Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Dec 13, 2021
    Deadline: Dec 14, 2021
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business an...
    Read more about this company

     

    Senior Specialist, IT Governance Processes & Standards

    About the Job

    • We are currently recruiting for a Senior Specialist, IT Governance Processes & Standards who will support and coordinate process maturity and standardization across IT operations; as well as serve as the ‘’go-to’’ resource for consultation on best practice recommendations, IT process flows, risks, and controls.

    Key Roles & Responsibilities

    • Implement work plans and activities to align the company’s IT processes to best practices and standards, including COBIT, ITIL and ISO 27001.
    • Ensure IT policies, processes and standards comply with and are ready for SOX ELC testing and operated with the RACM.
    • Provide inputs to the review, development, implementation and improvement of IT policies, procedures, standards and guidelines, ensuring practice alignment with relevant standards, regulations, and frameworks.
    • Ensure all IT policies and procedures are documented and updated according to regulatory standards.
    • Ensure that management approval of governance documentation is obtained, guidelines followed, and repository for documentation created and kept up-to-date.
    • Periodically review IT processes and flag gaps within IT functional teams, get feedback, and measure success. Work with relevant stakeholders to improve processes and improve efficiency.
    • Work closely with functional leaders to build appropriate process monitoring frameworks and provide regular progress reports.
    • Maintain and update IT process improvement plans. Track implementation against agreed plans and report on implementation status to relevant stakeholders.
    • Contribute towards establishing credible risk governance, promoting an integrated IT risk management mindset at all levels and driving execution which appropriately prioritizes actions based on business impact.
    • Coordinate IT risk assessment activities. Lead the identification of Key Risk Indicators (KRIs) across the business based on up-to-date situational analyses and trends. Drive risk oversight by providing timely and relevant information on KRIs.
    • Perform other tasks and duties as assigned by the Senior Manager, IT Governance.

    Experience & Qualifications Required

    • Bachelor's and/ or advanced Degree in Computer Science or any related discipline.
    • Professional certifications, e.g. CGEIT, ISO27001:LA, COBIT 5 Implementer, CISA, etc, will be an asset.
    • Plus 9 years’ relevant experience in Information Governance, IT Risk, IT Audit and Security
    • Hands-on experience with implementation of COBIT 5, ISO27001, TOGAF
    • Thorough understanding of the latest IT-GRC principles, techniques and protocols.

    Organizational Competencies:

    • Be Bold
    • Customer Focus
    • Innovation
    • Integrity

    Functional Competencies:

    • COBIT 5
    • IT Policies, Procedures & Standards
    • IT Operations
    • SOX Compliance
    • Risk Assessments
    • IT Strategy
    • ISO27001
    • Continuity & Disaster Recovery
    • Business Communication

    Behavioural Competencies:

    • Attention to Detail
    • Collaboration & Teamwork.

    go to method of application ยป

    Senior Specialist, IS Architecture

    About the Job

    • We are currently recruiting for a Senior Specialist, IS Architecture who will continuously improve and support the company’s enterprise cyber-security posture while applying technical expertise to address enterprise-wide architecture-related issues.

    Key Roles & Responsibilities

    • Participate in planning & designing the company's IS architecture.
    • Specify, allocate, and assign confidentiality, integrity, and availability requirements to development and acquisition organizations and assets.
    • Develop and maintain an enterprise security architecture.
    • Create and maintain schematics and architectural and topological diagrams of the entire security architecture. Also, ensure that the change management procedure is adhered to in design changes.
    • Ensure that security requirements are adequately addressed throughout the development and acquisition lifecycles for all assets.
    • Identify security and network design gaps in existing and proposed architectures. Recommend changes and/ or enhancements.
    • Determine security requirements by evaluating business strategies and requirements while enforcing defined information security standards.
    • Conduct system security reviews and risk assessments, studying architecture/platform and identifying integration issues.
    • Plan security systems by evaluating network and security technologies. Develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices.
    • Verify security systems by developing and implementing test scripts.
    • Monitor and ensure compliance to standards, policies, and procedures. Conducting incident response analyses. Develop and implement training programs.
    • Upgrade security and network systems by monitoring security environment. Identify security architecture gaps. Evaluate and implement enhancements.
    • Prepare system security reports by collecting, analyzing, and summarizing data and trends.
    • Align standards, frameworks, and security with overall business and technology strategy.

    Experience & Qualifications Required

    • Bachelor's Degree in Computer Science or Information Technology. TOGAF, CISSP, and/ or other relevant security certifications desired.
    • Plus 7 years relevant experience in Information Security, Enterprise Architecture, Vulnerability management, and Network Architecture.
    • Professional background as information security and/ or network architect developing and designing security best practices within a large multinational consulting and/ or engineering organization.
    • Proven ability to make risk-based security decisions and weight interests of multiple stakeholders and risk profiles.
    • Demonstrable experience of working with vulnerability assessment tools.
    • Solid knowledge of relevant National Institute of Standards & Technology (NIST) standards, ISO27001, API/Web Services, scripting languages, and RDBMS.

    Organizational Competencies:

    • Be Bold
    • Customer Focus
    • Innovation
    • Integrity

    Functional Competencies:

    • Enterprise Architecture
    • Web Application Security
    • Vulnerability Lifecycle Management
    • Firewall Design
    • Network Design
    • Security Architecture

    Behavioural Competencies:

    • Analytical Thinking
    • Collaboration & Teamwork.

    Method of Application

    Use the link(s) below to apply on company website.

     

    Note: Please apply with an updated Resume / CV.

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at IHS Towers Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail