1.CYBER RISK MANAGER . 2. INFORMATION SECURITY MANAGER | PezaJob

Description:

1.CYBER RISK MANAGER
2.INFORMATION SECURITY MANAGER

Lusaka

A reputable organization is seeking qualified candidates for the following positions. If you are passionate about working in a dynamic environment and meet the required qualifications, we encourage you to apply.

1.CYBER RISK MANAGER

Key Responsibilities:
Conduct regular cyber risk assessments and maintain the enterprise risk register.
Develop, implement, and enforce cybersecurity policies and procedures.
Ensure compliance with relevant regulations (Bank of Zambia, Data Protection Act, ISO 27001).
Oversee vendor and third-party security assessments and maintain related documentation.
Coordinate and update the organization’s BCP and DRP in collaboration with relevant departments.
Track, report, and escalate key risk indicators (KRIs) and incidents. Support internal and external audits related to cybersecurity and operational risk.

Qualifications & Experience
Bachelor’s degree in Risk Management, Information Security, Information Systems, or related field.
Background in finance/compliance/audit is an advantage.At least one of the following:Cyber Risk Management CRISC,CISA,ISO 27001 Lead Implementer/Auditor.
 Minimum 3 years in:Risk management or cyber governance,Policy and procedure development, BCP/DRP implementation

2.INFORMATION SECURITY MANAGER

Key Responsibilities:

Administer and maintain technical security controls, including MFA, RBAC, encryption, firewalls, and endpoint protection.
Conduct regular vulnerability assessments and coordinate external penetration testing.
Lead the implementation of security configurations for cloud environments (e.g., AWS, Azure).
Monitor security alerts and logs using SIEM tools and respond to threats in coordination with the CISO.
Develop and deliver employee cybersecurity training and awareness programs.
Collaborate with IT and operations teams to ensure secure systems design and implementation.
Support regulatory audits and respond to security-related inquiries from regulators or partners.

Qualifications & Experience

Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
At least one of the following:CISSP, CISM, CEH, CompTIA Security+. 3–5 years in IT security with experience in:Network and endpoint protection, Cloud environments, SIEM tools and incident response. Proficiency in configuring firewalls, IDS/IPS, endpoint security, Familiarity with encryption, backups, and patch management.

See the poster for how to apply