Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Aug 22, 2023
    Deadline: Aug 25, 2023
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities. GVA Partners is also a l...
    Read more about this company

     

    Junior Recruitment Analyst

    Description 

    • We are looking for a focused technical recruiter to be responsible for the sourcing, screening, and hiring of technical specialists to fill IT positions.
    • The technical recruiter's responsibilities include all aspects of hiring, from meeting with hiring managers to write job descriptions to offering job positions to the most suitable candidates.
    • You should be focused, hard-working, and able to meet deadlines to the satisfaction of all parties involved.
    • To be a successful technical recruiter, you should have a good working knowledge of technology, technical roles, and technical skills, as well as knowledge of the recruitment process.

    Responsibilities

    • Communicating with hiring managers to identify future job openings and the technical requirements for those jobs.
    • Writing job descriptions and posting to relevant media platforms.
    • Screening applicants for competency with the job requirements.
    • Arranging telephone, video, or in-person interviews.
    • Performing background and reference checks.
    • Presenting the resumes of the most suitable candidates to the hiring manager.
    • Offering job positions and completing the relevant paperwork.
    • Keeping track of all applicants as well as keeping applicants informed on the application process.
    • Forecasting recruitment budgets.

    Requirements / Experience

    • A Bachelor of Science with a minimum of 2.1 in Computer Science or any Engineering-related field.
    • 1 - 3 years work experience.
    • A Master’s Degree is an added advantage.
    • To be a successful technical recruiter, you should have a good working knowledge of technology, technical roles, and technical skills, as well as knowledge of the recruitment process.
    • A good understanding of technology and technical skills.
    • Experience in technical recruitment processes and platforms.
    • Good interpersonal and decision-making skills.
    • Excellent communication skills
    • Fast typing skills.
    • Excellent problem-solving skills and keen attention to details.

    go to method of application ยป

    Cyber Security Specialist

    Summary of Functions

    • Drive the Automation of the Security Baseline configuration using Enterprise tools Puppet, Ansible
    • Manage the Database security program including onboarding, discovery, use cases, upgrades & regular assessments. Tool is Imperva
    • Based on the nature of the security threats perceived, assesses and establishes mitigating steps to ensure appropriate treatment and escalate as appropriate.
    • Coordination of security systems disciplines in the face of active threats.
    • Provides expert technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions and architecture.
    • Collaborates and acts as a security architecture liaison with other IT areas and designs and/or recommends new security solutions as needs arise.
    • Liaise with other relevant functions to facilitate the timeous closure of incidents and vulnerabilities Ensure Security controls are regularly evaluated as part of the Security Assessment program with proposed remedial actions to address noted baseline variances
    • Support the implementation of risk assessment exercises across the Information Technology function in order to trap and highlight information security weaknesses and advice on controls to mitigate those risks. Implement standards for testing methodologies, techniques and procedures and conduct robust quality standard programme.
    • Lead IT Controls Assessments and compliance exercises.
    • Support controls design for Operating systems, Applications & Database Security, implementation, assessments & reporting
    • Monitor compliance to Information security policies, procedures and standards via a robust information security program/plan depicting continuous planned and ad-hoc audit and review exercises.
    • Liaise with other relevant functions/stakeholder to implement information security as defined by Nigeria.
    • Manage escalating issues (within the information security domain) along with relevant stakeholders.
    • Maintain key metrics that are indicative of the security posture of the infrastructure.
    • Produce Executive Dashboard Security reporting showing actionable insights from IT Security monitoring tools

    Education, Experience, and Skills required

    • Minimum of First Degree in Computer Science, Engineering, Information Technology/Systems or any related discipline preferred
    • Minimum of 5 years of experience in Cyber security or roles with a focus on Application, Operating systems & Database security.
    • Experience with Windows/Unix/Linux Operating systems with a focus on cybersecurity
    • Relevant industry certifications (i.e. CISSP, CISA, CRISC, CISM, COMPTIA+, Imperva Database administrator, Puppet practitioner, CASP+ CEH, GCIH, GCIA, OSCP)
    • Experience with SIEM (ArcSight), EDR (Falcon Crowdstrike, Packet Analysis, HIPS/NIPS,
    • Network Monitoring tools, Service Now Ticketing, Database Security.
    • Technical experience around Identity Access Management, Controls configuration management & automation using Puppet/Ansible/Chef, Vulnerability assessments and treatment, Technical systems baseline governance & Implementation.
    • Proven experience with best practices, frameworks & standards implementation across technology stacks, Auditing across varying technology, integrating log sources to a SIEM and offense/alerts tuning.
    • Proven experience in penetration testing & Use of offensive Security Red team tools.
    • Proven experience in business continuity & use of defensive Blue team tools.
    • Proven experience in identifying, developing, implementing and evaluating risk response options & providing management with information to enable risk response decisions.
    • Experience in identifying requirements, developing architectures, and deploying enterprise Security architecture, ensuring that the implementation adheres to standards and best practices. Mastered the principles of how business strategy drives Security.
    • Excellent negotiation and facilitation skills is critical to this role: (Able to convey and sell ideas and strategies to stake holders).
    • Knowledge of SQL is desirable – minimum Intermediate.
    • Experience with database security administration tools, security assessments and secure database configuration
    • Knowledge & Implementation of best practices & Hardening frameworks, DISA, CIS, NIST, ISO, PCIDSS etc.

    Method of Application

    Interested and qualified candidates should send their Resume (in PDF or Word format) to: busolao@gvapartners.com and copy to: contact@gvapartners.com using the Job title as the subject of the mail.

    Build your CV for free. Download in different templates.

  • Apply Now
  • Send your application

    View All Vacancies at GVA Partners Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail