Lead, Security Operations and Monitoring

Job Information

  • icon
    Category IT Jobs
  • icon
    Posted On Jan 13 ,2021
  • icon
    Qualifications Bachelor's Degree
  • icon
    Employer Name Delon Jobs
  • icon
    Contact Email cv@delonllc.com

Job Description

Job SummaryDelon Jobs is helping Africa’s leading insurance company to hire Lead, Security Operations and Monitoring in Lagos. The successful candidate will Contribute to the overall reduction of information security related incidents by continuous monitoring and identification of threats through monitoring of applications, networks, systems, and other access to other assets (includes intrusion prevention/detection, email/spam filtering, web filtering).Gross Salary is between 6.5 M-8M per annum. Please read additional requirements below before applying. If you are interested in the position, kindly send cover letter and updated CV to cv@delonllc.com, and ensure you make your email subject ‘Lead, Security Operations and Monitoring’Job Description:In addition to the job summary details, the following are other requirements and important information:Duties & ResponsibilitiesSecurity Operations and Monitoring

  • Responsible for the continuous monitoring and identification of threats through monitoring of end user’s applications, networks, systems, and other access to other assets.
  • Lead the planning and design activities for the security monitoring operations, under the directives of the

Chief Information Security Officer.

  • Participate in the creation of enterprise security policies, standards, baselines
  • Monitor, identify, investigate & resolve security breaches detected by installed security solutions.
  • Implementation and manage log retention policy across multiple platform and systems.
  • Review logs/alerts and reports of all in-place security and infrastructural devices.
  • Ensure that sufficient trails are maintained and retained and retrievable for forensic analysis and

investigation

  • Direct scheduling and ad-hoc security and compliance reporting.
  • Monitor and advice on information security issues related to the systems and workflow to ensure the

internal security controls are appropriate and operating as intended.

  • Participate in security tool selection, pilot and implementation
  • Maintain security operation centre awareness program and communicate security operations center

action plans and security bulletinsSecurity Operations and Monitoring

  • Responsible for the continuous monitoring and identification of threats through monitoring
  • of end user’s applications, networks, systems, and other access to other assets.
  • Lead the planning and design activities for the security monitoring operations, under the directives of the

Chief Information Security Officer.

  • Participate in the creation of enterprise security policies, standards, baselines
  • Monitor, identify, investigate & resolve security breaches detected by installed security solutions.
  • Implementation and manage log retention policy across multiple platform and systems.
  • Review logs/alerts and reports of all in-place security and infrastructural devices.
  • Ensure that sufficient trails are maintained and retained and retrievable for forensic analysis and

investigation

  • Direct scheduling and ad-hoc security and compliance reporting.
  • Monitor and advice on information security issues related to the systems and workflow to ensure the

internal security controls are appropriate and operating as intended.

  • Participate in security tool selection, pilot and implementation
  • Maintain security operation centre awareness program and communicate security operations center

action plans and security bulletinsResponsible for the design, implementation and maintenance of effective systems security solutions

  • Responsible for the continuous monitoring and identification of threats through monitoring of end user’s applications, networks, systems, and other access to other assets.
  • Lead the planning and design activities for the security monitoring operations, under the directives of the

Chief Information Security Officer

  • Participate in the creation of enterprise security policies, standards, baselines
  • Monitor, identify, investigate & resolve security breaches detected by installed security solutions.
  • Implementation and manage log retention policy across multiple platform and systems.
  • Review logs/alerts and reports of all in-place security and infrastructural devices.
  • Ensure that sufficient trails are maintained and retained and retrievable for forensic analysis and investigation
  • Direct scheduling and ad-hoc security and compliance reporting.
  • Monitor and advice on information security issues related to the systems and workflow to ensure the internal security controls are appropriate and operating as intended.
  • Participate in security tool selection, pilot and implementation
  • Maintain security operation center awareness program and communicate security operations center action plans and security bulletins

Knowledge/Qualification

  • Bachelor’s and/or Advanced degree in Computer Science or any related disciplines (minimum of 2)
  • Professional certification like CISSP, CISM, ISO27001, CEH
  • A minimum of five (5) years relevant experience in Information Security with at least (3) years in Enterprise
  • Demonstrable experience working with network security and networking technologies as well as with systems, security, and network monitoring tools.
  • Hands on   experience   in   security   systems, including firewalls, intrusion detection/prevention     systems, anti-virus     software, authentication systems, log    management, content filtering, SIEM, NAC, FIM, WAF and DAM etc.
  • Demonstrable familiarity    with    web-related technologies (web applications, web services, service-oriented architectures), and network/ web-related protocols.
  • Thorough understanding of the latest security principles, techniques, and protocols

Skills/Competencies

  • Security and Vulnerability Assessments
  • Security Incident Management
  • Identity and Access Management
  • Written and verbal communication skills
  • Excellent Problem-solving skills
  • Good leadership, management and interpersonal skills.
  • Proactive, Resourceful and hands-on with