Senior Security Manager

Senior Security Manager

Duty Station Kampala, Uganda
Positions One

Responsibilities

  • Technical in-depth understanding of network architecture and concepts, application architecture, and interoperability of these architectures with one another.
  • Technical understanding of computer and network forensics, system and network security, incident management, intrusion detection, vulnerability and patch management, log analysis, and related technologies.
  • Demonstrated ability to work well on collaborative, cross-functional teams. Solid interpersonal skills with the ability to work effectively with people of all levels of information technology expertise with a wide range of constituencies and organizational relationships.
  • Excellent analytical and data gathering skills
  • Demonstrated ability to conduct risk assessments, audits, and reviews.
  • Managing all aspects of the information security system, including researching, testing, training, and implementing programs designed to safeguard sensitive information from any possible breaches.
  • Developing and implementing an information security program, which includes procedures and policies designed to protect the company’s communications, programs, systems, and assets from both internal and external threats.
  • Ensures that viruses, spyware, bots, or other harmful programs are not used to compromise the computer system.
  • Ensures that the policies regarding the use and security of ICT systems are adhered to by all users.
  • Working with those who are unfamiliar with information systems and to help them understand how to maintain them.
  • Developing awareness programs to staff about the need for information security.
  • Monitoring the IT system to look for threats to security, establish protocols for identifying and neutralizing threats, and maintaining updated anti-virus software to block threats.
  • Responsible for setting the computer usage protocols, for facilitating training on minimizing threats to the IT system, and for determining which types of software should be used.
  • Investigate cases where the IT system has been compromised and take the appropriate action to resolve the problem.
  • Attending regular continuing education courses to stay abreast of rapidly changing technology and threats.
  • Participating in specific Risk Management, Business Continuity, and Disaster Recovery activities.
  • Any other work as assigned by the supervisor
  • Technical in-depth understanding of network architecture and concepts, application architecture, and interoperability of these architectures with one another.
  • Technical understanding of computer and network forensics, system and network security, incident management, intrusion detection, vulnerability and patch management, log analysis, and related technologies.
  • Demonstrated ability to work well on collaborative, cross-functional teams. Solid interpersonal skills with ability to work effectively with people of all levels of information technology expertise with a wide range of constituencies and organizational relationships.
  • Excellent analytical and data gathering skills

Qualifications

  • Bachelor’s Degree in Computer Science, computer programming, computer engineering, Information Systems, or its equivalent in ICT.
  • Must be a certified ICT professional (possesses relevant certification like CISSP, CISM or CISA,CEH).
  • Minimum of 5 years’ experience in a similar position in a reputable organization.
  • Knowledge in UNIX, Linux, and Windows operating systems.

Previous experience working in a computer-related position, such as a computer technician, a network administrator, or a systems administrator, IT Audits is an added advantage.

How to apply Send your CV to [email protected]

 

Apply for this position

Allowed Type(s): .pdf, .doc, .docx, .rtf
×

Hello!

Click one of our representatives below to chat on WhatsApp or send us an email to [email protected]

× How can I help you?