For 15 years we have been building and managing telecommunications towers that are the essential backbone of mobile telecommunications in Africa - the leapfrog technology driving economic development, prosperity and self-sufficiency across the continent. Right now, IHS is leading a new telecoms service sector driven by the growth of middle class business and consumer demand for mobile and data. We are the partner of choice for Africa’s and the world’s leading network operators because they demand the widest reach and highest reliability for their customers, and the highest standards of governance and operational excellence for themselves. Our long-term contracts and strong sustainable cash flows mean IHS is a unique, low risk entry point for investment in Africa. Over the last four years, IHS has brought over US$5 billion of investment to the continent. Our belief is that the future economic and social development of Africa will be exponentially accelerated by mobile connectivity, and our team of over 1,000 engineers in five countries is focused on making this happen. We are committed to developing our people and the communities we serve, and to help people and businesses across the region build a powerful, prosperous future - by Africa and for Africa. IHS is Africa’s leading mobile infrastructure company. Founded in 2001 by an experienced team of engineers and business people, IHS serves clients responsibly in the building and managing of effective telecommunications infrastructure and by employing the highest quality people, services and equipment.
Job Description
- Ensure intelligent reporting and fine-tuning of file integrity monitor, Network Access Control (NAC), firewall and Security Operations Centre (SOC) rules.
- Create scenario-based risk intelligent rules.
- Ensure that sufficient trails are maintained, retained and retrievable for forensic analysis and investigation.
- Implement logging policies across different layers of systems and across enterprise platforms.
- Create intelligent alerting based on risk scenarios.
- Implement and manage log retention policy across multiple platform and systems.
- Review logs/ alerts (closed-opened) and reports of all in-place security and infrastructural devices.
- Direct scheduling and ad-hoc security and compliance reporting.
- Monitor team members for alerts tracking.
- Network with other internal organizations to ensure coordination of compliance efforts.
- Participate in the creation of enterprise security policies, standards, and baselines.
- Provide support for the monitoring team as well as security incident and events management solution logging requirements and integration.
- Keep abreast of new/revised or improved security solutions, processes and development of new threats and attack vectors.
- Keep abreast of SOC regulatory standards.
- Participate in the deployment of tested security patches and updates.
- Conduct security tool selection, pilot and implementation.
- Maintain SOC awareness program.
- Communicate SOC action plans and security bulletins.
- Identify, investigate and resolve security breaches detected by installed security solutions.
- Make suggestions to implement projects that increase security and ensure the highest quality of service
- Perform other functions as assigned by the Senior Manager, IT Security Operations.
Qualifications
Functional:
- IT Operations
- Incident Management
- Security Assessments
- Security Monitoring & Reporting
- Vulnerability Lifecycle Management
- Continuity & Disaster Recovery
- Business Communication
- Security Solutions Deployment
Behavioral:
- Collaboration & Teamwork
- Be Bold
- Customer Focus
- Innovation
- Integrity
Qualification
- Bachelor’s and/or Advanced degree in Computer Science or any related disciplines.
- +7 years’ relevant experience in IS, with at least 4 years in security monitoring and solutions deployment.
- Hands-on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
- Demonstrable experience with network security and networking technologies as well with systems, security, and network monitoring tools.
- Demonstrable familiarity with web-related technologies (web applications, web services, service-oriented architectures), and network/ web-related protocols.
- Thorough understanding of the latest security principles, techniques, and protocols
- Problem solving skills and ability to work under pressure.
Method of Application
Signup to view application details.
Signup Now