9 Payment Service Bank (9PSB) is your one-stop fully digital bank. Take off the limits, transact with your phone number, NUBAN or QR, whatever works for you. 9PSB is made for everybody. No need to visit a physical bank.
JOB SUMMARY
- The Head, IT Infrastructure provides strategic direction for the organization’s technical infrastructure and security (including hardware, software, servers, databases, storage solutions, networks, audiovisual equipment or physical facilities) in support of critical business needs and continually aligns priorities and plans with business objectives. He also serves to ensure assurance activities related to the availability, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies.
ROLES AND RESPONSIBILTIES
- Provide leadership to the enterprise information technology infrastructure operation
- The Director will oversee the selection, development, deployment, monitoring, maintenance, and enhancement of the district’s technology infrastructure.
- Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
- Liase with industry partners and regulators on issue bothering on information security and cybersecurity.
- Liaise with security team on the implementation and enforcement of IT standards and blue prints
- Ensure Vulnerability Assessment is done on the entire infrastructure of the bank. Uses methods and tools to conduct vulnerability assessments, testing internal and external network perimeters for accessibility.
- Stays current in technology trends and proactively provides technology recommendations.
- Develop, schedule, test and communicate the IT Disaster Recovery plan and Procedures.
- Collaborate with the Head, IT on the evaluation, allocation, and management of physical and financial resources and administer the hiring, development/training, management, evaluation, and effective assignment of personnel.
- Information Security - Monitoring - Perform IT risk assessments, audits, and security incident investigations
- Perform detailed analysis of the IT Security requirements and current state.
- Works with internal and external auditors to ensure compliance with adopted IT policy and procedures, and legislation related to data privacy or security provisions in safeguarding specific information. d. Facilitates migration of non-compliant environments to compliant environments based on legal requirements, audit findings and risk assessment recommendations.
- A proven track record in developing information security policies, privacy policies, and procedures, and successful execution
- Extensive knowledge of business risk, risk assessment and risk-based decision making
- Technical acumen including but not limited to: OSI, IT infrastructure, cloud, application development languages, tools and frameworks, database technologies, web technologies, next gen mobile, network architecture, enterprise architecture, and directory services
- Security technology acumen and experience including but not limited to: firewall, intrusion detection, cyber-attack tools and defenses, encryption, certificate authority, web filtering, antimalware, anti-phishing, identity and access management, multi factor authentication.
- Ability to evangelize IT security to make it a critical part of business operations; build trust and respect for the security function
MINIMUM EDUCATION AND EXPERIENCE REQUIRED
The ideal candidate for this role must possess the following competencies and qualification:
- Degree in business administration or a technology-related field required.
- Professional security management certification
- Minimum of ten years of experience in a combination of infrastructure, risk management, information security and IT jobs
- Knowledge of common information security management frameworks, such as ISO/IEC 27001, and NIST.
- Excellent written and verbal communication skills and high level of personal integrity
- Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
- Experience with contract and vendor negotiations and management including managed services.
- Specific experience in Agile (scaled) software development or other best in class development practices.
- Experience with Cloud computing/Elastic computing across virtualized environments.
- Relevant certifications in Information Security and Cybersecurity space, including CISSP, CISM, CCISO, ISO 27001 Implementer.
- Membership of relevant professional bodies including ISACA.
Method of Application
Signup to view application details.
Signup Now