datatrota
Signup Login
Home Jobs Blog

IT Security Administrator at Oando

OandoLagos, Nigeria Networking and Tech Support
Full Time
Oando PLC is one of Africa’s largest integrated energy solutions providers with a proud heritage. It has a primary listing on the Nigerian Stock Exchange and a secondary listing on the Johannesburg Stock Exchange. With shared values of Teamwork, Respect, Integrity, Passion and Professionalism (TRIPP), the Oando Group comprises six companies who are leaders in their market.

Overall Purpose of Job:

The Security Administrator’s role is to ensure the stability and integrity of in-house data and voice network services. This is achieved by planning, designing, developing and administering network, voice, security systems and services across the organization. In addition, the Security Administrator will be responsible for the installation, monitoring, maintenance, support, and optimization of all network hardware, network software, firewalls, endpoint protection systems, Unified Threat Management (UTM), videoconference and communication links across all Oando locations.

Responsibilities:

  • Design, Implement, maintain and enforce policies and associated plans for system security administration, and user system access based on industry-standard best practices
  • Monitor reports, systems, logs and alerts for suspicious activity on the enterprise and recommend ways to control and reduce risk
  • Seeks avenues to further integrate security into application and solution designs in line with best practices
  • Conduct technology diagnosis of current digital threats; refines and implements IT data security plan according to established timelines
  • Assist the IT Security Lead in driving the development, implementation, and maintenance of IT security solutions including firewalls, anti-virus solutions, and intrusion detection/prevention systems
  • Establishes, maintains and corrects access rules across all IT systems and network infrastructure
  • Maintains up-to-date knowledge of available and emerging network, security and microcomputer technologies through professional reading, and professional development (training, education, and participation in professional associations)
  • Evaluates information risk and potential vulnerabilities on a regular time schedule and works with the Productivity coaches to promote information security awareness through user training and education
  • Collaborate with other administrators in the evaluation of new software and hardware systems, particularly as they relate to security
  • Provides recommendations on mitigating or removing vulnerabilities within IT systems, while administering enterprise security solutions
  • Conducts vulnerability assessments and implement remediation to improve security standards and procedures within the organization that support strategic, tactical and operational objectives
  • Ensures network (telecommunications, local and voice) security access and protects against unauthorized access, modification or destruction
  • Collaborate effectively with the systems and network administrators to maintain a healthy enterprise security posture across all IT solutions
  • Educates, trains, and supports end-users and IT staff members on gaining security practice and procedure knowledge on areas including, enterprise platforms and evolving threats
  • Evaluate vendor products in hardware, software, security and telecommunications equipment and recommend purchases consistent with the organization’s short and long term objectives
  • Perform regular monitoring of the enterprise to detect and/or prevent security violations; recommend
  • Provide network administrative support in network architecture and technical configuration management
  • Conduct systems validation and testing (including hardware compatibility management, compute sizing and allocation, load testing, configuration testing of all technology solutions and adequate compute and storage capacity exist to support projected business workloads; proactively manage systems workload for optimal end user experience
  • Interface with Applications Specialists, DBAs and Internal Audit in ensuring all identified systems vulnerabilities and bugs and remediated in a timely manner
  • Supervise Level 2 support, vendors and third-party contractors ensuring automation and maintenance methodologies aligns to availability and quality baselines
  • Evaluate, report and suggest new ideas to related to identifying and closing security loopholes within the enterprise
  • Perform other duties as may be assigned by IT Security Lead
  • Assist the IT Security Lead in coordinating all security operational activities which include security issue diagnosis, perimeter and critical system penetration testing projects, assessment of security weakness for mitigation effectiveness, assessment of desired operational and generation of initiatives to achieve an optimal model aimed at improving incident response
  • Assist the IT Security Lead in project design, operation and transition in line with ITIL framework

Key Performance Indicators:

  • % of service availability per SLA negotiated
  • Uptime of enterprise systems and network infrastructure
  • Quality of technical advice and solutions to systems problems and issues
  • Quality of disaster recovery procedures / contingency plans
  • Time taken to resolve calls
  • Completeness and effectiveness of contracts signed with Service providers
  • Teamwork displayed
  • Quality of security procedures / contingency plans i.e. level of data theft/breach
  • Mean Time to repair lost services
  • % reduction in service failure due to security breaches within the financial year
  • Number of identified critical systems bugs and vulnerabilities
  • Quality and completeness of Security Systems design
  • Customer Satisfaction %age score
  • Effectiveness of Security Controls

Person Specification:

  • 1st degree in Computer Science, Engineering, or other related area
  • 3 – 5 years cognate work experience, in a reputable organization/Institution
  • Experience with Systems Planning & Design Background
  • Experience in system and network design in a large scale data processing environment
  • Familiar with a variety of security concepts, practices and procedures
  • Certified Networks and Security Administrator
  • Extensive Network Access Control design, administration and policy enforcement
  • Experience with troubleshooting & resolving complex technical problems, writing reports and creating documentation (processes and procedures, configuration baselines, technical schematics)
  • Project Management is an added advantage
  • ITIL Foundation certified
  • CCNP Certification is an added advantage
  • CISSP Certification is an added advantage

Required Competencies:

  • Oil & Gas Industry Dynamics
  • Products Knowledge
  • Enterprise Systems Administration
  • Sound knowledge and Certified Professional in Designing Systems and Networks
  • Proficient in the use of Security and Access Administration tools (Cisco ISE, QualysGuard, Cyberoam, MacAfee Threat Mgt, Cisco Intrusion Prevention Systems, Email Gateway Appliance)
  • Proficient in the use of Advanced Network & Security Monitoring Tools ( Cisco Prime, QRadar SIEM)
  • ITIL Service Management
  • Knowledge of Networking/Routing and Windows Enterprise Systems
  • Customer Focus/Service Orientation
  • Excellent technical support documentation skills
  • Problem solving, Quality Focus, Technical Understanding
  • Oral and Written Communication
  • Project Management
  • Oral and Written Communication
  • Project Management

Method of Application

Signup to view application details. Signup Now
X

Send this job to a friend