Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Mar 23, 2026
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities. GVA Partners is also a l...
    Read more about this company

     

    IT Security Planning & Architecture Resources Officer (Level 3)

    Job Description

    • Lead investigations and proactively assist Senior Management in defining strategies to protect
    • Organization’s data from attack.
    • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
    • Design and implement security controls to safeguard and monitor events for information systems,
    • enterprise applications and data.
    • Lead the implementation of information security projects.
    • Define and enforce security requirements for applications in development.
    • Design, document, and deploy secure infrastructure solutions to enhance and evaluate the security
    • posture of the business to ensure integrity, availability, and confidentiality of all critical enterprise data.
    • Collaborate with development teams to integrate security best practices into the software
    • development lifecycle.
    • Monitor and ensure compliance with security requirements throughout the development process.
    • Liaise with stakeholders in respect of operational implementation of security policies and best
    • practices.
    • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are
    • sustainable, and implementations are managed to minimize risk and adverse impact to servers,
    • workstations, and user productivity.
    • Implement the infrastructure, configurations, and processes to monitor security related events.
    • Prevent data loss and services interruptions by researching new technologies that will effectively
    • protect the enterprise network.
    • Document and operationalize information security.
    • Ensure all security documentation s are up to date.
    • Ensure conformance to Cybersecurity Blueprint/Roadmap
    • Provide inputs to company strategic plan on all initiatives to ensure that security gaps/vulnerabilities
    • are identified & closed.
    • End-to-end planning, and execution of program.
    • Communicate and engage with stakeholders.
    • Anticipate problems and complications, and formulate solutions so as not to impede the progress of
    • the project,
    • Ensure processes, procedure and policies defined with the it division is understood and adhered to.
    • Develop and deliver security awareness training programs on a quarterly, annual, and on-demand
    • basis.
    • Create and distribute security awareness materials, such as presentations, posters, and email alerts.
    • Measure the effectiveness of security awareness programs through surveys, tests, and other metrics.

    Level 3 Qualifications

    • Minimum of eight (8) years’ work experience of which includes four (4) years’ experience integrating applications and technology into a complex environment.
    • Experience in the following Identity Management technology. Vulnerability assessment and treatment, Systems Auditing, Policy, Database Security, Security Architecture and Models, Network, wireless Security.
    • Minimum of 3 years of security compliance & threats modeling
    • Proven experience in the full Secure software development lifecycle (SSDLC) - project vision through project implementation - for both small and large enterprise projects
    • Proven experience in Security Architecture Governance and standards

    go to method of application »

    IT Security Planning & Architecture Resources Officer Level 2

    Job Description

    • Lead investigations and proactively assist Senior Management in defining strategies to protect Organization’s data from attack.
    • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
    • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
    • Lead the implementation of information security projects.
    • Define and enforce security requirements for applications in development.
    • Design, document, and deploy secure infrastructure solutions to enhance and evaluate the security posture of the business to ensure integrity, availability, and confidentiality of all critical enterprise data.Collaborate with development teams to integrate security best practices into the software development lifecycle.
    • Monitor and ensure compliance with security requirements throughout the development process.
    • Liaise with stakeholders in respect of operational implementation of security policies and best practices.
    • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risk and adverse impact to servers, work stations, and user productivity.
    • Implement the infrastructure, configurations, and processes to monitor security related events.
    • Prevent data loss and services interruptions by researching new technologies that will effectively protect the enterprise network.
    • Document and operationalize information security.
    • Ensure all security documentation s are up to date.
    • Ensure conformance to Cybersecurity Blueprint/Roadmap
    • Provide inputs to company strategic plan on all initiatives to ensure that security gaps/vulnerabilities are identified & closed.
    • End-to-end planning, and execution of program.
    • Communicate and engage with stakeholders.
    • Anticipate problems and complications, and formulate solutions so as not to impede the progress of the project,
    • Ensure processes, procedure and policies defined with the it division is understood and adhered to.
    • Develop and deliver security awareness training programs on a quarterly, annual, and on-demand  basis.
    • Create and distribute security awareness materials, such as presentations, posters, and email alerts.
    • Measure the effectiveness of security awareness programs through surveys, tests, and other metrics.

    Qualifications

    • Minimum of Four (4) years work experience of which includes three (3) years Security Architecture experience.
    • Experience in the following: Identity Management technology. Vulnerability assessment and treatment, Systems Auditing, Security Architecture, Network, wireless Security.
    • Proven experience in the full Secure software development lifecycle (SSDLC) - project vision through project implementation - for both small and medium enterprise projects
    • Good working knowledge of Security Design & Architecture.

    go to method of application »

    Senior Cybersecurity Analyst

    Job Description

    • Lead investigations and proactively assist Senior Management in defining strategies to protect Organization’s data from attack.
    • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
    • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
    • Lead the implementation of information security projects.
    • Define and enforce security requirements for applications in development.
    • Design, document, and deploy secure infrastructure solutions to enhance and evaluate the security posture of the business to ensure integrity, availability, and confidentiality of all critical enterprise data.Collaborate with development teams to integrate security best practices into the software development lifecycle.
    • Monitor and ensure compliance with security requirements throughout the development process.
    • Liaise with stakeholders in respect of operational implementation of security policies and best practices.
    • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risk and adverse impact to servers, work stations, and user productivity.
    • Implement the infrastructure, configurations, and processes to monitor security related events.
    • Prevent data loss and services interruptions by researching new technologies that will effectively protect the enterprise network.
    • Document and operationalize information security.
    • Ensure all security documentation s are up to date.
    • Ensure conformance to Cybersecurity Blueprint/Roadmap
    • Provide inputs to company strategic plan on all initiatives to ensure that security gaps/vulnerabilities are identified & closed.
    • End-to-end planning, and execution of program.
    • Communicate and engage with stakeholders.
    • Anticipate problems and complications, and formulate solutions so as not to impede the progress of the project,
    • Ensure processes, procedure and policies defined with the it division is understood and adhered to.
    • Develop and deliver security awareness training programs on a quarterly, annual, and on-demand  basis.
    • Create and distribute security awareness materials, such as presentations, posters, and email alerts.
    • Measure the effectiveness of security awareness programs through surveys, tests, and other metrics.

    Qualifications

    • Minimum of Four (4) years work experience of which includes three (3) years Security Architecture experience.
    • Experience in the following: Identity Management technology. Vulnerability assessment and treatment, Systems Auditing, Security Architecture, Network, wireless Security.
    • Proven experience in the full Secure software development lifecycle (SSDLC) - project vision through project implementation - for both small and medium enterprise projects
    • Good working knowledge of Security Design & Architecture.

    go to method of application »

    Wintel & Virtualization SME Officer

    Job Description

    • Build and administer Windows Server environments for dev/test/prod aligned to project requirements.
    • Perform server provisioning: OS installation, system configuration, and baseline hardening per enterprise standards.
    • Administer Active Directory integration: domain join, GPO application, service accounts, group memberships, and delegated access.
    • Manage Windows security: local and domain policies, Defender/EDR integration, audit policies, TLS/cipher configuration, certificate management.
    • Implement and maintain patching and updates (WSUS/SCCM or enterprise tools), including maintenance windows and rollback planning.
    • Configure Windows services and roles as required (IIS, Failover Clustering, DNS/DHCP where applicable).
    • Support application/middleware prerequisites: .NET frameworks, VC++ runtimes, Windows features, registry settings, and permissions.
    • Configure storage, disks, volumes, and file sharing (SMB/NTFS permissions), including performance and resiliency considerations.
    • Set up and validate network settings: DNS, NTP, firewall rules, proxy configuration, and connectivity to dependent systems.
    • Administer virtualization/cloud workloads where applicable (Hyper-V/VMware/Azure/AWS), including templates and resource sizing.
    • Implement monitoring/observability agents, log forwarding, and define operational alerting thresholds.
    • Troubleshoot OS and platform issues: event logs, performance counters, service failures, patch conflicts, and authentication issues.
    • Execute implementation activities: build validation, deployment support, cutover execution, and hypercare stabilization.
    • Document standard builds, configurations, and operational procedures; create handover materials for BAU operations.
    • Collaborate with security, network, storage, and application teams to resolve dependencies and meet project timelines.
    • Typical deliverables
    • Windows build & hardening checklist, AD/service account plan, patch compliance report, certificate inventory, monitoring setup, deployment & cutover runbook, operations handover pack.

    Requirements

    • Interested candidates should possess a Bachelor’s Degree
    • Minimum of 5 years post-NYSC professional experience
    • Proven experience with data migration from PowerMax 8500 to VMAX 3
    • Strong working knowledge of VMware and Unix (M6) environments
    • Hands-on experience with large-scale storage migrations, including migration of approximately 449 LUNs.
    • Strong experience in storage like Dell, Fortinet, Veritas, HP.

    go to method of application »

    Linux Engineer (RedHat)

    Job Description

    • RedHat, Oracle Enterprise Linux and Solaris operating system installation.
    • Operating system hardening and configuration.
    • Break and fix.
    • Capacity optimization and reporting.
    • Observability and monitoring of infrastructure.
    • Service management operations, includes - incident, request, problem and change implementations.
    • Host storage sub-system administration and migration.
    • Platform automation and scripting.
    • Package and repository management.
    • System patch and vulnerability remediation.
    • Platform management utilizing tools such as RedHat Satellite and Ansible Automation Platform.
    • Engineered system administration, such as Oracle Sparc M6 and Exadata.
    • Virtualized platform administration such as Oracle Virtual Machine Manager, KVM and VMWare VCenter.
    • Business reporting and presentation.
    • Customer engagement and troubleshoot sessions.
    • Platform upgrade and migration.
    • Research and development.
    • Business tasks reporting.

    Scope

    • Patching: This activity is to address swiftly vulnerable hosts in the Unix ecosystem. It also includes vulnerability remediation to mitigate security attack surfaces identified and improve system performance by addressing known system bugs.
    • Operating System Conversion: This activity is for the conversion of Oracle Enterprise Linux to RedHat Enterprise Linux systems respectively for operating system consolidation and get RedHat subscription coverage.
    • RedHat Satellite Registration: This is consolidation of all RedHat Enterprise Linux footprints on centralised management system – RedHat Satellite. This centralizes package, patch, jobs execution and management.
    • Operating System Upgrade: This activity aims at upgrade of RedHat Enterprise Linux 7.9 to 8.10 respectively. This assures environment being security compliant and within support.

    Key Responsibilities

    • Lead and support the migration from Oracle Enterprise Linux (OEL) to Red Hat Enterprise Linux (RHEL).
    • Integrate Linux hosts with RedHat Satellite for centralized management.
    • Perform advanced troubleshooting of Linux operating systems and applications.
    • Automate routine tasks using tools like Ansible.
    • Apply ITIL processes (change, incident, problem management) in daily operations.
    • Collaborate with cross-functional teams to ensure seamless infrastructure upgrades and transparent system migrations.

    Required Skills & Qualifications

    • Strong proficiency in Linux system administration (RHEL preferred).
    • Experience with RedHat Satellite, Ansible, and shell scripting (Bash, Python).
    • Familiarity with network services: DNS, NFS, LDAP/Kerberos, Apache, NTP.
    • Analytical mindset with strong problem-solving capabilities.
    • Excellent communication and teamwork skills.
    • Certifications such as RHCE, RHCSA, or ITIL are advantageous

    Method of Application

    Interested and qualified candidates should send their CV in PDF to: faitho@gvapartners.com and tisea@gvapartners.com and copy contact@gvapartners.com using the job title as the subject of the email.

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at GVA Partners Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
 
Send your application through

GmailGmail YahoomailYahoomail