Posted 1 year ago

Cybersecurity Operations Specialist

Date: Jul 19, 2022

Location: Kinshasa, CD

Company: Vodafone

Role purpose: security event logging, monitoring and cybersecurity operations

  • Execute on operations of the Cyber Security, Prevention and Defending stakeholders and team
  • Analysing cyber security incidents to solve issues and improve incident handling procedures
  • Receive Group incidents escalation and assist with real-time, continuous (24×7) security event monitoring, response, and reporting –
  • Proactive coordination with appropriate users during a security incident
  •  Conducting research regarding the latest methods, tools, and trends in digital forensics analysis –
  • Creating thorough reports and documentation of all incidents and procedures; presenting findings to team and leadership on a routine basis
  • Performs digital forensics and detailed reporting for cybersecurity and internal investigations.
  • In-depth analysis and detailed reporting of threats, malware, root cause and endpoint behavior using a variety of tools including IR Case Management, EDR, SIEM, PCAP, Mitre Framework, malware sandbox.
  • Collects, maintains, analyzes and action threat intelligence from both internal and external sources.
  • Works in partnership with the Group Cyber Security Operations Center (CSOC) as an escalation resource for incident response and threat analysis.
  • Performs other duties as assigned or required.
  • Maintains the strict confidentiality of sensitive information.
  • Performs other duties as assigned or required.

Core competencies, knowledge and experience:

  • Degree in Computer Science/information Technology or equivalent Cyber Security/Technology -related degree
  • Minimum of 3+ years of experience in Cyber Security role
  • At least one professional Information Security Qualification: CEH,/CISM/CompTIA Security+
  • Minimum of 1-year focused Security experience in Incident Management, Intrusion Analysis, Network troubleshooting or Reverse Engineering
  • Knowledge of common information technology management / compliance frameworks such as ISO/IEC 27001, SOC 2, ITIL, COBIT, and NIST.
  • Knowledge of legal, regulatory and privacy requirements, such as Personally Identifiable Information (PII) Protection –GDPR
  • An ability to think strategically and drive change
  • A deep understanding of Cyber Security risks and mitigating solutions
  • A diverse security background with knowledge in several areas including: layered security architecture; internet protocols; firewalls; VPN technologies, IDS/IPS, Data Leakage and Prevention, network access control and network segmentation, anti-malware and spam technologies; risk and vulnerability assessments, and compliance.
  • Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies
  • Windows, UNIX and Linux operating systems
  • Ability to work under time and resource pressure
  • An ability and desire to communicate and work with a broad set of stakeholders
  • Good communication skills and team player
  • Analytic Thinking

Key performance indicators:

  • Tech Security Controls KPI and Performance Metrics
  • Risks and Audit Points KPI
  • Mitigation Plans KPI
  • Project Delivery KPI
  • Consultancy Delivery KPI

Hits: 3

Apply Online

%d bloggers like this: