datatrota
Signup Login
Home Jobs Blog

Analyst, Security Monitoring at IHS Towers

IHS TowersLagos, Nigeria Cybersecurity
Full Time
For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business and consumer demand for mobile and data. We are the partner of choice for Africa’s and the world’s leading network operators because they demand the widest reach and highest reliability for their customers, and the highest standards of governance and operational excellence for themselves. Our long-term contracts and strong sustainable cash flows mean IHS is a unique, low risk entry point for investment in Africa. Over the last four years, IHS has brought over US$5 billion of investment to the continent. Our belief is that the future economic and social development of Africa will be exponentially accelerated by mobile connectivity, and our team of over 1,000 engineers in five countries is focused on making this happen. We are committed to developing our people and the communities we serve, and to help people and businesses across the region build a powerful, prosperous future - by Africa and for Africa. IHS is Africa’s leading mobile infrastructure company. Founded in 2001 by an experienced team of engineers and business people, IHS serves clients responsibly in the building and managing of effective telecommunications infrastructure and by employing the highest quality people, services and equipment.

Job Summary

  • Assist in reducing information security (IS)-related incidents by continuously monitoring and identifying threats to end-user applications, networks, systems, and other access routes to other assets (including prevention/ detection, email/ spam filtering, web filtering). 
  • Ensure intelligent reporting and fine-tuning of file integrity monitor, Network Access Control (NAC), firewall, and Security Operations Centre (SOC) rules.
  • Ensure sufficient trails are maintained, retained and retrievable for forensic analyses and investigation.
  • Implement logging policies across different layers of systems and across enterprise platforms.
  • Assist in creating intelligent alerting based on risk scenarios.
  • Implement and manage the log retention policy across multiple platforms and systems.
  • Review logs/ alerts (closed-opened) and reports of all in-place security and infrastructure devices.
  • Handle direct scheduling and ad hoc security and compliance reporting.
  • Assist in coordinating compliance efforts across the business.
  • Participate in developing enterprise security policies, standards and baselines.
  • Keep abreast of new/ revised or improved security solutions, processes and development of new threats and attack vectors.
  • Keep abreast of SOC regulatory standards.
  • Participate in the deployment of tested security patches and updates.
  • Conduct security tool selection, pilot and implementation.
  • Maintain the SOC awareness program.
  • Communicate SOC action plans and security bulletins.
  • Identify, investigate and resolve security breaches detected by installed security solutions.
  • Make suggestions to implement projects that increase security and ensure the highest quality of service.
  • Perform other tasks and duties as assigned by the Senior Specialist, Security & Risk Monitoring.

Qualifications

  • Bachelor’s and/or Advanced Degree in Computer Science or any related disciplines.
  • +2-3 years’ relevant experience in Information Security or any Information Risk/Control/Audit role, with at least 1 years in security monitoring and solutions deployment.
  • Experienced in monitoring and correlating incidents and events noted from disparate security solutions.
  • Knowledge of SOX security monitoring requirements and reporting.
  • Demonstrate knowledge in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
  • Demonstrate knowledge with network security and networking technologies as well with systems, security, and network monitoring tools.
  • Demonstrate knowledge with web-related technologies (web applications, web services, service-oriented architectures), and network/ web-related protocols.
  • Demonstrate knowledge of security monitoring frameworks or standards.

Method of Application

Signup to view application details. Signup Now

More jobs like this

X

Send this job to a friend