Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: May 30, 2022
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    Equity Bank Limited (The "Bank”) is incorporated, registered under the Kenyan Companies Act Cap 486 and domiciled in Kenya. The address of the Bank’s registered office is 9th Floor, Equity Centre, P.O. Box 75104 - 00200 Nairobi. The Bank is licensed under the Kenya Banking Act (Chapter 488), and continues to offer retail banking, microfinance a...
    Read more about this company

     

    IAM & 3rd Party Security Specialist

    Job Purpose: 

    The role holder will be responsible for overseeing the identity and access management assurance. Additionally, the holder will also provide 3rd Party Management assurance and recommending relevant controls for implementation to mitigate on risks identified.

    Qualifications
     
    Job Responsibilities: 

    • Analyze user access roles, permissions, and profiles to establish user provisioning within all Bank applications.
    • Work closely with Application, System, and Network Engineers to solicit existing rules and standards, and identify and implement best practices for user access management.
    • Assist with employee user account provisioning and de-provisioning, including Active Directory and Office 365 licenses.
    • Collaborate with IT teams to establish and maintain user IDs, roles, and permission sets across all applications.
    • Participate in revisions and updates of Internal Controls.
    • Assist auditors and develop reporting options to elaborate and clarify findings.
    • Interact with the Information Security team to identify and address potential concerns and necessary remediations connected to Identity Access Management (IAM).
    • Lead the Access Management workstream including review of applications access rights, role definitions etc.
    • Responsible for carrying out an identity and access management gap analysis against industry good practice
    • Define the IAM standards required for compliance.
    • Develop and implement procedures, process definition, training, and assuring quality in an IAM development environment
    • Design the scope of work and road map for access management in order to achieve full data protection requirements; it must also support ISO 27001 compliance for Information Security
    • Support all Third-Party Risk Management (TPRM) activities to proactively identify, evaluate, and mitigate cyber security and operational risks.
    • Establish strong partnership with EQUITY stakeholders and support the facilitation and management of the security risk assessment process and monitoring of remediation plans in accordance with the TPRM standard.
    • Track and monitor the status of assessments and communicate the status with key stakeholders on a regular basis.
    • Participate in the preparation of third-party risk reports to effectively communicate current residual risk status to business stakeholders.
    • Participate in the timely and accurate notification and escalation of actual or potential risks involving third parties.
    • Support the identification and maintenance an on-going list of all critical suppliers while providing status reporting to key stakeholders.
    • Support the delivery of reporting on all aspects of TPRM performance and effectiveness.
    • Support the continuous assessment of any legal, regulatory, and external certification requirements relating to TPRM.
    • Identify opportunities to improve business resiliency through proactive management of TPRM.
    • Support the collaboration with the global purchasing organization to ensure security requirements are part of the onboarding process and continuously improved based on the ever-changing threat landscape.
    • Support the collaboration with the global legal organization to ensure contractual obligations are met from a security perspective.

    Knowledge and Experience

    • Bachelor’s Degree in Information Technology, Information Security/Assurance, Engineering or similar area of study
    • Certifications such as Cloud Security, CISSP, or CISA as well as technical certifications in Microsoft and Linux platforms, as well as networking such as CCNA, CCNP, or Networking+ are a plus.
    • Minimum 3 years of experience in access management and 3rd Party reviews
    • Knowledge of Identity and Access Management (IAM) principles (least privilege etc).
    • Experience in Big 4 is preferred
    • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
    • Expertise with industry standard frameworks (ISO, NIST, PCI).
    • Risk management experience, preferably within TPRM or cyber security profession.
    • Knowledge of TPRM threat scenarios, security controls, concepts, processes and tools.
    • Knowledge of the National Institute of Standards and Technology (NIST) frameworks and NIST controls applicable to supply chain risk management.
    • Excellent communication and presentation skills, both verbal and in writing and an ability to build a network and to collaborate with various teams.

    Key Critical Competencies

    • Proficient in preparation of reports, dashboards and documentation
    • Excellent communication and leadership skills
    • Experience in performing vendor management
    • Ability to handle high pressure situations with key stakeholders
    • Good Analytical skills, Problem solving and Interpersonal skills
    • Deep knowledge of Bank’s infrastructure, networks and systems

    Role Complexity: 

    • IAM and 3rd Party Management across at least 13 domains in all the Technology functions and in at least 7 markets of Equity Group Budgets/ Financial Input
    • Contribute to ensuring the budgets are adhered to and cost savings on various initiatives.  

    Closing: 13 June 2022

    go to method of application »

    Business Analyst

    Job Purpose 

    The Business Analyst’s role is to elicit, analyze, document, and validate the business needs of stakeholders, be they customers or end-users.

    This includes interviewing stakeholders, gathering and compiling user requirements to understand the technology solutions they need. The Business Analyst will also apply proven communication, analytical and problem-solving skills to help the business make good technology decisions. The Business Analyst will also be proactive by exploring Emerging technologies to optimize business processes. The Business Analyst will play a pivotal role in ensuring IT’s understanding of business requirements. Majorly, the BA acts as the bridge between specific Business Units /subsidiaries and IT Services, planning and coordinating operational activities by maximizing the value provided by systems to that particular business unit or Subsidiary. In addition, work with users to identify ways in which IT services can benefit their business, and define the detail of their requirements in terms of functionality and performance.

    Strategy & Planning

    • Collaborate with project sponsors to determine project scope and vision.
    • Clearly identify project stakeholders and establish user classes, as well as their characteristics.
    • Conduct interviews to gather user requirements via workshops, questionnaires, surveys, site visits, workflow storyboards, use cases, scenarios, and other methods.
    • Identify and establish scope and parameters of requirements analysis on a project-by-project basis to define project impact, outcome criteria, and metrics.
    • Work with stakeholders and project team to prioritize collected requirements.
    • Research, review, and analyse the effectiveness and efficiency of existing requirements gathering processes and develop strategies for enhancing or further leveraging these processes.
    • Maintain an understanding of business processes and their IT needs.
    • Maintain an awareness of current and emerging technologies.
    • Identify opportunities where business objectives can be met by using IT.
    • Develop and manage relationships with business and subsidiary management and assist all levels within the business area to define their overall business requirements.
    • Provide Business units/ Subsidiaries with advice, guidance, and assistance in the identification, selection, testing, and analysis of IT Services’ capabilities.
    • Work with users to define the details of their requirements, in terms of functionality and performance.
    • Support the introduction of new services
    • Documentation design
    • Training IT Services staff
    • Training users and Service Delivery Group
    • Pro-active identification of value-adding IT business solutions for the business units he/she represents.
    • Ensure business requests align with IT strategy and recommend IT solutions that will maximize influence and business processes improvements.
    • Draw out business prioritisation process – assist in ‘making the case’ for funding and supporting stakeholder discussion leading to approval.
    • Represent specific business user constituencies in developing SLAs ensuring that realistic but robust requirements are submitted.
    • Produce systems development specifications in alignment with expressed business needs.
    • Interact within IT Services structure facilitating the understanding of specific requirements and adequate packaging of service for represented Business/Subsidiaries.
    • Monitor overall and Business Unit/Subsidiary specific operational service performance against

    SLAs within specific user constituencies.

    • Monitor overall operational service performance against SLAs and trigger appropriate actions in case of a breach.
    • Monitor overall application and functionality build, ensuring requirements are implemented.
    • Manage key stakeholders in IT and business community and ensure tight alignment of IT initiatives with the business objectives.
    • Coordinate communication strategies with end-users and the business community.
    • Establish (with Business and Technical Solutions) the best technical approach to deliver cost-effective solutions satisfying the business requirements and needs.
    • Monitor specific functionality build, ensuring requirements, budget and calendar are respected.
    • Assist with service release acceptance and user testing.
    • Voice concerns and/or satisfaction of the user community with IT service, effectively creating a continuous improvement circle.

    Formal Qualifications:

    •  First degree in Business or ICT related Discipline; an MBA\CBAP is an added advantage
    • Knowledge of business modelling conventions and/or a mainstream software development framework (e.g. AGILE, CMMI) is an advantage.

    Years of Experience:

    • Minimum of 0 – 5 years IT Service Delivery experience or Minimum of 2 years Technical Account Management and Project Management experience for Financial Services ICT solution Provider

    Required Skills/Experience 

    • Excellent written and oral communication skills.
    • Excellent interpersonal skills.
    • Excellent analytical and problem solving skills.
    • Excellent negotiation skills
    • Strong leadership, people management and supervisory skills

    Essential Knowledge 

    • Business Analysis
    • Financial Services
    • Industry Knowledge
    • Benefit / Value assessment
    • Customer service
    • Decision making
    • Problem solving
    • Relationship development
    • Technical Architecture
    • Hardware
    • Software
    • Networks
    • Requirement Specification
    • Business Technology application
    • Interpersonal relationship management
    • Data gathering
    • Project Lifecycle
    • System Development Lifecycle Methodology
    • Technical Documentation
    • Technology Innovation
    • Process analysis and design
    • Problem solving

    Attributes 

    • Ability to make sound and logical judgments.
    • Demonstrated leadership and personnel/project management skills.
    • Good understanding of the organization’s goals and objectives.
    • Able to conduct research into issues and products as required.
    • Ability to prioritize and execute tasks in a high-pressure environment and make sound decisions in emergency situations.
    • Ability to present ideas in a user-friendly language.
    • Highly self-motivated and directed.
    • Pay attention to detail.
    • Proven analytical and problem-solving abilities.
    • Strong customer service orientation.
    • Experience working in a team-oriented, collaborative environment.

    Closing: 13 June 2022

    go to method of application »

    Senior Specialist, Security Technology Roadmap & COE

    Job Purpose:  

    Senior Security technology specialist provides a demonstrated holistic mastery and in-depth understanding of existing and emerging system, infrastructure and network security technologies in a complex environment and provides guidance on information security processes, controls, and compliance, and information security risk management

    Job Responsibilities/ Accountabilities:

    • Measure the effectiveness of the Advanced Cyber Security & Emerging technologies / controls capabilities to ensure appropriate plans are in place to address lower performance and ineffective practices
    • Evaluates, defines and provides recommendations addressing computer security architecture and infrastructure to address new requirements, emerging advanced network technologies, and changes to communications and IT operations and business processes
    • Manages all aspects of communications security and the development, implementation, interpretation, accreditation, risk management and maintenance of detailed communications security policies, plans, programs, standards and criteria ensuring a successful communications security program
    • Analyse business requirements and security solutions to deliver business appropriate levels of protection
    • Responsible for application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management, Infrastructure and Networks and Auditing, Logging and Compliance)
    • Provide reporting on control status to management
    • Update product standards as needed
    • Proven ability to follow global established standards in digital evidence acquisition and handling, experience with conducting digital investigations and incident responses and experience in managing insider threats and cyber and data exfiltration incidences
    • Support the delivery of the 3 year Cyber security roadmap to maintain and optimize the Advanced Cyber Security & Emerging technologies / controls capability
    • Lead the enhancement and optimization of implemented reporting mechanisms to demonstrate the value of the Advanced Cyber Security & Emerging technologies / controls function with tangible benefits
    • Identifies technical and business opportunities to take advantage of cross project knowledge, best practices and reusability to expedite projects
    • Manage the security posture of IT infrastructure for overseas locations
    • Provide deployment services on enabling new infrastructure capability
    • Follow information security policies, methods, standards, National Institutes of Standard and Technology (NIST) standards and practices to organizational information systems, IT reference materials and interpret regulations
    • Implement security controls, perform ongoing maintenance and prevent, detect, analyze and respond to security incidents
    • Communicate with Information Security Officer, and other IT personnel within the organization and organizational staff
    • Help coordinate the implementation of security programs across all agency platforms
    • Assist with Active Directory access and Group Policies, Internet intrusion detection, Internet filtering, and monitoring of employee access, virtual private networking (LAN/WAN) security
    • Assist and participate with the Senior IT Specialist as an advisor in projects to enhance or develop new IT systems, or to study the feasibility of acquiring new technology

    Strategy:

    • Understand information security trends
    • Document and communicate security solution roadmap to the GM, Enterprise Security Architecture team
    • Document security product and services for each information security domain  
    • Understand all security domain, application, implementation and objectives to the business

    Budgets/ Financial Input

    • Provide budget input and recommendations
    • Provide knowledge business services and product to the security team
    • Consolidate and translate business security needs into finical measurable matrix

    Qualifications

    Knowledge and Experience

    • A Degree or its equivalent in Information Technology, Network Security, Enterprise Network Management, Information Security, Management Information System Computing, Engineering or similar area of study
    • Relevant industry certifications in information security program and governance as well as PMP will be an added advantage
    • Minimum of Eight (3) years of computer information technology experience.
    • Minimum of Four (7) years of experience engineering and designing IT security solutions
    • Good understanding all the information security domains
    • Experience of identifying and managing technology security risk
    • Certification like CISSP, CCSP, CISA, CCISO, SABSA, ISO27001, ISO27301 will be of advantage

    Key Critical Competencies

    • Ability to know when to implement solutions with consideration to the wider impacts i.e. risk, cost, customer impact, timescales, etc.
    • Excellent negotiation, and written and verbal presentation skills
    • Ability to handle high pressure situations with key stakeholders
    • Good Analytical skills, Problem solving and Interpersonal skills
    • Deep knowledge of enterprise application development security controls
    • Good knowledge of Telco convergence business, FinTech network traffic consumption and OpenAPI

    Closing: 13 June 2022

    go to method of application »

    Senior Manager, Senior Security Domain Architect

    Job Purpose:  

    Senior Security Domain Architect will be responsible for the development of enterprise information security architectures and solutions. Develop and review architecture artifacts for Data Security, Infrastructure Security, Active Directory Security, Identity and Access Management, Network Security, IOT, Blockchain Cloud and manage adherence to architecture standards

    Job Responsibilities/ Accountabilities:

    • Provide expert direction in implementing Xylem’s enterprise security architecture strategy for platforms, applications, security services, network security and infrastructure, while considering potential risks in the organization’s current technology deployments, to build a successful and strong enterprise security posture
    • Secure and automate capabilities through collaboration with InfoSec, Compliance, Cyber Defense, Product Security and Engineering resources.
    • Define and advise on the design, implementation and processes necessary to protect information system assets
    • Translate business requirements, risk assessments, high-level policies and controls towards security architecture requirements and designs for existing or new security services and projects on business and IT side.
    • Participate in discussions regarding the high level IT and operational process design and implementation of security in projects
    • Act as a security subject matter expert for Cloud, IOT, Blockahan, IAM, Data and Application, Network, Database and Infrastructure domain
    • Additional knowledge on other domains will be used to assist other Cyber Security Domain Architects covering other security domains (for example mainframe, data, PKI and cryptography, network security, platform security, IAM, application security, devsecops etc.)
    • Your stakeholders are mainly business owners/analysts, project leaders, enterprise architecture, risk management, internal/external auditors and IT engineers, developers and solution designers
    • Responsible for application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management, Infrastructure and Networks and Auditing, Logging and Compliance)
    • Proven ability to follow global established standards in digital evidence acquisition and handling, experience with conducting digital investigations and incident responses and experience in managing insider threats and cyber and data exfiltration incidences
    • Support the delivery of the 3 year Cyber security roadmap to maintain and optimize the Advanced Cyber Security & Emerging technologies / controls capability
    • Lead the enhancement and optimization of implemented reporting mechanisms to demonstrate the value of the Advanced Cyber Security & Emerging technologies / controls function with tangible benefits
    • Follow information security policies, methods, standards, National Institutes of Standard and Technology (NIST) standards and practices to organizational information systems, IT reference materials and interpret regulations
    • Help coordinate the implementation of security programs across all agency platforms
    • Assist with Active Directory access and Group Policies, Internet intrusion detection, Internet filtering, and monitoring of employee access, virtual private networking (LAN/WAN) security
    • Assist and participate with the Senior IT Specialist as an advisor in projects to enhance or develop new IT systems, or to study the feasibility of acquiring new technology

    Strategy:

    • Understand information security domain of Network, Application, Infrastructure, and Database
    • Document and communicate security architecture to the GM, Enterprise Security Architecture team and the Chief Information Security Officer respectively.

    Knowledge and Experience

    • A Degree or its equivalent in Information Technology, Network Security, Enterprise Network Management, Information Security, Management Information System Computing, Engineering or similar area of study
    • Minimum 10+ years of increasingly diverse and complex experience in field of Cybersecurity within a global environment, with at least a minimum of 5+ years in security architecture and network, and infrastructure security
    • Network Security Architecture – Deep technical understanding of designing and securing of both WAN and LAN environments including SD WAN, MPLS, VPN, Segmentation, Micro-Segmentation, Factory Segmentation, Routing and Switching. Routing and Switching design, deployment and Operations
    • Professional certifications such as TOGAF, SABSA or IAF architecture frameworks. CEH, CISA, CCISO, CISSP, GIAC, ISO 27001 LA/LI or specific security product certifications are an asset
    • Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings. Experience designing network security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS service
    • Experience designing, implementing, deploying and operating vulnerability scanning infrastructure and services
    • Experience selecting, testing, and supporting Endpoint Detection and Response technologies
    • Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions
    • Excellent verbal/written communication, collaboration, analytical and presentations
    • Ability to carry high-level conversations; proven ability to present to senior leadership
    • Experience designing and implementing secure architecture and reference architectures; from business requirements gathering to technology rollout oversight, including capacity management, definition of scoring methodologies for technology selection, integration of multiple tools and reporting functionalities, technical documentation
    • Experience and in depth understanding of the latest security principles, application security architecture, security technologies, techniques, standards and protocols.
    • Hands on experience in deploying security technologies such as Next Generation Firewalls, Intrusion Prevention, anti-malware/anti-virus, endpoint security technologies, SIEM, authentication systems, log collection / management, content filtering, Wireless Access controls, Citrix NetScaler, VDI
    • technologies, Network Access Control, identity management technologies, cloud security technologies, data encryption technologies, virtualization security, mobile application security
    • Excellent understanding of Identity and Access Management design and process
    • Excellent understanding of directory services
    • Experience of identifying and managing technology security risk

    Qualifications

    Key Critical Competencies

    • Ability to know when to implement solutions with consideration to the wider impacts i.e. risk, cost, customer impact, timescales, etc.
    • Excellent negotiation, and written and verbal presentation skills
    • Ability to handle high pressure situations with key stakeholders
    • Good Analytical skills, Problem solving and Interpersonal skills
    • Deep knowledge of enterprise application development security controls
    • Good knowledge of Telco convergence business, FinTech network traffic consumption and OpenAPI

    Closing: 13 June 2022

    go to method of application »

    Security Solutions Architect

    Job Purpose: 

    The Senior Security Solutions Architect’s primary responsibility will be to interpret business requirements into a technical security solutions framework and to provide technology roadmaps governed by strategic direction, business requirements as well as resourcing and financial constraints. They will specify and design more complex solutions based on their technical expertise across multiple domains. The Senior Security Solutions Architect’s security solution are optimally implemented to meet desire objectives as well as supervise the team function to archive team deliverables

    Job Responsibilities/ Accountabilities:

    Architecture:

    • Design security solution for delivery
    • Design the security controls plan for cloud and hybrid security
    • Design and optimized use cases for cloud security broker
    • Design cloud data access control, SaaS control and implement
    • Design the process for tracking operating systems like Windows, Linux, and UNIX on cloud hybrid environment
    • Implement External Attack Surface Management Solution
    • Design and implement cloud workload security management
    • Design Critical Public Infrastructures (PKIs), such as Digital Signatures and Certification Authorities (CA) Operation
    • Optimized the security of the container and serverless environment e.g. Kubernetes security
    • Create and operationalized notification for Kubernetes Secret and Key vaulting
    • Design security framework for organization Internet of Things (IOT), 5G control
    • Design security framework and reference architecture for organization blockchain
    • Researching and implementing new security controls
    • Ensure DevOps security is standardized and monitored
    • Ensure DevOps roles and privileges are maintained
    • Proficiency in reading, writing, and auditing programming languages such as Java, Python, C, C#, Scala and the ability to pick up new languages/technologies
    • Provide security reviews for the acquisition, installation, fielding, training, and operation of various products to include hardware, software, and licenses

    Strategy:

    • Understand information security trends
    • Document and communicate security solution roadmap to Head of department and the business

    Qualifications

    Knowledge and Experience

    • A Degree or its equivalent in Information Technology, Network Security, Enterprise Network Management, Information Security, Management Information System Computing, Engineering or similar area of study
    • Relevant industry certifications in information security program and governance as well as PMP will be an added advantage
    • Minimum of two (2) years of computer information technology experience.
    • Minimum of Four (2) years of experience engineering and designing IT security solutions
    • Minimum of 1 year working as a business analyst in technical security and IT
    • Good understanding all the information security domains
    • Experience of identifying and managing technology security risk
    • Certification like CISSP, CISA, CCISO, SABSA will be of advantage

    Key Critical Competencies

    • Ability to know when to implement solutions with consideration to the wider impacts i.e. risk, cost, customer impact, timescales, etc.
    • Excellent negotiation, and written and verbal presentation skills
    • Ability to handle high pressure situations with key stakeholders
    • Good Analytical skills, Problem solving and Interpersonal skills
    • Deep knowledge of enterprise application development security controls
    • Good knowledge of Telco convergence business, FinTech network traffic consumption and OpenAPI

    Closing: 13 June 2022

    go to method of application »

    Assistant Manager, Security Technology Roadmap & COE Specialist

    Job Purpose:  

    Security Technology Specialist provides a demonstrated mastery and in-depth understanding of existing and emerging system, database, infrastructure and network security technologies in a complex network environment

    Job Responsibilities/ Accountabilities:

    • Measure the effectiveness of the Advanced Cyber Security & Emerging technologies / controls capabilities to ensure appropriate plans are in place to address lower performance and ineffective practices
    • Support the delivery of the 3 year Cyber security roadmap to maintain and optimize the Advanced Cyber Security & Emerging technologies / controls capability
    • Lead the enhancement and optimization of implemented reporting mechanisms to demonstrate the value of the Advanced Cyber Security & Emerging technologies / controls function with tangible benefits
    • Identifies technical and business opportunities to take advantage of cross project knowledge, best practices and reusability to expedite projects
    • Manage the security posture of IT infrastructure for overseas locations
    • Provide deployment services on enabling new infrastructure capability
    • Follow information security policies, methods, standards, National Institutes of Standard and Technology (NIST) standards and practices to organizational information systems, IT reference materials and interpret regulations
    • Implement security controls, perform ongoing maintenance and prevent, detect, analyze and respond to security incidents
    • Communicate with Information Security Officer, and other IT personnel within the organization and organizational staff
    • Help coordinate the implementation of security programs across all agency platforms
    • Assist with Active Directory access and Group Policies, Internet intrusion detection, Internet filtering, and monitoring of employee access, virtual private networking (LAN/WAN) security
    • Assist and participate with the Senior IT Specialist as an advisor in projects to enhance or develop new IT systems, or to study the feasibility of acquiring new technology

    Strategy:

    • Understand information security trends
    • Document and communicate security solution roadmap to the Head of secueity technology roadmap and COE team
    • Document security product and services for each information security domain  
    • Understand all security domain, application, implementation and objectives to the business

    Budgets/ Financial Input

    • Provide budget input and recommendations
    • Provide knowledge business services and product to the security team
    • Consolidate and translate business security needs into finical measurable matrix

    Qualifications

    • A Degree or its equivalent in Information Technology, Network Security, Enterprise Network Management, Information Security, Management Information System Computing, Engineering or similar area of study
    • Relevant industry certifications in information security program and governance as well as PMP will be an added advantage
    • Minimum of Two (2) years of computer information technology experience.
    • Minimum of Two (2) years of experience engineering and designing IT security solutions
    • Minimum of 1 year working as a business analyst in technical security and IT
    • Good understanding all the information security domains
    • Experience of identifying and managing technology security risk
    • Certification like CISSP, CCSP, CISA, CCISO, SABSA, ISO27001/22301 will be of advantage

    Key Critical Competencies

    • Ability to know when to implement solutions with consideration to the wider impacts i.e. risk, cost, customer impact, timescales, etc.
    • Excellent negotiation, and written and verbal presentation skills
    • Ability to handle high pressure situations with key stakeholders
    • Good Analytical skills, Problem solving and Interpersonal skills
    • Deep knowledge of enterprise application development security controls
    • Good knowledge of Telco convergence business, FinTech network traffic consumption and OpenAP

    Closing: 13 June 2022

    go to method of application »

    Sector Manager-Manufacturing

    Description

    Equity Bank is one of the region’s leading banks whose purpose is to transform the lives and livelihoods of the people of Africa socially and economically by availing them modern and inclusive financial services that maximize their opportunities. With a strong footprint in Kenya, Uganda, Tanzania, Rwanda, South Sudan and DRC Congo, Equity Bank is now home to over 12 million customers - the largest customer base in Africa. Currently the Bank is seeking additional talent to serve in the role outlined below

    • Implement the Manufacturing Banking Business Development initiatives in line with the Bank strategy and business growth plan.
    • Identify opportunities for growth and new business acquisition through market research, analysis, and networking.
    • Develop, grow and maintain a strong client and transaction pipeline and convert these to businesses that achieve customer satisfaction, the banks' financial budgets, and strategic goals.
    • Actively market and drive the uptake of the Manufacturing Banking services and products to new and existing clients. Identify opportunities for cross-selling of relevant products and services.
    • Ensure day-to-day client relationship management and engagement with customers to foster a good and lasting business partnership between the customer and the Bank.
    • Promote excellent customer experience by driving and advocating customer requirements through the various functions in the bank to deliver high service standards that delight the bank’s customers.
    • Ensure full compliance with Manufacturing Banking standards while adhering to the Bank’s policies and procedures.
    • Partner with Regional Management, Branch Management teams, and Support Functions to increase the market share of the Manufacturing Banking segment with regard to customer numbers, products, service consumption, and revenues while proactively reducing the non-performing loan book.
    • Collaborate with Branch Managers and ensure to drive account utilization and sustainable deposits.
    • Drive transactional income from Manufacturing Banking clients through effective customer service and cross-selling the Bank’s products and services.
    • Establish profitable banking relationships with Manufacturing Banking clients by providing high-quality banking and other financial services where the Bank operates
    • Provide feedback to Management on Manufacturing Banking market analysis and segmentation with regards to products, credit risk evaluation, and customer feedback among others.
    •  In liaison with other stakeholders, ensure quality portfolio management by effective identification of risks and their mitigations.
    • Conduct preliminary credit reviews and make recommendations for new and existing facilities in line with the Bank’s credit policy and Manufacturing Compliance guidelines.
    • Regularly monitor performing/non-performing accounts within the assigned portfolio.

    Qualifications

    • University Degree in Business Administration, Economics, Finance, Banking or its equivalent from a recognized institution.
    • Five (5) years banking experience in the Financial/banking sector, three (3) of which should be in Relationship Management in Infrastructure, Oil, Energy, Transport & Manufacturing.
    • Entrepreneurial and Commercial thinking
    • Excellent research, analytical, and problem-solving skills.
    • Integrity & courage to challenge actions within various business units and the status quo.
    • Strong persuasion, management, and communication skills
    • Strong organizational skills
    • Excellent stakeholder management skills
    • Creative approach, with the ability to anticipate challenges and develop innovative solutions
    • Customer & Client-Focused Innovation  – able to meet the demands of internal and external customers
    • Meaningful Collaboration  – Ability to establish key partnerships and facilitate, influence, collaborate and establish accountability through all levels of the organization to help drive uptake of the Bank’s products and services
    • Ability to prioritize, meet deadlines and work under pressure
    • Excellent interpersonal, communication, and presentation skills

    Closing: 6 June 2022

    Method of Application

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Equity Bank Kenya Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail