Job type: Full-time

Responsibilities

Responsible for end-to-end management of 3rd Parties/Technology partners from onboarding to operations by evaluating partner competencies in security, business continuity, operations, infrastructure, and architectural capabilities.


Key Accountabilities and Decision Ownership

  • Security Management
    • Ensure 3rd Parties/Technology Partners’ security is properly managed.
    • Provide the required assurance to remain compliant with security and privacy laws and regulations.
  • Architectural Evaluation
    • Ensure 3rd Parties/Technology Partner architectures are properly evaluated, maintained, and periodically reviewed.
    • Maintain system design, integration, and data flows to align with organizational goals.
  • Infrastructure Assessment
    • Evaluate infrastructure in terms of capability, scalability, and reliability.
    • Assess both internally and externally hosted IT infrastructure.
  • Operational Readiness
    • Evaluate and periodically review the partner’s readiness to support product operations.
    • Cover areas of resources and Service Level Agreements (SLA).

Must Have Technical / Professional Qualifications

  • Educational Background
    • Bachelor’s Degree in Information Technology, Computer Science, Cyber Security, or relevant domain.
  • Technical Knowledge
    • Strong understanding of key Cyber Security technologies & tools and general Information Technologies.
    • Knowledge of Cyber and Risk Management frameworks and international security standards.
    • High-level knowledge in areas including:
      • Internet protocols
      • Firewalls
      • VPN technologies
      • IDS/IPS
      • Network access control and network segmentation
      • Anti-malware and spam technologies
      • Risk and vulnerability assessments
      • Compliance
  • Regulatory Compliance
    • Knowledge of legal, regulatory, and privacy requirements such as:
      • Personally Identifiable Information (PII) Protection
      • Payment Card Industry (PCI)/Data Security Standard (GDPR, PCI DSS)
  • Operating Systems and Security
    • Proficiency in Windows, UNIX, and Linux operating systems.
    • Expertise in web security & encryption.
  • Frameworks and Standards
    • Knowledge of common IT management/compliance frameworks such as:
      • ISO/IEC 27001
      • SOC 2
      • SOX
      • ITIL
      • COBIT
      • NIST
  • Certifications
    • An industry security certification is an added advantage.

Core Competencies, Knowledge, and Experience

  • Customer Focus
    • A customer-focused, responsive, and transparent attitude.
  • Strategic Thinking
    • Ability to think strategically and drive change.
  • Communication Skills
    • Ability and desire to communicate and work with a broad set of stakeholders.
  • Technical Expertise
    • A deep understanding of tech security risks and mitigating solutions.
  • Agile Methodologies
    • Familiarity with agile ways of working.

How to Apply:

This is Full-time Job, To submit your application, please follow the link provided below.

CLICK HERE TO APPLY

Check all:  JOBS IN TANZANIA

Go to our Homepage To Get Relevant Information.