Information Security Specialist at Growth in Value Alliance (GV Alliance) Partners

Growth in Value Alliance (GV Alliance) Partners - Our client, a reputable Bank, is recruiting suitably qualified candidates to fill the position below:Job Title: Information Security SpecialistLocation: LagosJob SummaryThe successful candidate will monitor, assess, and fine-tune the IT business continuity and disaster recovery program, perform network penetration tests, application vulnerability assessment scans and risk audit reviews.He will also investigate and resolve identified systems security breaches, create comprehensive maintenance of information security policies, standards, guidelines and procedures and monitor for compliance in line with the organization’s IT security policy and applicable laws.Job DescriptionMonitor and advice on information security issues related to the systems and workflow to ensure the internal security controls are appropriate and operating as intended.Coordinate response to information security incidents.Conduct data classification assessment and security audits and manage remediation plans.Collaborate with IT management and other stakeholders to manage security vulnerabilities.Perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.Create, manage and maintain user security awareness.Conduct security research in keeping abreast of latest security issues.Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.Prepare IT security documentation, including information security policies, procedures, standards and guidelines based on compliance requirements and knowledge of best practices.ResponsibilitiesStrategy & Planning:The Information Security Specialist will:Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) in collaboration with other teams.PROBLEM SOLVING The post holder will be expected to work actively to achieve enterprise security goals within a set of resource constraints. He will need to:Have the ability to think logically and analyse complex situations for effective, sometimes out of the box solutions.Work with all stakeholders to develop strategic solution options and delivery plans.Communicating with others:The Information Security Specialist will be expected to have excellent communication skills and experience in working with sponsors and other members of the business. The following points illustrate this:Communication and visibility of all critical issues and their status and service restore plansDefine team member roles and expectations, and ensure timely feedbackCommunicate the technology vision and service improvement plans to internal and external stakeholdersOperational Management:The operational scope of the post holder is underscored by the following functions:Identify security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives.Provide technical support in the development, testing and operation of firewalls, intrusion- detection systems, enterprise anti-virus and other automation as required.Ensure the confidentiality, integrity and availability of the data residing on or transmitted through the organization’s workstations, servers, systems through databases and other data repositories.Ensure active compliance with information security requirements.Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, (i.e., security tool, workstations, servers, network devices, etc.).Maintain operational configurations of all in-place security solutions as per the established baselines.Review logs and reports of all systems and devicesParticipate in the design and execution of vulnerability assessments, penetration tests and security audits.Provide on-call support for end users for all in-place security solutions.People Management & Development: The successful candidate will need good people skills including:Build and maintain relationships with the overall team and stakeholders.Coach, mentor, appraise and develop team members. 

Apply at