Skip to main content

Cyber Security Manager

Job TitleCyber Security Manager
LevelL4Location & CountryLagos, Nigeria
Reports ToHead IT Infra& OpsTeam SizeNA
Brief Job Description
The role would be responsible for End-to-End Cyber security management. Responsible for managing CIA security triad for organization Compliance audits for IT Infra and applications and vulnerability assessment and mitigation plans across the group.

Skills, Qualification and Experience

Key Selection Criteria’s



Experience, in years

Cyber Security Management 8


Exp of Handling multi business conglomerates

Academic Degree

Engineering or CS Background Graduate

Security certification / IT Bachelor with CEH, ISO27001, CISM or CISA or CISSP

Core Functional Area 1, with number of years of experience

Security operations, 8+

Exp in penetration testing, vulnerability assessment, IT security audits and mitigation.

Core Functional Area 2, with number of years of experience

Experience in IT Infra & Networks, 8+

Core Functional Area 3, with number of years of experience

Security tools & Audits 8+

Hands on with security tools, solutions, and implementation in multi business set up.

Key Responsibilities

Expected Results

1. Security implementation

  • End-to-End Cyber security management.

  • Managing CIA security triad for organization.

2. Deploying security controls

  • Preparing and securing the organization from emerging cyber threats.

  • Planning and deploying security controls and measures to enhance cyber security posture and reducing attack surface.

3. IT Security standards

  • Implementation & governance of IT Security standards like CIS, NIST, ISO etc.

  • Compliance Audits for IT Infra and Applications

  • Vulnerability assessment and mitigation plans

Key Interactions


  1. CIO

  2. Head IT Infra & Ops

  3. Business/ Functional Heads


  1. Vendors

  2. Consultants C.

Competencies Needed in Role

A. Behavioral Competencies

B. Functional Competencies

1. Good Communication and Active Listening

1. Security implementation

2. Outcome Orientation

2. Security controls

3. Attention to Detail

3. IT Security standards

4. Compliance Audits

Apply for this position

Allowed Type(s): .pdf, .doc, .docx