage migrations, including migration of approximately 449 LUNs

    go to method of application »

    Senior Cybersecurity Analyst

    Summary of Functions

    • Tailoring the SIEM solution to unique infrastructure and business needs
    • Monitor the overall performance of security systems depicted in appendix A
    • Identity and Access Management Monitoring/Alerting
    • Endpoint monitoring
    • Constantly oversee and analyze security defenses per on-prem and cloud infrastructure
    • Participate in the delivery of cybersecurity operations through vulnerability and threat identification, incident detection and response, forensic investigations, Patch and Vulnerability Management. Engage with infrastructure and applications teams in mitigation and remediation efforts.
    • Maintain key metrics that are indicative of the security posture of the infrastructure. Keep abreast of threat intelligence feeds to stay abreast of industry reports and emerging threat that may affect.
    • Produce Executive Dashboard Security reporting showing actionable insights from IT Security monitoring tools
    • Engage with other IT units, where applicable, to establish and enforce security best practices, protection objectives, and process improvements.

    Education, Experience, and Skills required

    • Bachelor’s degree/HND in Computer Science, Information Technology or Cybersecurity related field
    • Minimum of 7 years of experience in Cyber security, with at least 5 years of working as SOC Analyst
    • Experience with Windows/Unix/Linux Operating systems with a focus on cybersecurity
    • Relevant industry certifications (i.e. CISSP, CASP+ CEH, GCIH, GCIA, OSCP)
    • Experience with SIEM (Arcsight), EDR (Falcon Crowdstrike, Packet Analysis, HIPS/NIPS, Network Monitoring tools, Service Now Ticketing, Web Security.
    • Communicates clearly with diverse technical and business owners.
    • Familiarity with regulations and frameworks such as NIST, PCI, ISO 27001

    go to method of application »

    Linux (Redhat) Systems Migration Engineer

    Job Description:

    • -RedHat, Oracle Enterprise Linux and Solaris operating system installation.
    • Operating system hardening and configuration.
    • Break and fix.
    • Capacity optimization and reporting.
    • Observability and monitoring of infrastructure.
    • Service management operations, includes
    • incident, request, problem and change implementations.
    • Host storage sub-system administration and migration.
    • Platform automation and scripting.
    • Package and repository management.
    • System patch and vulnerability remediation.
    • Platform management utilizing tools such as RedHat Satellite and Ansible Automation Platform.
    • Engineered system administration, such as Oracle Sparc M6 and Exadata.
    • Virtualized platform administration such as Oracle Virtual Machine Manager, KVM and VMWare VCenter.
    • Business reporting and presentation.
    • Customer engagement and troubleshoot sessions.
    • Platform upgrade and migration.
    • Research and development.
    • Business tasks reporting.

    SCOPE:

    • PATCHING: This activity is to address swiftly vulnerable hosts in the Unix ecosystem. It also includes vulnerability remediation to mitigate security attack surfaces identified and improve system performance by addressing known system bugs.
    • OPERATING SYSTEM CONVERSION: This activity is for the conversion of Oracle Enterprise Linux to RedHat Enterprise Linux systems respectively for operating system consolidation and get RedHat subscription coverage.
    • REDHAT SATELLITE REGISTRATION: This is consolidation of all RedHat Enterprise Linux footprints on centralised management system – RedHat Satellite. This centralizes package, patch, jobs execution and management.
    • OPERATING SYSTEM UPGRADE: This activity aims at upgrade of RedHat Enterprise Linux 7.9 to 8.10 respectively. This assures environment being security compliant and within support.

    Key Responsibilities:

    • Lead and support the migration from Oracle Enterprise Linux (OEL) to Red Hat Enterprise Linux (RHEL).
    • Integrate Linux hosts with RedHat Satellite for centralized management.
    • Perform advanced troubleshooting of Linux operating systems and applications.
    • Automate routine tasks using tools like Ansible.
    • Apply ITIL processes (change, incident, problem management) in daily operations.
    • Collaborate with cross-functional teams to ensure seamless infrastructure upgrades and transparent system migrations.

    Required Skills & Qualifications:

    • Strong proficiency in Linux system administration (RHEL preferred).
    • Experience with RedHat Satellite, Ansible, and shell scripting (Bash, Python).
    • Familiarity with network services: DNS, NFS, LDAP/Kerberos, Apache, NTP.
    • Analytical mindset with strong problem-solving capabilities.
    • Excellent communication and teamwork skills.
    • Certifications such as RHCE, RHCSA, or ITIL are advantageous

    go to method of application »

    Level 2 - IT Security Planning and Architecture Engineer

    Job Description:

    • Lead investigations and proactively assist Senior Management in defining strategies to protect Organization’s data from attack.
    • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
    • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
    • Lead the implementation of information security projects.
    • Define and enforce security requirements for applications in development.
    • Design, document, and deploy secure infrastructure solutions to enhance and evaluate the security posture of the business to ensure integrity, availability, and confidentiality of all critical enterprise data.
    • Collaborate with development teams to integrate security best practices into the software development lifecycle.
    • Monitor and ensure compliance with security requirements throughout the development process.
    • Liaise with stakeholders in respect of operational implementation of security policies and best practices.
    • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risk and adverse impact to servers, workstations, and user productivity.
    • Implement the infrastructure, configurations, and processes to monitor security related events.
    • Prevent data loss and services interruptions by researching new technologies that will effectively protect the enterprise network.
    • Document and operationalize information security.
    • Ensure all security documentation s are up to date.
    • Ensure conformance to Cybersecurity Blueprint/Roadmap
    • Provide inputs to company strategic plan on all initiatives to ensure that security gaps/vulnerabilities are identified & closed.
    • End-to-end planning, and execution of program.
    • Communicate and engage with stakeholders.
    • Anticipate problems and complications, and formulate solutions so as not to impede the progress of the project,
    • Ensure processes, procedure and policies defined with the it division is understood and adhered to.
    • Develop and deliver security awareness training programs on a quarterly, annual, and on-demand basis.
    • Create and distribute security awareness materials, such as presentations, posters, and email alerts.
    • Measure the effectiveness of security awareness programs through surveys, tests, and other metrics.

    Qualification & Requirement

    • Minimum of Four (4) years’ work experience of which includes Three (3) years Security Architecture experience.
    • Experience in the following: Identity Management technology. Vulnerability assessment and treatment, Systems Auditing, Security Architecture, Network, wireless Security.
    • Proven experience in the full Secure software development lifecycle (SSDLC) - project vision through project implementation - for both small and medium enterprise projects
    • Good working knowledge of Security Design & Architecture.

    go to method of application »

    Database Management Officer - Oracle

    Job Description

    • Install, configure, and administer Oracle, MongoDB, MySQL, and Cassandra environments across dev/test/prod.
    • Support solution implementation activities including database provisioning, schema setup, user creation, and role-based access control.
    • Design and maintain backup and recovery strategies (full/incremental, snapshots, PITR), and execute recovery tests to meet RPO/RTO targets.
    • Implement and manage high availability and disaster recovery configurations (e.g., clustering/replication, standby/replica sets, multi-node Cassandra).
    • Perform database performance tuning: query optimization, indexing strategies, memory/IO tuning, and capacity planning.
    • Monitor databases using enterprise or native tools; define and tune alerts, thresholds, and health checks.
    • Manage patching and upgrades for database engines and supporting components with minimal downtime.
    • Execute data migration and transformation tasks (export/import, replication-based migration, cutover planning and rollback).
    • Enforce security controls: encryption (at rest/in transit), key management integration, auditing, least privilege access, and credential rotation.
    • Create and maintain database standards and documentation: runbooks, build guides, operational procedures, architecture diagrams.
    • Collaborate with application teams to ensure best practices for connection management, pooling, transaction handling, and resilience.
    • Support integration with CI/CD pipelines for database changes (e.g., version-controlled schema changes, controlled deployments).
    • Troubleshoot complex incidents including corruption, replication lag, locking/contention, disk/IO bottlenecks, and configuration drift.
    • Participate in implementation workshops, readiness reviews, cutover execution, and hypercare/stabilization support.
    • Ensure compliance with enterprise requirements for logging, retention, auditing, and change management.
    • Provide knowledge transfer to operations/support teams and contribute to post-implementation lessons learned.

    Requirements

    • Minimum of 5+ years post-NYSC professional experience
    • Experience working on MSAP DB & VAS programs
    • Hands-on experience providing DBA support for MSAP database migration
    • Strong experience with database optimization programs
    • In-depth knowledge of database performance tuning and optimization

    Method of Application

    Interested and qualified candidates should send their CVs (in MS Word and PDF to: tisea@gvapartners.com , eniolaa@gvapartners.com and copy contact@gvapartners.com using the job title as subject of the mail.

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at GVA Partners Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail