Sidian Bank – Chief Information Security Officer & Data Privacy Officer.

Get a free C.V. review by sending your C.V. to submitcv@careerassociated.com or click the following link. Submit C.V.! use the subject heading REVIEW.

IMPORTANT: Read the application instructions keenly, Never pay for a job interview or application.

Click the Links Below to Get Job Updates.

https://www.facebook.com/groups/1126060830815705

https://t.me/joinchat/EBWPu0Cfzh880lRySce_AQ.


Branch: Kilimani Branch – Head Office

Department: ERM

Reports to: Head ERM

Chief Information Security Officer & Data Privacy Officer

JOB PURPOSE

To oversee the protection of bank and customer data, as well as the protection of infrastructure and assets from malicious actors. Serves as the process owner of all assurance activities related to the availability, integrity, and confidentiality of customer, business partner, employee, and business information in compliance with the bank’s information security policies.

KEY RESPONSIBILITIES

  1. Strategy
  2. Audit and Compliance
  3. Policies Standards and Procedure
  4. Change Management and Change Catalyst
  5. Data Protection/Privacy
  6. Information Security Awareness Training
  7. Risk Management
  8. Security Operation Center SOC
  9. Business Continuity and Disaster Recovery
  10. Identity and Access Management
  11. Incident Reporting
  12. Cyber security

 

MAIN ACTIVITIES

  1. Strategy

    • Draw out and implement a 5-year strategy plan towards the organization’s certification on ISMS – ISO27001

    • Draw out a yearly Budgetary proposal towards mitigating Technology Risk in the organization

    • Keep up to date with the latest security and technology developments

    • Research/evaluate emerging security threats and ways to manage them

  1. Audit and Compliance

    • Leading auditing and security compliance initiatives.

    • Ensure that an annual Central Bank of Kenya (CBK) Cyber Security Compliance Report is provided

    • Drive the testing and evaluation of security products

  1. Policies Standards and Procedure

    • Develop and ensure up-to-date Information security policies and standards, are in place and followed through its socialization
  1. Change Management and Change Catalyst.
    • Introduced security Risks Assessment in the product development lifecycle
    • Introduced NDA compliance from all the Vendors
    • Vendor Minimum Security Baseline Evaluation
    • Implement annual KPI checklist and vendor risk management for Vendors is implemented
    • Design new security systems or upgrade existing ones
  2. Data Protection/Privacy

    • Develop a Strategy for Data Privacy Compliance and walk through its implementation.

    • Data Protection Awareness Champion.

    • Conducting Data Mapping and Data Protection Impact Assessment.

  3. Information Security Awareness Training.

    • Develop an Information Security Awareness program, prepared curriculum for different set of users and executed the program

  1. Risk Management

    • Maintain an information security risk register for the business

    • Ensuring security on all platform infrastructure and external integrations

  1. Security Operation Center SOC

    • Implement Information Security Incident Management program
    • Operationalize a SOC and implement a SIEM
    • Identify potential weaknesses and implement measures, such as firewalls and encryption
    • Implement alert closure programs in Netguardians (Fraud) solution.
    • Implement End Point Security including data leak prevention, mobile device management
    • Monitor and respond to phishing emails and pharming activity
    • Analysis and Monitoring of entry points, activity logs, internal environments, and databases.
    • Vulnerability Assessment and Penetration Testing schedule and timetable
  1. Business Continuity and Disaster Recovery

    • Update and implement a business continuity plan for the business.

    • Conduct Business Impact Assessment and define RPO and RTOs for the business.

    • Executed a tabletop and actual disaster recovery plan tests for people, systems, processes.

    • Conducted drills and work on areas of improvement.

  1. Identity and Access Management

    • Onboarding and off-boarding of Assets
    • User provisioning/ de-provisioning and Privileged Access management.
    • Developed and role-based access control matrix
  1. Incident Reporting

    • Update and implement an incident reporting mechanism and plan for the business
    • Incident reporting to CBK as required
    • Investigate security alerts and provide incident response.
  1. Cyber security

    • Use advanced analytic tools to determine emerging threat patterns and vulnerabilities
    • Engage in ethical hacking, for example, simulating security breaches
    • Generate reports for both technical and non-technical staff and stakeholders.
    • Data Security and Fraud Prevention.

DECISION-MAKING AUTHORITY

  • Subject matter expert on Information Security, cyber security, and data Privacy
  • Facilitate the following training:
    1. User awareness training for all staff
    2. Professional cyber-related training for technical staff
    3. Cybersecurity training and updates for Board Members
    4. Cybersecurity awareness for customers, suppliers, partners, outsourced service providers, and other third parties.
  • Submit the required cybersecurity regulatory returns to the Central Bank of Kenya, as per the prescribed timelines.
  • Ensure timely and comprehensive reports to the CEO, Senior Management, Board Audit Risk Management Committee, and the Board. These reports should be submitted at least quarterly.
  • Design and periodically review the Bank’s cybersecurity program
  • Support the submission of the following to the Board for approval, at least annually:
    1. Cybersecurity strategy/risk management plan.
    2. Cyber security policy and framework, or revisions thereof
    3. Cybersecurity risk assessments and risk appetite
    4. Cybersecurity budget
  • Design cybersecurity controls with the consideration of users at all levels of the organization and advises the Business. Follow up with the responsible functions for implementation.
  • Ensure that a business develops a cyber asset register that classifies its cybersecurity assets. Critical assets should be identified.
  • Identify and facilitate compliance to data protection/ data privacy requirements.
  • Manage the Security Operations Centre of the Bank to perform operational information security monitoring, testing, and threat intelligence. Where this function is outsourced, conduct oversight over and provide directions to any third-party service provider to whom this is outsourced.
  • As the cybersecurity coordinator, perform the following roles:
    1. Regularly review the Bank’s incident response plan. This should include a data breach response plan.
    2. Regularly review the composition of the CSIRT
    3. Train CSIRT members on their roles and responsibilities
    4. Conduct regular tests and report test results to senior management, Board Risk Management Committee, and Board Audit Committee.
  • Liaise with the Business Continuity Co-ordinator and the ICT function to ensure that adequate disaster recovery measures are in place i.e. functioning Disaster recovery site and adequate backups of critical IT systems and data in line with the required Recovery Time and Recovery Point Objectives.

ACADEMIC BACKGROUND

  • A minimum of a Bachelor’s degree in Information Technology, Computer science, Cybersecurity, business, or related fields.
  • A Master’s degree in IT security will be an added advantage.

WORK EXPERIENCE

  • 3- 5 years Banking Experience
  • Knowledgeable in IT operations
  • Proficient in IS Security
  • Knowledge of Data Protection laws & General Data Protection Regulations (GDPR) is an added advantage.

SKILLS & COMPETENCIES

  • Excellent interpersonal & Communication Skills.
  • Working in Teams.
  • Excellent analytical skills.
  • Organization skills.
  • Problem-solving skills.
  • Excellent knowledge of security tools.
  • Report writing skills.

PROFESSIONAL CERTIFICATION

  • Professional qualification such as Certified Information Systems Security Professional CISA, Certified Information Systems Security Professional CISM or Certified Information Systems Security Professional (CISSP).
  • Member of ISACA.

CLICK HERE TO APPLY

Apply by: 19th Nov, 2021

.

.

.


Processing…
Success! You're on the list.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Create a website or blog at WordPress.com

Up ↑

%d bloggers like this: