JOB PURPOSE
The IT SECURITY MANAGER is responsible for securing University's IT assets, The role will also support maintaining an enterprise security stance through the development of protocols, policy, and developing security standards to protect the integrity, confidentiality and availability of the information assets of the University.
Reporting to the Assistant Director Security Governance and Enterprise Architecture will Technically assess risks and threats, plan and implement a Disaster Recovery Plan and a Business Continuity Plan and conduct security assessments and audits. The role will support ICT Governance initiatives, including governance reporting and alignment to UOS governance frameworks.
The position is responsible to maintain the Risk frame work and Risk register for University's entire Information assets. Responsible for implementing suitable Identity access management. Require high level integrity, application of sound judgment, tact and innovation, and the development of relationships with IT and academic staff across the University to achieve the desired outcomes.
MAIN ACCOUNTABILITIES & EXPECTATIONS
1. PROTECTS IT SYSTEM BY DEFINING IDENTITY ACCESS PRIVILEGES, CONTROL STRUCTURES, AND RESOURCES.
2. ENFORCE DEPLOYMENT OF IT SECURITY POLICY, STANDARDS AND PROCEDURE
3. RECOGNIZES PROBLEMS BY IDENTIFYING ABNORMALITIES; REPORTING VIOLATIONS.
4. IMPLEMENTS SECURITY IMPROVEMENTS BY ASSESSING CURRENT SITUATION; EVALUATING TRENDS; ANTICIPATING REQUIREMENTS. ENSURE ROI FOR SECURITY INVESTMENTS.
5. DETERMINES SECURITY VIOLATIONS AND INEFFICIENCIES BY CONDUCTING PERIODIC VULNERABILITY ASSESSMENT, PENETRATION TESTING AND AUDITS.
6. ENSURE FIRMWARE/ OS/ APPLICATION UPGRADES, PATCH UPDATES ETC. BY IMPLEMENTING AND MAINTAINING SECURITY CONTROLS. COORDINATE AND ADVISE FOR PATCH DEPLOYMENT TEST
7. KEEPS USERS INFORMED BY PREPARING PERFORMANCE REPORTS; COMMUNICATING SYSTEM STATUS. ESTABLISH AND MAINTAIN IT SECURITY DASHBOARD.
8. MAINTAINS TECHNICAL KNOWLEDGE WITH STATE OF ART TECHNOLOGICAL CHANGES. ESTABLISH AND MAINTAIN THE UNIVERSITY'S SECURITY AND GOVERNANCE STANCE BASED ON ESTABLISHED BEST PRACTICE STANDARDS.
9. DEVELOP AND MAINTAIN THE UNIVERSITY'S SECURITY ARCHITECTURE INCLUDING FIREWALLS, INTRUSION DETECTION SYSTEMS, CRYPTOGRAPHY SYSTEMS AND ANTI-MALWARE SOFTWARE.
10. SAFE DESIGN, IMPLEMENTATION OF SECURITY MEASURES FOR CLOUD DEPLOYMENTS IN AZURE, AMAZON ETC.
12. COORDINATE WITH AUDIT COMPLIANCE DEPARTMENT TO PREPARE, FOLLOW-UP AND TRACK SECURITY AUDITS AND GOVERNANCE REPORTING (GRC).13. ENSURE THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF THE DATA RESIDING ON OR TRANSMITTED TO/FROM/THROUGH WORKSTATIONS, SERVERS, DATABASES AND OTHER SYSTEMS AND OTHER DATA REPOSITORIES.
14. ENSURE INFORMATION AUTHENTICITY, ACCOUNTABILITY, NON-REPUDIATION AND RELIABILITY FOR ALL INFORMATION ASSETS OF UNIVERSITY.
15. INVESTIGATE INCIDENTS AND BREACHES OF SECURITY, COORDINATES WITH TELECOM SERVICE PROVIDERS/ VENDORS FOR FORENSIC INVESTIGATIONS, TAKING CORRECTIVE AND PREVENTATIVE ACTIONS.
16. ENSURE APPROPRIATE TRAINING IS PROVIDED TO STAFF ON SECURITY RISKS AND PROCESSES.
17. ENSURE KNOWLEDGE OF THE RULES, POLICIES AND PROCEDURES OF THE UNIVERSITY IS MAINTAINED AND ABIDE BY THEM AS THEY ARE AMENDED, VARIED OR REPLACED FROM TIME TO TIME.
JOB SPECIFIC ACCOUNTABILITIES
-Technically IMPLEMENT IT security FRAMEWORK.
-Implement the security strategy of the University by coordinating Technical deployment.
-Asses the security status of University and remediate risks.
REQUIRED SKILLS
1. Demonstrated expertise in Network security, Operating system security, Database security, Application security
2. Web hosting security and Cloud security.Demonstrated ability to analyses and evaluate complex technological issues, resolve problems and produce effective outcomes in a high pressure environment. High-level knowledge and understanding of current IT security and governance issues.
3. Demonstrated familiarity with a range of IT areas, with knowledge and understanding of the inter-connectedness between areas and the capacity to deliver solutions that incorporate a range of IT functions. Such as Identity access management, Data Classification, Data leakage Prevention.
4. Strong technical skills such as, Penetration testing, Firewall, Avaya IP telephony security, Wifi Security, Anti Malware, Email security.
5. Web hosting security measures, Detecting vulnerabilities in codes, SharePoint security, secure development consultancy.
6. CASB, Azure, Amazon, O365 cloud security measures.
7. Experience in vulnerability scan and Patch management applications like Qualys, SCCM Ivanti, Nessus, Vera code, Acunetix, Burp suit etc.
8. Performing BCP / DR tests.
9. Intrusion detection, Threat Hunting for University environment, Incident management
10. Skills in these vendor technologies - vSphere, DS SAN, IBM Storwize Big IP F5 LTM, PureFlex, IBM Blade Servers & Bluecoat SG Proxy, Palo alto Traps, Avaya, Trend Micro Deep security, Kaspersky, Fortinet, Proof point.
11. Securing Remote access VPNs, SSL IPSEC
12. SIEM log analysis, Used cases, Correlation Rules
13. Security for Virtual Environments (VMware)
14. Demonstrated experience in the development of policy and procedural documentation.
PREFERRED QUALIFICATION & EXPERIENCE
- Preferably Graduate in Computer science, Information security or related discipline
- Extensive hands on experience in an IT security environment in a large enterprise.
- Extensive hands on experience in the Network security, system security , risk assessment and security audits.
INTEGRITY & RESPECT
High level of integrity and respect for all.
ADAPTABILITY
Able to adapt to changes in compliance, innovative.
COMMUNICATION
Excellent communication at all levels of the organization
ORGANIZATION
Well organized individual with good time management.
CONFLICT MANAGEMENT
Able to manage and resolve conflict. Ability to influence peers and leadership stakeholders.
ACCOUNTABILITY & ACCURACY
Accountable to the Assistant Director IT security and accurate in reporting.