Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 28, 2020
    Deadline: Mar 6, 2020
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    The African Guarantee Fund for Small and Medium-sized Enterprises (AGF) is incorporated and licensed in Mauritius as a limited liability company and has its office of operation in Nairobi, Kenya. Its products and services provide financial institutions with the means which they can leverage in bringing their African SME financing interventions to the requ...
    Read more about this company

     

    Information Security Consultant

    AGF’s primary mandate is to assist financial institutions (FIs) in Africa to scale up their SME financing through the provision of partial loan guarantees and capacity development assistance. It seeks to bridge the financing gap between financial institutions and SMEs across the continent. AGF products and services provide FIs with the means, which they can leverage in bringing their African SME financing interventions to the required scale.  
     
    AGF contributes to the promotion of economic development, vital for prosperity, stability and poverty reduction in Africa through two lines of activity:  
     
    a. Provision of a mix of financial guarantees and other products, which reduce the risks   sustained   by   FIs   when   lending   to   SMEs   that   have insufficient collateral. These guarantees contribute to reduce the inability of SMEs to   provide   acceptable guarantees   required by   FIs   prior to lending.  b. Support for capacity development of the partner FIs to enhance their capacity to appropriately assess loan requests from SMEs and to mitigate risks associated with the guarantee.  
     
    AGF operates according to market principles and is a commercially viable venture with operations in 40 countries in Africa and is gradually expanding to other countries to cover the whole of Africa.  
     
    AGF is rated ‘AA- ‘by globally renowned Fitch Ratings Agency.
     

    OBJECTIVE OF ASSIGNMENT
     
    The objective is to recruit an information security consultant in order to perform a full ICT (Information, Communication and Technology) and cybersecurity risk assessment and make appropriate recommendations to improve the current systems and policies in accordance with internationally recognized standards and practices.   
     
    SCOPE OF WORK
     
    Description

     
    The Information Security consultant is responsible for understanding and responding to threats to the security of all information, networks, and computer systems, whether on premise or cloud. The individual taking the role will monitor a variety of services and tools (including firewalls, internal account activity tools and threat information services) in order to predict, detect and diagnose threats and direct or participate in the mitigation of these threats to the business together with the ICT team and Internal Control Team.
     
    Responsibilities
     
    Information Security Consultant would be responsible for the following:
     

    • Monitor information systems, computers and networks to detect and respond to cyber threats and finally to remediate information security threats and vulnerabilities.
    • Analyze, design, and facilitate capabilities, solutions, or preventative/remediation controls to protect proprietary/confidential data and systems in accordance with industry standards and governance/compliance requirements.
    • Review the current procedures in information security, Technical Incident Response Planning and Business Continuity Planning and advice whether they require revision.
    • Synthesize solution design, architectural patterns, policy and regulatory frameworks, privacy considerations, and risks in the creation of holistic solutions that span technologies and capabilities.
    • Support the front-line defense of networks, protecting information from unauthorized access and violations. Analyze and assess potential security risks, develop plans to deal with such incidents by putting in place measures such as firewall, IPS encryption, monitoring and auditing systems for abnormal activity, and executing corrective actions.
    • Prepare technical reports.
    • Carry out tests on a system to expose weaknesses in security. Essentially, do everything a hacker would do, but do it on behalf of the organization who owns the network, for example, access information without usernames and passwords, and  try to break through whatever security applications are in place. Report findings and then suggest what upgrades/solutions to be implemented
    • Analyze computer and server logs and uncover links between events, groups and individuals through pursuit of data trails
    • Work across different operating system platforms and technologies to design holistic security designs that treat identified risks and enable strategic and/or tactical business or IT solutions
    • Research/investigate emerging business application security topics, threats, capabilities, and solution options to create/update policy and governance, technology strategies, solution architecture, and vulnerability assessments
    • Apply industry standard risk management technique and knowledge across various business application security capabilities, that is , technical, application, data and mobile to determine effectiveness of controls and to create action plans that remediate identified risks
    • Apply broad-based knowledge of security technologies with an in-depth/specialized knowledge of security tools like Nmap, Open VAS, Snort, Wireshark, Kali Linux etc.
    • Apply systems analysis techniques, including consultations with users to determine security specifications
    • Suggest and provide advice on the best solutions to backup sensitive and confidential data on the cloud for disaster recovery

     
    COMPETENCIES

    • Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions.
    • Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner that engages the audience and helps them understand and retain the message.
    • Exercising Judgment and Decision Making: Use effective approaches for choosing a course of action or developing appropriate solutions; recommend or take action that is consistent with available facts, constraints and probable consequences.
    • Technical and Professional Knowledge: Demonstrate a satisfactory level of technical and professional skill or knowledge in position-related areas; remains current with developments and trends in areas of expertise.
    • Building Effective Relationships: Develop and use collaborative relationships to facilitate the accomplishment of work goals.
    • Client Focus: Make internal and external clients and their needs a primary focus of actions; develop and sustain productive client relationships.
    • Demonstrated ability to describe non-functional requirements and translate into architecture constraints.
    • Experience with banking and financial systems and business processes.

    WORK EXPERIENCE

    • Minimum ten (10) years of experience working daily with network or host-based threat detection technologies.
    • Must be pro-active and a self-starter as this position requires a lot of independent work.
    • Knowledge of networking technologies and protocols, including Ethernet, VLANs, TCP/IP and routing.
    • Experience with security technologies including: Vulnerability Scanning, Firewalls & Log Analysis, Host-based detection tools, Security Event and Incident Management (SEIM), Antivirus, Network Packet Analyzers, malware analysis and forensics tools.
    • Experience in analyzing audit logs, router logs, firewall logs, IDS logs and TCP/IP headers.

    REPORTING REQUIREMENTS/DELIVERABLES
     

    The Information Security Consultant will need the following reporting requirements/deliverables, but not limited to:

    • Inception report. The inception report should mainly include: how the firm understands/interprets the ToRs; any additions/clarifications to the ToRs; a refined methodology to be adopted; action plan; expectations from AGF; and the preferred payment schedule. 
    • Work plan of the security assessment.  
    • Progress reports. 
    • Vulnerability assessment technical review report. 
    • Technical Incident Response review report
    • Business Continuity review report.
    • Cybersecurity policy and procedure
    • Any other Report, as required.

    CONFIDENTIALITY
     
    By accepting to take part in the invitation, you agree to keep in confidence all information provided to you, whether written or oral, in relation to the invitation and/or in relation to the organization’s business generally which is not already in the public domain, to use it only for the purposes of this bid and for no other reason and not to disclose any of the said information to any third party.

    Method of Application

    Please submit (through the email below) your Technical Proposals (including CVs of proposed staff), Financial Proposal (including proposed payment schedules) to the following address, on or before March 6, 2020. In case of any clarification, please channel them through the same email address.                           
    Email Subject Line: “IT Security Consultant Application”  

    Email: reception@africanguaranteefund.com     
     
     

    Build your CV for free. Download in different templates.

  • Apply Now
  • Send your application

    View All Vacancies at African Guarantee Fund (AGF) Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail