Sendy Ltd – Senior Security Engineer.

Get a free C.V. review by sending your C.V. to submitcv@careerassociated.com or click the following link. Submit C.V.! use the subject heading REVIEW.

IMPORTANT: Read the application instructions keenly, Never pay for a job interview or application.

Click the Links Below to Get Job Updates.

https://www.facebook.com/groups/1126060830815705

https://t.me/joinchat/EBWPu0Cfzh880lRySce_AQ.


We believe that Africa does better when everyone has room to grow and thrive. No one should be left out because the distance between seeing an opportunity and making a living from it is too great.

We started by delivering small packages but haven’t stopped there. Today, we’re empowering businesses to send raw materials to their production facilities and finished goods to their customers. We’re helping small scale farmers get their produce to the market. We’re making it possible for the hardworking delivery driver to earn a decent living.

We are here to make it easy to trade in Africa so that everyone has room to grow. Join us.

About The Role

Security Engineers are tasked with building and maintaining security infrastructure for Sendy’s application platforms. They work closely with the engineering teams responsible for running and maintaining our infrastructure.

Key Duties and Responsibilities

  • Plan, scope and budget individual cyber review assignments including continuous cyber security scans of the Company’s technical environment.
  • Lead the planning process of cyber reviews in conjunction with the Head of Information Technology. 
  • Coordinate control related activities together with related IT governance functions including cyber security  assessment and related findings and provide input to the management committee.
  • Develop cyber assessment plans of assigned cyber assurance and advisory services based on the annual cyber security based plan focusing on the key critical risk areas.
  • Execute cyber security as per the set plans and in accordance with policies, procedures and best practice as might be necessary.
  • Manage and align assignment resources, efforts and goals; identify and remove barriers in order to achieve optimal results. 
  • Review working papers in line with recommended cyber security standards ensuring proper identification, development, and documentation of cyber security issues and recommendations using independent judgment.
  • Review and draft timely cyber security reports for senior management ensuring all the conclusions provide high-level assurance, reduce risk and/or create positive change. 
  • Liaise with departmental heads to ensure findings and recommendations are accepted and implemented
  • Provide consultancy services to project teams on cyber risks, system controls and best practices while maintaining independence. 
  • Provide advice and effective challenge to internal stakeholders regarding the implications on the IT control environment on business strategy and operating environment.
  • Undertake to assist in investigation of cases of internal and external cyber frauds, as requested.
  • Strong collaboration with other lines of cyber defence to provide integrated assurance.
  • Review procedures, processes and records to ensure they are in line with the cyber security objectives and appraise policies and plans of activities, departments and functions under review.
  • Oversee cyber secrity and inspection plans, schedule and review of work-papers.
  • Develop sustainable and re-useable data analytics models and programs to improve the efficiency of the cyber security program and to improve coverage.
  • Build and maintain dashboards and common data sets regularly required by audit delivery teams.
  • Liaise with external cyber security consultants and other regulatory monitoring agencies and implement recommendations to improve technological controls, promote growth and ensure compliance with the law, applicable legislation and regulatory framework.
  • Strong relationships and communications with Senior management to ensure concerns are addressed and expectations met.
  • Provide ongoing coaching and feedback to direct reports.
  • Identify development and training needs and develop plans to satisfy areas identified.

About You

  • Knowledgable on cyber security frameworks such as NIST and ISO27000 series.
  • Hands on cyber security assessments including vulnerability management penetration testing, cyber incident management and system recovery.
  • Experience with cyber security tools including but not limited to vulnerability managers, SIEM, SOAR, exploitation suites, IPS/IDS database activity monitoring tools, malware management tools among others.
  • Experience in cyber security regulations and guideline.
  • Experience in cyber security policy formulation.
  • Experience with cloud security architectures and technologies
  • Experience identifying and mitigating security issues in production services and in pre-production planning
  • Experience working on highly distributed and scalable systems
  • Experience designing, deploying, and managing tools that automate security functions.

Technical Competencies

  • 5+ years of relevant work experience in a busy IT Environment with clear understanding of every field of IT and an appreciation for emerging Technologies.
  • Experience with Cloud security (AWS, GCP,, etc.)
  • DevOps and configuration management with tools like Terraform, Ansible, etc.
  • Relevant certifications in information security knowledge areas, such as Information Systems Audit, Information Security Management and Ethical Hacking.
  • Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk. 
  • Experience with IPS/IDS, SIEM, DLP, Active Directory and other security technologies. 
  • In-depth familiarity with security policies based on industry standards and best practices
  • Knowledge of: Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM)
  • Identity and Access Management policy application and enforcement
  • Advanced knowledge of Linux, MacOS, Windows operating systems
  • Experience hardening operating systems
  • Advanced programming experience (Java, Python, Golang, Bash, etc.)
  • Experience with the Linux kernel and Linux software packaging
  • Project management skills preferred.
  • Passionate and eager to learn.

What we offer

  • Comprehensive health insurance – Inpatient / Outpatient / Dental / Optical.
  • Flexible vacation.
  • All risk Insurance
  • Office lunch
  • Opportunity for company stock options

CLICK HERE TO APPLY

.

.

.


Processing…
Success! You're on the list.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Create a website or blog at WordPress.com

Up ↑

%d bloggers like this: