JOB ROLE/ PURPOSE:
Implement and maintain ICT security controls to safeguard the Authority’s Information Technology systems and infrastructure against security risks
PRINCIPLE ACCOUNTABILITIES
1. Participate in the design & building of the URA’s information security architecture in support of the URA’s mission
a) Engage key stakeholders to elicit security requirements adequate to provide assurance of security
b) Evaluate the efficacy of existing security controls & provide expert advisory services in this regard
c) Carry out threat modelling and security reviews for Software Development projects
d) Assist in developing information security policies, standards & guidelines
e) Provide input into the development of URA’s IT Security Strategy
2. Support & maintain Information security solutions to ensure their continued efficacy
a) Test, deploy, maintain, review and administer the infrastructure hardware and software that are required to effectively manage network defenses.
b) Install, config, troubleshoot and maintain server security configurations to ensure their confidentiality, integrity, and availability.
c) Work with other teams to ensure good security practice is followed during deployments
3. Identify, analyse and mitigate threats to URA’s IT Infrastructure
a) Carry out vulnerability assessments & penetration testing to establish the effectiveness of internal controls
b) Use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
c) Analyze digital evidence and investigate security incidents to derive useful information in support of system/network vulnerability mitigation and investigations.
d) Keep abreast with emerging industry security threats that could potentially impact URA’s IT Infrastructure & work towards strengthening URA’s security posture
4. Facilitate information security awareness programs
a) Provide input into the security awareness content
b) Conduct security awareness training using various channels
c) Conduct phishing assessments and other testing to ascertain level of awareness among different categories of staff
PERSON SPECIFICATIONS
Essential Requirements
a) An honors Bachelor’s Degree in IT/Computer Science or related technical science degree from a recognised University.
b) At least 2 years’ experience in security, network administration, software development role gained in a complex IT environment
Desirable Requirements
a) Information Security Certification Such as; CISSP, CSSLP, CEH, Security+, Any GIAC, OSCP, CCSA, CCNA or other Vendor Specific InfoSec Certification
b) Certification in ITIL, LPI
c) Experience in managing Web or Network Firewalls
d) Experience in threat Modelling & Secure SDLC
e) Experience in maintenance of Network Infrastructure
f) Experience in penetration testing & vulnerability assessments of network, web or mobile platforms
g) Experience in digital forensics & incident response
h) Experience in installing & Securing Server Infrastructure
Knowledge
SPECIAL SKILLS AND ATTRIBUTES
a) Skill in applying security controls.
b) Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
c) Skill in performing packet-level analysis.
d) Skill in technical writing.
e) Skill in writing about facts and ideas in a clear, convincing, and organized manner.
f) Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.
g) Ability to answer questions in a clear and concise manner.
h) Ability to ask clarifying questions.
i) Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
j) Ability to communicate effectively when writing.
k) Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
l) Ability to operate common network tools (e.g., ping, traceroute, nslookup)
m) Ability to execute OS command line (e.g., ipconfig, netstat, dir, powershell)