Skip to main content
Logo

Manager – Cyber Security

Job Title

Cyber Security Manager

Company/Unit

AIG

Department

IT

Reports To

Head IT Infra& Ops

Location & Country

Lagos, Nigeria

Brief Job Description

The role would be responsible for End-to-End Cyber security management. Responsible for managing CIA security triad for organization Compliance audits for IT Infra and applications and vulnerability assessment and mitigation plans across the group.

Key Responsibilities

  • Security implementation:
    1. End-to-End Cyber security management.
    2. Managing CIA security triad for organization.
  • Deploying security controls:
    1. Preparing and securing the organization from emerging cyber threats.
    2. Planning and deploying security controls and measures to enhance cyber security posture and reducing attack surface.
  • IT Security standards:
    1. Implementation & governance of IT Security standards like CIS, NIST, ISO etc.
    2. Compliance Audits for IT Infra and Applications
    3. Vulnerability assessment and mitigation plans

Experience & Qualifications

  • Minimum 8 years of experience in Cyber Security, specifically in managing security for multiple business conglomerates.
  • Graduation in Engineering or Computer Science, preferably with certifications in Security or IT Candidates with certifications such as CEH, ISO27001, CISM, CISA, or CISSP would be preferred.
  • At least 8 years of experience in handling security operations in corporate environments. Experience in penetration testing, vulnerability assessment, IT security audits, and mitigation is advantageous.
  • Proven experience of at least 8 years in IT Infrastructure and Network security.
  • Strong expertise in Security tools and audits. Hands-on experience with implementing security tools and solutions in diverse business setups is desired.

Competencies Needed in Role

  • Behavioral Competencies:
    1. Good Communication and Active Listening
    2. Outcome Orientation
    3. Stakeholder Partnering
  • Functional Competencies:
    1. Security implementation
    2. Security controls
    3. IT Security standards
    4. Compliance Audits

Apply for this position

Allowed Type(s): .pdf, .doc, .docx