Alfred & Victoria Associates is one of Nigeria’s leading ICT solution based company. Our company offers a wide range of services which are in high demand of today’s emerging market.
Job Brief
  - We are looking for a technically sound security architect to be responsible for the design, building, testing, and implementation of security systems within our IT network.
  - The security architect's responsibilities include reviewing our current security measures, recommending enhancements, identifying areas of weakness, and responding promptly to possible security breaches.
  - You will also be responsible for conducting regular system tests and ensuring the continuous monitoring of the network's security.
  
 Responsibilities
  - Reviewing current system security measures and recommending and implementing enhancements
  - Planning, researching, and designing security architectures.
  - Developing, reviewing, and approving the installation requirements for LANs, WANs, VPNs, routers, firewalls, and related network devices.
  - Conducting regular system tests and ensuring continuous monitoring of network security
  - Researching and designing public key infrastructures, certification authorities, and digital signatures, and ensuring all personnel have IT access limited to their need and role in the organization.
  - Developing project timelines for system upgrades and preparing cost estimates.
  - Testing the final security system and updating and upgrading it as needed.
  - Establishing disaster recovery procedures and conducting security breach drills.
  - Responding quickly and effectively to all security incidents and providing post-event analyses.
  - Monitoring and guiding the security team, cultivating a sense of security awareness, and arranging for continuous education.
  - Remaining up to date with the latest security systems, standards, authentication protocols, and products.
  - Establishing disaster recovery procedures and conducting breach of security drills
  - Anticipating potential security threats, and acting upon them in time
  - Drawing up plans for future company safety, and communicating progress to senior management
  - Implementing new software to protect against intrusion, and monitoring relevant progress
  - Making important risk-based decisions regarding security, in line with company policies and national and international legislation
  
 Requirements and Skills
  - A bachelor's or associate's degree in IT, computer science, or related field.
  - Advanced IT security certifications may be advantageous, CISSP (Certified Information Systems Security Professional) certifications.
  - 7-10 years experience in information security and IT risk management.
  - A strong working knowledge of current IT risks, security implementations, and computer operating and software programs.
  - The ability to interact with a wide range of people from different backgrounds and races.
  - Excellent teaching, problem-solving, communication, and interpersonal skills.
  - Certified Data management Professional (CDMP)
  - In-depth understanding of database structure principles
  
 Key Skills & Competencies:
  - Extensive experience in information security and/or IT risk management with a focus on security, performance and reliability
  - Solid understanding of security protocols, cryptography, authentication, authorisation and security
  - Excellent written and verbal communication skills as well as business acumen and a commercial outlook
  - The role necessitates excellent communication and organizational leadership abilities.
  - You should have expertise in security measures such as firewalls, intrusion detection, and prevention systems (IDS/IPS), network access controls, and network segmentation.
  - You must be experienced with operating systems like Windows, Linux, and UNIX.
  - Network security architecture and its development are both important to understand.
  - Wireless security, such as routers, switches, and VLAN security, is something that everyone should be aware of.
  - DNS security principles such as routing, authentication, VPN, proxy services, and DDOS mitigation technology are all covered.
  
              
            
            Method of Application
            
               Signup to view application details. 
Signup Now