We are pleased to announce the vacancy for Endpoint Security Specialist within Cyber Security Function. As an Endpoint Security Specialist, your primary responsibility will be to ensure the protection and security of an organization’s endpoints, including laptops, desktops, servers, applications, and mobile devices. You will play a crucial role in developing and implementing endpoint security strategies, policies, and procedures to mitigate risks and safeguard company data.
Detailed DescriptionReporting to the Senior Specialist: Cyber Security Network & Engineering, the successful candidate will lend support in the design, deployment, day-to-day operation and maintenance of Endpoint Security tools and services and ensure 99.999% uptime.As an Endpoint Security Specialist, you will play a critical role in protecting an organization’s valuable assets and ensuring the confidentiality, integrity, and availability of sensitive information. Your expertise in endpoint security will contribute to maintaining a secure and resilient environment for the organization and its stakeholders.Job Responsibilities
Position: Secure by Design Specialist
Detailed Description
Reporting to the Senior Specialist: Cyber Security Network & Engineering, the successful candidate will lend support in the design, deployment, day-to-day operation and maintenance of Endpoint Security tools and services and ensure 99.999% uptime.
As an Endpoint Security Specialist, you will play a critical role in protecting an organization’s valuable assets and ensuring the confidentiality, integrity, and availability of sensitive information. Your expertise in endpoint security will contribute to maintaining a secure and resilient environment for the organization and its stakeholders.
Job Responsibilities
- Conduct periodic security reviews, vulnerability assessments & penetration tests across all of Safaricom’s systems/infrastructure
- Ensure all new and existing systems/products/services comply with the Company’s security policies & standards and other industry best practices e.g. ISO27001, CIS and Ethiopia Data Protection Laws
- Provide timely and quality security assurance reports and advice to the business when required even with very tight deadlines
- Do regular follow-ups with system custodians/owners to ensure any security risks identified are addressed within the agreed timelines
- Define Cyber Security metrics and report periodically on security compliance across all networks/systems
- Research on new threats/technologies/vulnerabilities/security design principles etc.
- Working knowledge of Virtualization & Microservices technologies e.g. VMware, Open shift, Kubernetes, Docker etc will be an added advantage
- Working knowledge and experience in DevSecOps technologies and practices i.e. Jenkins, Jira, Github, Gitlab etc will be an added advantage
Qualifications and Educational Requirements
- Degree in Information Security/Computer Forensics/Computer Science/Information Technology or other relevant Technical Degree
- Information security certifications e.g. CEH/CISSP/CISM/CISA/GIAC/CPTP/OSCP
- Advanced Networking certifications: CCNA/CCNP/CCSP/CCIE are also preferred
- Certifications in Microsoft Windows and Linux/Unix Operating Systems
- Demonstrate competency in the use and administration of ethical hacking tools e.g. KALI Linux, Metasploit, Nexpose, Nessus, Nmap, BurpSuite etc…
- Minimum of 3 years working experience in Information Systems Security – e.g. Ethical Hacking, Penetration Testing, Vulnerability Assessments, ICT Audits, Pre-and-Post Implementation System Reviews etc…
- Minimum of 3 years working experience in Networking and Operating Systems e.g. Cisco, Huawei, Windows (All), Unix, Linux etc
How to apply
If you feel that you are up to the challenge and possess the necessary qualifications and experience, kindly proceed to update your candidate profile on the career portal and then Click on the apply button. Remember to attach your resume.
The closing date for receiving applications is Sunday November 26, 2023.