IT SECURITY AUDITOR

WHO WE ARE

Broadband Systems Corporation, PLC (BSC) is a licensed Internet Service Provider (ISP) that is incorporated under the laws and regulations of the Republic of Rwanda.

We are engaged in the business of providing advanced Information Communication Technology services based on broadband connectivity.

In order to effectively accomplish our business objectives, we are looking for a qualified and competent candidate to fill the position of “IT Security Auditor”.

JOB PURPOSE:

The job purpose of an IT Security Auditor is to assess and review an organization’s information security and IT security practices to ensure the confidentiality, integrity, and availability of its sensitive data and critical IT systems. This role combines the responsibilities of both an Information Security Auditor and an IT Security Auditor, encompassing a broader scope of technology-related assessments and findings implementation advisory. In addition, you will be required to advise BSC on how to conduct DPIA to ensure the organization’s compliance with data protection and privacy regulations, such as the General Data Protection Regulation (GDPR).

WHAT YOU WILL DO:

  1. Security Audits and Assessments: Plan and execute comprehensive security audits and assessments of IT systems, applications, networks, and processes. Evaluate the effectiveness of security controls, identify vulnerabilities, and assess compliance with internal policies, industry standards, and regulatory requirements.
  2. Risk Assessment and Management: Conduct risk assessments to identify potential security threats and vulnerabilities. Evaluate the impact and likelihood of risks and provide recommendations for risk mitigation and control implementation.
  3. Security Policies and Procedures: Review and evaluate the effectiveness of information security policies, standards, and procedures. Provide recommendations for policy enhancements and aligning security practices with industry best practices.
  4. Vulnerability Management: Assess the effectiveness of vulnerability management programs, including vulnerability scanning, penetration testing, and patch management processes. Identify gaps and provide recommendations for improving vulnerability identification, prioritization, and remediation.
  5. Audit Reporting: Prepare clear and concise audit reports documenting findings, recommendations, and management action plans. Communicate audit results to relevant stakeholders, including senior management, IT teams, and business units.
  6. Control Testing and Validation: Perform control testing to validate the implementation and effectiveness of security controls. Evaluate the design and operating effectiveness of controls and identify control deficiencies or weaknesses.
  7. Security Awareness and Training: Promote security awareness and educate employees on information security policies, best practices, and compliance requirements. Collaborate with training teams to develop and deliver security awareness programs.
  8. Incident Response Evaluation: Assess the effectiveness of incident response plans, procedures, and capabilities. Review incident response documentation, conduct tabletop exercises, and provide recommendations for improving incident response readiness and effectiveness.
  9. Continuous Improvement: Stay updated with the latest security threats, vulnerabilities, and industry trends. Continuously enhance knowledge and skills through training, certifications, and participation in security conferences and forums. Contribute to the improvement of SOC processes, procedures, and technologies.
  10. Intrusion Detection and Prevention: Manage and maintain intrusion detection and prevention systems (IDS/IPS) to detect and prevent unauthorized access attempts, malware infections, or other malicious activities. Fine-tune and update rule sets and signatures to improve detection accuracy.

QUALIFICATIONS AND REQUIREMENTS:

  • A minimum of a bachelor’s degree in Software Engineering, Computer Engineering, Information Technology, or any related discipline.
  • Must be a Certified Ethical Hacker (CEH).
  • Excellent communication skills, both written and verbal.
  • Strong interpersonal skills and the ability to work well in a team.
  • Passion for the selected department or field of interest.
  • Willingness to learn and adapt to new opportunities and roles.
  • Flexibility and open-mindedness to embrace new challenges.
  • Attention to detail and a commitment to quality work.
  • Self-motivated and proactive attitude.

OUR BENEFITS:

  • Professional growth and training
  • Medical Insurance covering you and your dependents
  • Tools of trade & connectivity
  • Communication allowance
  • Home Internet
  • Fitness club subscription
  • Savings and pension funds
  • An exceptional workplace offering growth prospects, continuous learning opportunities, and a dynamic, inclusive, and innovative team.”

We aim to provide a great recruitment experience for our candidates while fostering a dynamic and welcoming workplace. Applicants are encouraged to submit application promptly as application are evaluated on a rolling basis. Qualified candidates will be contacted with further communication regarding next stages.

CLICK HERE TO APPLY NOW

JOIN OUR WHATSAPP COMMUNITY:

https://chat.whatsapp.com/K3VKiwrHWs972qUAkuojGW

 Whatsapp Channel:

https://whatsapp.com/channel/0029VaiMgtN7YScy8OHyoI20

JOIN OUR WHATSAPP GROUP:

https://chat.whatsapp.com/I4QLanFQ1rU532nZywWlZ9

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here