Job Description
<p><br></p><p><span style="color: rgb(68, 68, 68); letter-spacing: 0.4px;">The incumbent is required to provide specialized technical services in the administration and maintenance of the security of all ICT infrastructure of the Ministry/Department. Duties include: providing&nbsp; specialist ICT security advice to the Ministry/Department; developing ICT policy and procedures; monitoring and enabling secure operations for all technology infrastructure of the Ministry/Department; assisting with security implementations; performing IC security audits and reviews; and supervising other ICT technical and support staff.&nbsp; &nbsp;&nbsp;</span></p>
Key and Critical Responsibilities
<p class="MsoNormal" style="margin-bottom: 20px; color: rgb(68, 68, 68); letter-spacing: 0.4px;"><span style="transition-property: all; font-weight: bolder;"><span times="" new="" roman""="" style="transition-property: all; font-size: 12pt;">DUTIES AND RESPONSIBILITIES<o:p></o:p></span></span></p><h6 style="letter-spacing: 0.4px;"></h6><h5 style="letter-spacing: 0.4px;"><ul style="margin-bottom: 20px; margin-left: 40px; list-style-image: inherit; list-style-type: inherit; padding-left: 0px;"><li style="text-align: justify;"><span style="transition-property: all; font-size: 12pt; letter-spacing: 0.4px;">Conducts security risk and vulnerability assessments for all business and operational software applications, and all IT installations within the Ministry/Department and recommends appropriate security strategies and controls; and investigates suspected attacks and manages security incidents.</span></li><li style="text-align: justify;"><span style="transition-property: all; font-size: 12pt; letter-spacing: 0.4px;">Plans and executes programmes to review IT security activities, processes and services within the ICT function to ensure compliance with established security policy and procedures, reports on conformance and makes recommendations for fixes and improvements.</span></li></ul><ul style="margin-bottom: 20px; margin-left: 40px; list-style-image: inherit; list-style-type: inherit; padding-left: 0px;"><li style="text-align: justify;"><span style="transition-property: all; font-size: 12pt; letter-spacing: 0.4px;">Investigates security breaches in accordance with established procedures and recommends the required corrective actions; and assists users with the management of their security access and controls, implements agreed user security and maintains security records and documentation.</span></li><li style="text-align: justify;"><span style="transition-property: all; font-size: 12pt; letter-spacing: 0.4px; text-align: left;">Provides inputs to the service continuity planning process of the Ministry/Department and assists with the implementation of the resulting plans.</span></li><li style="text-align: justify;"><span style="transition-property: all; font-size: 12pt; letter-spacing: 0.4px; text-align: left;">Keeps abreast of technical developments in IT networks and infrastructure, including intrusion detection and protection, security management, vulnerability assessment and identity management to provide advice to improve security.</span></li><li class="MsoNormal"><span style="transition-property: all; font-size: 12pt; letter-spacing: 0.4px;">Performs other related duties as assigned.</span></li></ul></h5>
Key Competency
<div style="color: rgb(68, 68, 68); letter-spacing: 0.4px;"><span style="transition-property: all; font-weight: bolder;">Knowledge Skills and Abilities</span></div><div style="color: rgb(68, 68, 68); letter-spacing: 0.4px;"><span style="transition-property: all; font-weight: bolder;">Knowledge</span></div><div style="color: rgb(68, 68, 68); letter-spacing: 0.4px;">&nbsp; &nbsp;</div><ul style="margin-bottom: 20px; margin-left: 40px; list-style-image: inherit; list-style-type: inherit; padding-left: 0px; color: rgb(68, 68, 68); letter-spacing: 0.4px;"><li>&nbsp;Considerable knowledge of security for software applications, computer networks and IT infrastructure;&nbsp;</li><li>&nbsp;Knowledge of relevant IT security solutions such as CheckPoint.</li><li>&nbsp;Knowledge of Project Management and control of ICT within an organization.</li><li>&nbsp;Some knowledge of the tools and techniques required for the management and control of ICT within an organization.</li></ul><div style="color: rgb(68, 68, 68); letter-spacing: 0.4px;"><br></div><div style="color: rgb(68, 68, 68); letter-spacing: 0.4px;"><span style="transition-property: all; font-weight: bolder;">Skills and Abilities&nbsp;</span></div><ul style="margin-bottom: 20px; margin-left: 40px; list-style-image: inherit; list-style-type: inherit; padding-left: 0px; color: rgb(68, 68, 68); letter-spacing: 0.4px;"><li>&nbsp; &nbsp; Ability to supervise technical and support staff.</li><li>&nbsp; &nbsp; Ability to think creatively and to analyse IT security problems and incidents.</li><li>&nbsp; &nbsp; Ability to communicate effectively both orally and in writing.</li><li>&nbsp; &nbsp; Ability to promote teamwork and management conflict.</li><li>&nbsp; &nbsp; Ability to establish and maintain effective working relationships with colleagues.</li><li>&nbsp; &nbsp; Ability to interact positively with members of the public and external stakeholders.</li></ul><div style="color: rgb(68, 68, 68); letter-spacing: 0.4px;"><span style="transition-property: all; font-weight: bolder;">MINIMUM EXPERIENCE AND TRAINING:</span></div><ul style="margin-bottom: 20px; margin-left: 40px; list-style-image: inherit; list-style-type: inherit; padding-left: 0px; color: rgb(68, 68, 68); letter-spacing: 0.4px;"><li><span style="transition-property: all; letter-spacing: 0.4px;">&nbsp;Minimum of three (3) years' experience in the area of ICT, including at least two (2) years' experience in securing ICT systems.</span><br></li><li>&nbsp;Training as evidenced by the possession of a recognized Bachelor's Degree in Computer Science, Computer Information Systems, Information Systems Management, Computer Engineering or a related area.</li><li>&nbsp;Certification in information technology security management, such as the CCNA Security or Certified Information Systems Security Professional (CISSP).</li></ul>