Technical Director, Cybersecurity Job World Vision Kenya

Technical Director, Cybersecurity Job World Vision Kenya

Job Purpose

Individuals working as a Technical Director, Cybersecurity oversee the planning, execution, and management of multi-faceted projects related to compliance, control assurance, risk management, security, and infrastructure/ information asset protection. They are responsible for developing and managing security across multiple IT functional areas (e.g., data, systems, network, and/or Web) across the enterprise, developing and managing enterprise security services, and developing security solutions for critical and/or highly complex assignments to ensure the company’s infrastructure and information assets are protected. They work on multiple projects or programs as a team lead.

Major Responsibilities:   

Strategy (5%)

  • Provides strategic and tactical direction and consultation on security and IT compliance.

Policies, Procedures, & Standards (5%)

  • Acts as a primary support contact for the development of secure applications and processes.
  • Maintains an up-to-date understanding of industry best practices.
  • Develops, enhances, and implements enterprise-wide security policies, procedures, and standards across multiple platform and application environments. Monitors the legal and regulatory environment for developments.  Recommends and manages implementation of required changes to IT policies and procedures.
  • Monitors compliance with security policies, standards, guidelines, and procedures.
  • Ensures security compliance with legal and regulatory standards.

Business Requirements (5%)

  • Engages directly with the business to gather a full understanding of project scope and business requirements.
  • Assesses business needs against security concerns and articulates issues and potential management risks.
  • Consult with other business and technical staff on potential business impacts of proposed changes to the security environment.
  • Provides security-related guidance on business processes.

Security Solutions (5%)

  • Works closely with IT and development teams to design secure infrastructure solutions and applications, facilitating the implementation of protective and mitigating controls.

Operations Solutions (5%)

  • Defines security configuration and operations standards for security systems and applications, including policy assessment and compliance tools, network security appliances, and host-based security systems.
  • Defines and validates baseline security configurations for operating systems, applications, networking, and telecommunications equipment.

Risk Assessments (10%)

  • Works directly with the customers and other internal departments and organizations to facilitate IT risk analysis and risk management processes and to identify acceptable levels of residual risk.
  • Conducts business impact analysis to ensure resources are adequately protected with proper security measures.
  • Assesses potential items of risk and opportunities of vulnerability in the network and on information technology infrastructure and applications.
  • Reviews risk assessments, analyzes the effectiveness of IT control activities, and reports on them with actionable recommendations.
  • Evaluate security risks and identify and define compliance strategies by policies and standards.
  • Provide management with risk assessments and security briefings to advise them of critical issues that may affect customer or corporate security objectives.
  • Communicates with multiple departments and levels of management to resolve technical and procedural IT security risks.
  • Develops remediation strategies to mitigate risks associated with the protection of infrastructure and information assets.

Information/Data Security (5%)

  • Defines, identifies, and classifies information assets.
  • Assesses threats and vulnerabilities regarding information assets and recommends the appropriate security controls and measures.
  • Develops and manages security measures for information systems to prevent security breaches.
  • Consult with clients on the data classification of their resources.
  • Provide reports to leaders regarding the effectiveness of information security and make recommendations for the adoption of new policies and procedures.
  • Develops and implements strategies to align information security with business objectives and goals, protecting the integrity, confidentiality, and availability of data.

Security Audits (10%)

  • Performs security audits.
  • Participates in security investigations and compliance reviews as requested by external auditors.
  • Consult with clients on security violations.
  • Acts as liaison between internal audit and IT to ensure commitments are met and controls are properly implemented.

Incident Management (10%)

  • Assists the security operations team in troubleshooting and resolving escalated security-related issues.
  • Builds security incident response teams.
  • Authors incident response plans and support documentation and diagrams.

Business Continuity/Disaster Recovery (5%)

  • Develops impact analysis.
  • Assists business partners with the determination of critical business processes and systems.
  • Identifies and coordinates resolution of recovery issues.

Security Performance Management (5%)

  • Develop measures to evaluate the security programs and modify strategies as appropriate.
  • Analyzes reports and makes recommendations for improvements.

Communications/Consulting (5%)

  • Serves in an advisory role in application development projects to assess security requirements and controls and ensures that security controls are implemented as planned.
  • Collaborates on critical IT projects to ensure that security issues are addressed throughout the project life cycle.
  • Provides input for the development of the security architecture.
  • Informs stakeholders about compliance and security-related issues and activities affecting the assigned area or project.
  • Interfaces with business and IT leaders communicating security issues and responding to requests for assistance and information.​
  • Reports to management concerning residual risk, vulnerabilities, and other security exposures, including misuse of information assets and noncompliance.

Vendor Management (5%)

  • Works with third-party vendors during problem resolution. Interfaces with third-party vendors to evaluate new security products or as part of a security assessment process.​
  • Coordinates with vendors to ensure managed services are implemented and maintained appropriately.

Research/Evaluation (5%)

  • Leads and reviews application security risk assessments for new or updated internal or third-party applications.
  • Maintains contact with vendors regarding security system updates and technical support of security products.
  • Assists in cost-benefit and risk analysis.

Training (5%)

  • Develop security awareness and compliance training programs. Provides communication and training as needed. Provides security briefings to advise on critical issues that may affect clients.
  • Conducts knowledge transfer training sessions for the security operations team upon technology implementation.

Coaching/Mentoring (10%)

  • Provides ongoing knowledge transfer to team members and clients on security products and standards.
  • Mentors less-experienced team members.

Knowledge/Qualifications For The Role:

Required Professional Experience

  • Requires 10 – 15 years of cyber, privacy, compliance, or risk management function or a closely related role.
  • Over 10 years of experience as a senior manager or information security officer.
  • Over 5 years of experience managing cyber security incident response teams. Experience designing and implementing security solutions.
  • Requires in-depth knowledge of PCI-DSS, privacy laws, security standards, security best practices, and security regulations. A high proficiency level in threat management, risk management, vulnerability management, and compliance management is required.
  • Effective in written and verbal communication in English
  • Willingness and ability to travel domestically and internationally, as necessary.

Required Education, training, license, registration and certification

  • Bachelor’s degree in Computer Science, Information Systems, or other related field, or equivalent work experience.
  • Requires Security Certification (i.e., Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Global Information Assurance Certification (GIAC).

Preferred Knowledge and Qualifications

  • Fluent in English.
  • Have strong incident and investigation management skills.
  • Have strong communication skills.
  • Have good planning and organizing skills.
  • Strategic thinker with strong influencing skills and exceptional professional credibility.
  • Outstanding stakeholder management skills combined with the ability to challenge and influence constructively.
  • Have proven ability to collaborate effectively and develop positive working relationships across all levels of an organization.
  • Have strong analytical skills, with the ability to gather, analyze, and evaluate information and to prepare concise written reports.
  • Have technical expertise on risk assessment tools and methods or the willingness to learn.
  • Good understanding of the different field contexts or experience working in at least 2 different contexts (e.g. development, transitioning, fragile, conflict, humanitarian, etc.)

How To Apply

Click Here To Apply