Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities. GVA Partners is also a leading name within the recruitment industry. We have built our reputation on over the years by understanding the markets, businesses and individuals within the markets we work with and this has enabled us to deliver seamless and comprehensive recruitment solutions Our Value Proposition GVA’s unique value proposition is our familiarity with both global and local business environment and depth of expertise of our consultants. Our consultants have deep industry experience and have worked in various roles as project managers, solutions architect, business analysts, product developers, strategy consultants and have over the years assisted global clients in delivering market changing solutions. We typically resource all engagements with personnel that have gained direct and related experience from similar assignments. Our approach takes an industry focus by working with business owners to solve their toughest challenges through applied innovation backed by skilled resources, deep strategic alliances and full spectrum delivery across strategy, implementation management and operations. GVA has always been known for foresight, resilience and impact. We are known for our deep industry and functional expertise and we employ a practical approach to build capabilities and deliver real impacts. Our clients expect exceptional results and we succeed by being integral to their success.
Job description
- An exciting opportunity exists for a highly skilled IT security engineer to join a dynamic project team. The resource shall be responsible for the following
- Carry out procedural system maintenance on all IT systems.
- Ensure all networks including but not limited to LAN, MAN, WAN, GAN meets the demand of the company.
- Troubleshoot system and network problems, diagnosing and solving hardware or software faults and replace parts as required.
- Maintain all IT system work flows.
- Maintain and update all IT Networks.
- Maintain and contribute to the development of IT Network.
- Participate actively in developing, planning and implementing advance IT systems.
- Other duties as assigned.
Functions:
- Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
- Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
- Lead the implementation of Information Security projects
- Drive internal and external vulnerability assessment, penetration tests engagements and manage results to remediation.
- Respond to escalated security events and drive security incident response processes to ensure timely resolution with minimal disruption.
- Design, document, and deploy secure infrastructure solutions to enhance and evolve the security posture of the business to ensure integrity, availability and confidentiality of all critical enterprise data.
- Provide expertise on security tools, including but not limited to firewalls, Web Application firewalls, IDS/IDP, anti-malware software
- Liaise with stakeholders in respect of operational implementation of security policies and best practices
- Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risks and adverse impact to servers, workstations and user productivity.
- Implement the infrastructure, configurations and processes to monitor security related events
- Prevent data loss and service interruptions by researching new technologies that will effectively protect the enterprise network.
- Guard all company data, particularly sensitive data, from both internal and external threats by designing broad defenses against would-be intruders
- Take the lead on day-to-day monitoring for unusual activities, implement defensive protocols, and report incidents
- Collaborate with other members of the cybersecurity team to develop new protocols, layers of protection, and other both proactive and defensive systems that stay one step ahead of cyber criminals
- Maintain security guidelines, procedures, standards and controls documentation
- Maintain a working knowledge of current cybercrime tactics
- Supervisory/Managerial responsibilities:
- Ensure conformance to Cybersecurity Blueprint/Roadmap
- Provide inputs to company strategic plan on all initiatives to ensure that Security gaps/vulnerabilities are identified & closed
- Establish and ensure credibility through strong relationships, value-add to operations and professionalism
Experience:
- 3 - 5 years’ experience in an area of Security specialisation; with experience working with others
- Experience working in a Large organization and preferably in the Telecommunications industry
- Strong background as an Engineer/Architect in application security infrastructure and various network technologies to include devices such as firewalls, VPN, intrusion/extrusion detection, vulnerability & risk assessment tools, encryption technologies, virus/worm/malware prevention, E-business and web application technologies, Data Loss Prevention, whole disk & device encryption solutions, two-factor authentication, common Windows (desktop & server) platforms,
- Experience with Microsoft, Solaris, Unix, Oracle and MS SQL
- Experience working in telecommunications industry
- Managing network and / or network security
- Knowledge should be current with information security best practices and global trends
- Knowledge of security best practices such as; defense in-depth, least privileges, need-to-know, separation of duties, access controls, encryption
- User account identity, authorization and authentication management.
- Security incident and event management
- Experience in researching new or emerging technologies and processes that may be incorporated as solutions to reoccurring security concern
Method of Application
Signup to view application details.
Signup Now