Information technology, software development, data Jobs for Mid-level in Africa

4 jobs found

Hariss International

IT Cybersecurity Lead

Kampala

Uganda

Hariss International

Ops & Infrastructure Lead

Kampala

Uganda

Haco Industries Limited

Senior Applications Analyst

Nairobi

Kenya

Kenya Tea Development Agency

Field Systems Administrators

Nairobi

Kenya

Mini Group

CCTV Technician

Nairobi

Kenya

Closed for applications
Danco Capital Limited

Hub Lead- Mombasa

Mombasa

Kenya

Closed for applications
Coca-Cola

Manager, Data, Insights & Analytics

Lagos

Nigeria

Closed for applications
Dangote Group

IT Strategy & Transformation Specialist

Lagos

Nigeria

Closed for applications
Coca-Cola

Digital Learning Technology Expert

Lagos

Nigeria

Closed for applications

Get personalised job alerts directly to your inbox!

Dangote Group

IT Auditor

Lagos

Nigeria

Closed for applications

Country / Region

Seniority (Information technology, software development, data, Manufacturing)

© Fuzu Ltd

IT Cybersecurity Lead

Job details

Contract Type

Description
Qualifications, Skills and Experience
  • Bachelor’s degree in Computer Science or related acceptable qualification.
Experience:
  • Proven experience in cybersecurity operations, threat management, or as a security analyst/engineer.
Technical Knowledge:
  • Proficiency in network security, endpoint protection, and security tools (e.g., SIEM, PAM).
Certifications:
  • Requires certifications such as CISSP, CISM, or GIAC.


Responsibilities
Security Operations:
  • Lead the security team in monitoring, incident response, and implementing defense protocols.
Security Strategy:
  • Selection of tools to manage the environments security.
  • Decisions on insourced versus outsourced services.
Technical Management:
  • Oversee firewall management, Privileged Access Management (PAM), Security Information and Event Management (SIEM), and patch management.
Risk & Compliance:
  • Drive risk assessments, security audits, and ensure compliance with frameworks such as ISO 27001 and Data Protection Act, 2012 (Act 843).
  • Develop a detailed response procedure to any cybersecurity breach.

Threat Management:

  • Identify vulnerabilities, conduct penetration testing, and stay updated on emerging cybercrime tactics.
Leadership & Collaboration:
  • Collaborate with IT, legal, and HR to enforce security policies and conduct training. Report security risks to senior leadership.
Documentation:
  • Maintain detailed records of security guidelines, procedures, and standards.

Start hiring with Fuzu

Recruit better talent faster - on your own or with our support.

Explore recruitment platform