Cybersecurity Specialist – CS241

Job Information

  • icon
    Category Cyber Security Jobs
  • icon
    Posted On Jan 30 ,2024
  • icon
    Qualifications Bachelor's Degree
  • icon
    Employer Name Eko Electricity Distribution Company

Job Description

Eko Electricity Distribution Company is hiring Cybersecurity specialist Blue Team in Lagos, Nigeria the ideal candidate would be responsible for monitoring, identifying, and addressing possible security threats, you will collaborate directly with fellow members of the Cybersecurity Blue team, will be essential to preserving the safety of the IT infrastructure and systems used by our business. This is a 24/7, hybrid job that has some potential to work remotely and is headquartered in Lagos. interested candidates must possess the following qualifications bachelor’s degree or HND in Computer Science, Computer Engineering, or a related field, 2+ years' experience in a cybersecurity or related field. To apply kindly send your CV to  Eko Electricity Distribution Company on  www.linkedin.com.

Job Responsibilities

  • Using their skills to detect insecure features and malicious activities within our networks and infrastructure.
  • Ability to work in a team-centric environment.
  •  Implement customized application security assessments for client-based asset risk, corporate policy compliance as well as conduct vulnerability assessment.
  • Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
  • Perform routine audits to identify security breaches and inefficiencies.
  • modernize our infrastructure and network systems.
  • Establish and uphold security measures.
  • Determine and address possible and current security issues.
  • Examine the current situation, observing patterns, and projecting future security needs.
  • Prepare performance reports to notify users, sharing the condition of the system.
  • Uphold high-quality service by adhering to company policies.
  • Attending educational workshops to stay up to date on technical expertise.
  • Participate in teamwork by completing related tasks as needed.
  • Responsible for completing audits, conducting risk assessments, and analyzing network traffic using vulnerability scans.
  • Defending organizational data. Security evaluations,

Job Requirements

  • HND or bachelor's degree in computer science, computer engineering, or a similar discipline
  • Two or more years of experience working in information security or cybersecurity.
  • Familiarity with threat detection and security monitoring technologies, including XDR, SIEM, and security information and event management.
  • expertise in forensics and security incident response
  • A reasonable familiarity with security best practices and standards, such as NIST and ISO
  • Excellent problem-solving and attention to detail abilities familiarity with networking technologies, such as TCP/IP, firewalls, and VPN technologies
  • Capacity to explain complicated security concerns to stakeholders who are not technical.
  • Credentials in pertinent fields, such as CISM, OSCP, SSCP, Certified Ethical Hackers (CEH), or similar.

SKILLS

  • Hands-on experience analyzing high volumes of logs, network data and other attack artifacts.
  • Experience with vulnerability scanning solutions.
  • Proficiency with antivirus and security software
  • Troubleshoot problems, implement ongoing network monitoring, and provide real-time security solutions to their team.
  • Make decisions in high-stress situations and communicate effectively with other team members.
  • Networking and System Administration
  • Knowledge of Operating Systems and Virtual Machines
  • Cloud Security, Information Security.
  • Risk Analysis: required to identify, manage, and mitigate risks.
  • Work with a larger security team of other cybersecurity professionals.
  •  Understand how to manage VPNs and RDP servers. 
  •  Protection of organization’s computer systems and networks from attacks.
  • Identifying and mitigating security risks, responding to incidents, conducting security audits, and more.