Posted:2 hours ago
By:Hiring Kenya
Company Details
Industry:
Banking
Description:
Established in 2017, Commercial International Bank (CIB) Kenya Limited is a private commercial bank licensed by the Central Bank of Kenya. Headquartered in Westlandโs, Nairobi, we offer a comprehensive suite of financial solutions designed to meet the evolving needs of individuals, businesses, and institutions. As a subsidiary of Commercial International Bank (CIB) Egypt, the leading private sector bank in Egypt, we draw on our parent companyโs vast experience and expertise. This strategic partnership enables us to deliver exceptional banking services with a forward-thinking approach tailored to the Kenyan market.
Job Description
Job Purpose Statement
- The role involves management and monitoring the security of the infrastructure and platforms to ensure the principles of confidentiality, integrity and availability are upheld. The responsibilities include implementing approved security measures according to CIBs’ policies, standard operating procedures, and compliance requirements.
Key Responsibilities
Financial
- Ensure the availability of bank end to end IT security controls covering perimeter, Branches, DMZ, Access layer, 3rd Party, Data Centre firewalls and endpoints to make sure that a unified and complaint policy is applied across the organization.
- Ensure the availability and efficient operations of banks’ end to end network security solutions such as firewalls, VPNs, Intrusion Detection Systems (IDS), to provide the required levels of assurance regarding the effectiveness of banks’ security measures and approved controls.
- Assist with implementation of the Bank’s strategy, roadmap, and delivery plans for IT Security in coordination with the network, applications, and information security teams.
- Monitor, report and provide the network officer with network security trends and advice to changes in policy, procedures, and tools to enhance the network security posture.
- Provide technical IT security expertise to the Bank’ projects and to provide the required levels of assurance regarding the readiness of the banks’ security controls.
- Review and critique network security solutions, in full alignment with the network officer, in order to be able to evaluate the alignment to operational and mission requirements over a range of metrics including scalability, maintainability, security, reliability, flexibility, availability, and manageability.
- Monitor the performance of security applications in scope and to ensure a healthy and risk-free secure network connectivity through the entire organization.
Customer
- Build the IT security infrastructure architecture in order to help manage, operate, maintain, and monitor adherence to the architecture and system wide policies.
- Oversee the development and management of security controls, defenses, and countermeasures to prevent and safeguard the security, integrity, and confidentiality of all corporate and customer data.
- Ensure annual regulatory and compliance needs are met and respond to audit requests for information related to IT security, on application, data, network, Services, endpoint, and servers, in order to ensure effective controls according to business/compliance/regulation requirements.
- Contribute to and at times lead training sessions on technology and especially IT security related topics, in order to enhance the overall organization learning and security awareness curve.
- Provide security technical expertise for Project Management to support the bank’s Business Strategic Projects and, in order to create and maintain a secure Software Development Life Cycle (SDLC) in the organization that complies with Business Strategic objectives, policies, procedures, rules and regulations.
Internal Business Process
- Ensure that custom Applications and IT Operations management tools, such as network management and log management have the appropriate security measures built into them at deployment, in order to maintain unified security measures and business reporting mechanisms are in place.
- Ensure the requirements for new tools are integrated efficiently and effectively with the existing tools and technologies, gathering all related requirements and guide/recommend the right integration pattern, taking into consideration the impact to the environment and standards to ensure effective security architecture and controls over enterprise applications.
- Oversee and provide direction for risk assessment, testing and deployment of security controls and standards, root cause analysis, security scans, incident handling, vulnerability assessments, and documentation.
- Provide technical expertise and guide the administration of security tools that control and monitor information security, in order to keep business up and running seamlessly.
- Create and maintain monthly security reports and dashboards across various IT Security solutions, documentation for security related activities and metrics/KPIs reporting, in order to be presented to the respective stakeholders/committees as needed.
- Advocate secure computing practices and procedures, and communicate IT Security best practices, in order to keep the business secured proactively against threats.
Functional Responsibilities
- Provide the required level of support to all managed systems and platforms including: Endpoint protection, Enterprise Mobility solutions, Encryption, Endpoint Sandboxing solutions, Endpoint Detection and Response, Endpoint Data Classification and others, in order to maintain business operations according to the approved service level agreement.
- Ensure the availability of Secure Remote access and Work from Home Arrangement technologies, and Endpoint Detection/Response, to provide the required levels of assurance that Bank Work from Home Arrangements are being handled and operational in a secure way according to industry best practice and information security policies.
- Ensure proper functionality of managed endpoint and mobile solutions through maintaining effective coordination with support vendors for resolve issues impacting availability, in order to keep the solutions fully compliant with the current architecture and incident response requirements.
- Manage the reporting and tracking of issues related to endpoint and mobile security gaps, data leakage incidents, mobile devices security effectively and efficiently, in order to ensure proper implementation and operations according to organization objectives, solution best practice and compliance/regulation requirements.
- Ensure compliance with all relevant CBK regulations, banking laws, AML regulations and internal CIB policies and code of conduct in order to maintain CIB’s sound legal position and mitigate any potential risks.
Job Specification
Academic
- Bachelor’s degree in engineering, Information Technology, Computer Science or equivalent.
Professional Qualifications & Experience
- At least one Security certification from the list: CEH (Certified Ethical Hacker), CompTIA Security+, OSCP (Offensive Security Certified Professional), SSCP (Systems Security Certified Practitioner).
- At least one Networking Certification; CCNA: Cisco Certified Network Associate; CCNP: Cisco Certified Network Professional.
- Proven Experience in IT Security Solutions deployment, troubleshooting, and escalation processes and procedures.
- Experience with enterprise security architecture and software like IPS/IDS, AV, Vulnerability scanners, DLP, web security and email security, Information Security frameworks and best practices (e.g. PCI, ISO27K, NIST)
- Good Knowledge of Networking, preferably CISCO products and technologies.
- Routing & Switching (Routing protocols such as EIGRP, OSPF, BGP, and Instant Switches).
- Data Center Security Products (Next Generation Firewalls, IPS).
- Network Security techniques (Encryption, ISE, NAC, dot1x, device hardening).
- Strong Knowledge in Defense-in-Depth mechanism.
- Desired Work Experience
-
- Minimum 2-4 years of experience in IT Security
Salary: Discuss During Interview
Education: Diploma
Employment Type: Full Time
Contact Information