0% found this document useful (0 votes)
20 views2 pages

Cyber Security Manager

Uploaded by

Susan Kondowe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views2 pages

Cyber Security Manager

Uploaded by

Susan Kondowe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

JOB DESCRIPTION

Job Title Cyber Security Manager


Reports to ICT Director
Job Grade
Location Lusaka
Job Purpose
Develop and oversee the implementation of information security procedures and policies.
Build, maintain and upgrade security technology, such as firewalls, for the safe use of
computer networks and the transmission and retrieval of information. Design and
implement appropriate security controls to identify vulnerabilities and protect digital files
and electronic infrastructures. Monitor and respond to computer security breaches,
viruses, and intrusions, and perform forensic investigation. May oversee the assessment
of information security systems.

Key Result Areas

 Assess the quality of security controls, using performance indicators.


 Conduct investigations of information security breaches to identify vulnerabilities and
evaluate the damage.
 Coordinate documentation of computer security or emergency measure policies,
procedures, or tests.
 Coordinate monitoring of networks or systems for security breaches or intrusions.
 Coordinate vulnerability assessments or analysis of information security systems.
 Develop information security standards and best practices and ensuring that
necessary certificates have been obtained.
 Develop or implement software tools to assist in the detection, prevention, and
analysis of security threats
 Develop or install software, such as firewalls and data encryption programs, to protect
sensitive information.
 Identify or implement solutions to information security problems.
 Identify security system weaknesses, using penetration tests.
 Oversee development of plans to safeguard computer files against accidental or
unauthorized modification, destruction, or disclosure or to meet emergency data
processing needs.
Qualifications & Experience

Diploma, Bachelor's or Master's degree in Computer Science, Computer Engineering, or a


related field.

Grade 12 certificate

Proven experience in Business Intelligence tools or systems development, with at least


2years of experience in a leadership or managerial role
Strong knowledge of Analyzing market strategy development methodologies, tools, and
technologies.
Excellent problem-solving and decision-making skills
Ability to work collaboratively in a fast-paced, dynamic environment

CONTENT ACCEPTANCE

Incumbent ……………………………………………………………………………
Signature ……….

Date ……………………………………………………………………………
……….

Line Manager ……………………………………………………………………………


……….

Date ……………………………………………………………………………
……….

Human Resources ……………………………………………………………………………


……….

Date ……………………………………………………………………………
……….

You might also like