Thu. Apr 25th, 2024

Officer ICT Security Job Vacancy at URA

By KWS Adams Apr 16, 2021
ura experiential hiring``

Uganda Revenue Authority is a government tax collection agency that operates under the Ministry of Finance, Planning, and Economic Development. URA takes on the responsibility of collecting, enforcing, accounting, and assessing the various taxes in Uganda.

URA is an equal opportunity employer and, and is seeking persons with the requisite competencies, proven integrity, problem-solving, analytical and interpersonal skills, ability to handle multiple tasks under pressure to submit in their applications for the 1 open position of Officer ICT Security job.

JOB ROLE/ PURPOSE:

Implement and maintain ICT security controls to safeguard the Authority’s Information Technology systems and infrastructure against security risks

PRINCIPLE ACCOUNTABILITIES

  1. Participate in the design & building of the URA’s information security architecture in support of the URA’s mission

a) Engage key stakeholders to elicit security requirements adequate to provide assurance of security

b) Evaluate the efficacy of existing security controls & provide expert advisory services in this regard

c) Carry out threat modelling and security reviews for Software Development projects

d) Assist in developing information security policies, standards & guidelines

e) Provide input into the development of URA’s IT Security Strategy

  1. Support & maintain Information security solutions to ensure their continued efficacy

a) Test, deploy, maintain, review and administer the infrastructure hardware and software that are required to effectively manage network defenses.

b) Install, config, troubleshoot and maintain server security configurations to ensure their confidentiality, integrity, and availability.

c) Work with other teams to ensure good security practice is followed during deployments

  1. Identify, analyse and mitigate threats to URA’s IT Infrastructure

a) Carry out vulnerability assessments & penetration testing to establish the effectiveness of internal controls

b) Use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.

c) Analyze digital evidence and investigate security incidents to derive useful information in support of system/network vulnerability mitigation and investigations.

d) Keep abreast with emerging industry security threats that could potentially impact URA’s IT Infrastructure & work towards strengthening URA’s security posture

  1. Facilitate information security awareness programs

a) Provide input into the security awareness content

b) Conduct security awareness training using various channels

c) Conduct phishing assessments and other testing to ascertain level of awareness among different categories of staff

Qualifications

PERSON SPECIFICATIONS

Essential Requirements

a) An honors Bachelor’s Degree in IT/Computer Science or related technical science degree from a recognised University.

b) At least 2 years’ experience in security, network administration, software development role gained in a complex IT environment

Desirable Requirements

a) Information Security Certification Such as; CISSP, CSSLP, CEH, Security+, Any GIAC, OSCP, CCSA, CCNA or other Vendor Specific InfoSec Certification

b) Certification in ITIL, LPI

c) Experience in managing Web or Network Firewalls

d) Experience in threat Modelling & Secure SDLC

e) Experience in maintenance of Network Infrastructure

f) Experience in penetration testing & vulnerability assessments of network, web or mobile platforms

g) Experience in digital forensics & incident response

h) Experience in installing & Securing Server Infrastructure

Knowledge

Knowledge of cyber threat actor categories
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of cyber-attack stages
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
Knowledge of OSI model and underlying network protocols
Knowledge of penetration testing principles, tools, and techniques.
Knowledge of Application Security Risks
Knowledge of prevalent cyber threats, tactics, techniques and procedures
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Knowledge of how traffic flows across the network
Knowledge of basic system, network, and OS hardening techniques.
Knowledge of network tools (e.g., ping, traceroute, nslookup)
Knowledge of operating system command-line tools.
Knowledge of Security Service Management Frameworks & methodologies ( ISO 27001, ITIL4, DevSecOps )
Knowledge of concepts and practices of processing digital forensic data.
Knowledge of installation, integration, and optimization of system components.
Knowledge of Interpreted & compiled computer languages

SPECIAL SKILLS AND ATTRIBUTES

a) Skill in applying security controls.

b) Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).

c) Skill in performing packet-level analysis.

d) Skill in technical writing.

e) Skill in writing about facts and ideas in a clear, convincing, and organized manner.

f) Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.

g) Ability to answer questions in a clear and concise manner.

h) Ability to ask clarifying questions.

i) Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

j) Ability to communicate effectively when writing.

k) Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.

l) Ability to operate common network tools (e.g., ping, traceroute, nslookup)

m) Ability to execute OS command line (e.g., ipconfig, netstat, dir, powershell)

Additional information

Organization: ICT Security
Primary Location: Uganda-Nakawa HQs
Job: 10150.Officer ICT Security
Schedule: Contractual
Shift: Standard
Job Type: Full-time
Job Level: Day Job
Job Posting: Apr 12, 2021, 12:00:00 AM
Unposting Date: May 1, 2021, 11:59:00 PM

How to apply

Visit URA is hiring and see how to apply.

By KWS Adams

My name is KWS Adams . (Call me Kateregga). I am an IT addict who loves playing around with computers and internet. Computers help me try out different things while turning them into reality, while the internet powers me stay live online. Besides computers, I am a project planning and management professional with an Award obtained from MUK, one of the oldest and best Universities in Africa. Find me on Twitter, Facebook and Whatsapp. Find more on how to contact me using the contact me page.

Related Post

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.