Information Security Consultant – African Guarantee Fund

Description
The Information Security consultant is responsible for understanding and responding to threats to the security of all information, networks, and computer systems, whether on premise or cloud. The individual taking the role will monitor a variety of services and tools (including firewalls, internal account activity tools and threat information services) in order to predict, detect and diagnose threats and direct or participate in the mitigation of these threats to the business together with the ICT team and Internal Control Team.

Responsibilities
Information Security Consultant would be responsible for the following:
Monitor information systems, computers and networks to detect and respond to cyber threats and finally to remediate information security threats and vulnerabilities.
Analyze, design, and facilitate capabilities, solutions, or preventative/remediation controls to protect proprietary/confidential data and systems in accordance with industry standards and governance/compliance requirements.
Review the current procedures in information security, Technical Incident Response Planning and Business Continuity Planning and advice whether they require revision.
Synthesize solution design, architectural patterns, policy and regulatory frameworks, privacy considerations, and risks in the creation of holistic solutions that span technologies and capabilities.
Support the front-line defense of networks, protecting information from unauthorized access and violations. Analyze and assess potential security risks, develop plans to deal with such incidents by putting in place measures such as firewall, IPS encryption, monitoring and auditing systems for abnormal activity, and executing corrective actions.
Prepare technical reports.
Carry out tests on a system to expose weaknesses in security. Essentially, do everything a hacker would do, but do it on behalf of the organization who owns the network, for example, access information without usernames and passwords, and try to break through whatever security applications are in place. Report findings and then suggest what upgrades/solutions to be implemented
Analyze computer and server logs and uncover links between events, groups and individuals through pursuit of data trails
Work across different operating system platforms and technologies to design holistic security designs that treat identified risks and enable strategic and/or tactical business or IT solutions
Research/investigate emerging business application security topics, threats, capabilities, and solution options to create/update policy and governance, technology strategies, solution architecture, and vulnerability assessments
Apply industry standard risk management technique and knowledge across various business application security capabilities, that is , technical, application, data and mobile to determine effectiveness of controls and to create action plans that remediate identified risks
Apply broad-based knowledge of security technologies with an in-depth/specialized knowledge of security tools like Nmap, Open VAS, Snort, Wireshark, Kali Linux etc.
Apply systems analysis techniques, including consultations with users to determine security specifications
Suggest and provide advice on the best solutions to backup sensitive and confidential data on the cloud for disaster recovery

COMPETENCIES
Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions.
Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner that engages the audience and helps them understand and retain the message.
Exercising Judgment and Decision Making: Use effective approaches for choosing a course of action or developing appropriate solutions; recommend or take action that is consistent with available facts, constraints and probable consequences.
Technical and Professional Knowledge: Demonstrate a satisfactory level of technical and professional skill or knowledge in position-related areas; remains current with developments and trends in areas of expertise.
Building Effective Relationships: Develop and use collaborative relationships to facilitate the accomplishment of work goals.
Client Focus: Make internal and external clients and their needs a primary focus of actions; develop and sustain productive client relationships.
Demonstrated ability to describe non-functional requirements and translate into architecture constraints.
Experience with banking and financial systems and business processes.

WORK EXPERIENCE
Minimum ten (10) years of experience working daily with network or host-based threat detection technologies.
Must be pro-active and a self-starter as this position requires a lot of independent work.
Knowledge of networking technologies and protocols, including Ethernet, VLANs, TCP/IP and routing.
Experience with security technologies including: Vulnerability Scanning, Firewalls & Log Analysis, Host-based detection tools, Security Event and Incident Management (SEIM), Antivirus, Network Packet Analyzers, malware analysis and forensics tools.
Experience in analyzing audit logs, router logs, firewall logs, IDS logs and TCP/IP headers.

REPORTING REQUIREMENTS/DELIVERABLES
The Information Security Consultant will need the following reporting requirements/deliverables, but not limited to:
Inception report. The inception report should mainly include: how the firm understands/interprets the ToRs; any additions/clarifications to the ToRs; a refined methodology to be adopted; action plan; expectations from AGF; and the preferred payment schedule.
Work plan of the security assessment.
Progress reports.
Vulnerability assessment technical review report.
Technical Incident Response review report
Business Continuity review report.
Cybersecurity policy and procedure
Any other Report, as required.

CONFIDENTIALITY
By accepting to take part in the invitation, you agree to keep in confidence all information provided to you, whether written or oral, in relation to the invitation and/or in relation to the organization’s business generally which is not already in the public domain, to use it only for the purposes of this bid and for no other reason and not to disclose any of the said information to any third party.

Method of Application
Please submit (through the email below) your Technical Proposals (including CVs of proposed staff), Financial Proposal (including proposed payment schedules) to the following address, on or before March 6, 2020. In case of any clarification, please channel them through the same email address.
Email Subject Line: “IT Security Consultant Application”
Email: reception@africanguaranteefund.com

[yuzo_related]