Senior Manager, Regional Information Security (MENA) at MTN

eg. Accountant or Accounting or Kempinski



Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.


Senior Manager, Regional Information Security (MENA) at MTN





A Must Read Article: 10 checks to identify fraudulent or scam job offers

Free Tuition Scholarships to Study in UK, US etc.

Click here to join us on Telegram

1. Patiently scroll down and read the job description below.

2. Scroll down and find how to apply or mode of application for this job after the job description.

3. Carefully follow the instructions on how to apply.

4. Always apply for a job by attaching CV with a Cover Letter / Application Letter.


MTN is entering a new phase in its lifecycle where operational and commercial excellence has become critical for success. Increased focus in the Commercial areas, new products and services, scaling up of Digital and Fintech capabilities, it is important to recognize the need to secure MTN’s Platforms, Applications, Networks and Systems from new threats and vulnerabilities. The urgency for change has become more heightened amidst increased competitive intensity across all markets in which MTN operates.

The incumbent must therefore ensure the successful delivery in context of:


ADVERTISEMENT

CONTINUE READING BELOW


  •  An expertise-based multicultural organisation
  • A dynamic and evolving field of Telecommunications
  • Revolutionary workforce practices which are bringing together global labour markets
  • onvergence in markets and exploration of non-traditional revenue streams requiring
  • complex interpretation and structuring
  • Evolving industry sector constantly presenting new challenges and opportunities to the core businesses
  • Rapid horizontal and vertical expansion of MTN, in terms of size, products, customers and geographic distribution

 

Key Deliverables

     The Senior Manager Regional Information Security will be accountable to achieve the following objectives:

Strategy Implementation

  •  Oversee the development of country specific Information Security plans for each of the OPCOs within the region in alignment with the Group Information Security priorities and plan while addressing local country needs
  • Implementation of the Information Security Policy and Standards in line with the overarching Group and local business goals and Group InfoSec priorities
  • Conduct regular reviews of the information security effectiveness in the Opcos within the region to ensure its alignment with the changing dynamics of the internal and external ecosystem, products and services being launched.


ADVERTISEMENT

CONTINUE READING BELOW


Reporting

  • Report on a monthly basis to the GM: Group Information Security Program Management relating to progress made within the function and in accordance with the measurement metrics set by the organisation
  • Provide regular feedback to key stakeholders within the OPCOs and Group in alignment with the OPCO Plans and KPI’s

 

Budgets

  • Develop and manage project initiative budgets in line with business objectives
  • Ensure that the cost of operations is reduced, in line with a least cost operating strategy stemming from the business drivers
  • Facilitate the development of OPCO Security budgets in alignment with Group direction and local OPCO requirements

Operational Delivery & Execution

  • Oversee and proactively manage the ways of working between the Hub and Spoke Opcos,  in line with the agreed terms and SLAs
  • Moderate and proactively address operational challenges between the Hub and Spoke Opcos
  • Establish and lead the overarching Regional Information Security strategy and governance model for the various Regions
  • Ensure the Regional Information Security support and drive continuous improvement initiatives in the regions with respect to Information Security operations, governance, and architecture.
  • Provide regional perspectives and inputs to Global InfoSec teams to enable globally relevant business/Information Security solution designs
  • Drive implementation of policies and mechanisms to control the access of data, as well as response to data breaches in the Opcos within the region
  • Define and implement processes to respond to security incidents involving the loss or compromise of sensitive data in the Opcos
  • Manage and actively drive the notification of a data or privacy breach to affected individuals, regulatory authorities, covered entities, and media
  • Define requirements and ensure implementation of monitoring and protection of data in use, data in motion, and data at rest based on classification
  • Ensure execution of segregation of duties (SoD) tests in the Opcos against access settings, and report contention
  • Ensure implementation of adequate security countermeasures in the Opcos to prevent of unauthorized access and malware infection of IT networks and systems
  • Conduct periodic reviews for network and/or system monitoring for malicious activities or policy violations
  • Ensure implementation of firewall rule requests, review, and approval process as per Group standards and processes in the Opcos
  • Ensure implementation of secure configuration / hardening standards in line with Group approved standards, in the Opcos
  • Ensure implementation of information security controls in the Opcos to protect databases and stored data
  • Implement Group policies and minimum expectations for completing a business impact analysis (BIA) and Risk Assessment
  • Ensure Opco recovery and business continuity strategies, plans, and procedures from an Information Security perspective are reviewed and implemented in the Opcos

 

Governance and Regional Oversight

  • Establish governance and oversight protocols with Opcos to ensure critical strategic Information Security metrics are achieved collectively
  • Establish internal team cadence (amongst Regional Information Security Managers) to discuss, understand and resolve information security related issues across all the regions 
  • Cascade and drive critical Global Information Security metrics and targets within the regions
  • Review Regional Opco Information Security KPI targets and performance across all regions on a periodic basis and craft region specific interventions as required
  • Co-Develop the IPF for each of the heads of security within the OPCOs within the region and manage performance against the IPF  
  • Provide visibility, decision support and effective governance of Cyber Security and Threat Management programs within the regions
  • Review, report and resolve high risk / priority cyber threat trends across the regions on a periodic basis

 

Global Solution Development and Projects

  • Based on understanding of the Region, provide inputs to the Group Information Security teams to plan for global program and initiative release schedules
  • Monitor progress and provide insights to the respective Group Information Security Program owner
  • Independently evaluate the success and impact of the program with respect to the Opco and Region.
  • Provide feedback to the respective Group Information Security Program owner to enable improvements and course correction


ADVERTISEMENT

CONTINUE READING BELOW


Opportunities You Might Like:

Job Requirements (Education, Experience and Competencies)

Education:

  • Minimum of 4-year tertiary degree / diploma (Bachelor of Science, Engineering or related field)
  • MBA or Masters (advantageous)
  • CISSP Certification
  • Other preferred certifications are: CISA, CISM, CBCP, ISO 27001 Lead Auditor or Lead Implementer
  • Prince 2 (advantageous)

Experience:

  • Minimum of 10 years of working experience in the Information Security domain
  • Experience in the Financial Services or telecommunication sector is advantageous
  • Minimum of 4 to 5 years of Senior Management experience 
  • Experience in Information Security related Governance, Enterprise Risk Management and Compliance
  • Experience working in Africa and Middle East and have a grasp of political, social, infrastructure and integrity challenges
  • Advanced working understanding of the information technology environment of a telecom company
  • Worked across diverse cultures and geographies
  • Pan Africa multi-cultural experience is advantageous

Competencies:

Functional Knowledge:

  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies
  • Cyber defence
  • Security architecture
  • Security operations
  • Data protection
  • Resiliency
  • Secure development lifecycle
« Go back to the jobs list


RELATED JOBS >> CLICK A JOB BELOW TO VIEW & APPLY



ADVERTISEMENT

CONTINUE READING BELOW




Before you look at how to apply for the job, take a look at the recommended career resources and guides we have for you. It is always good to prepare yourself for your dream job. Carefully read the articles and proceed to apply.

How to Apply

Click here to apply >>

JobSearch South Africa Job Widget

Display job vacancies in South Africa on your website or blog for FREE!!

Get Started !!


Disclaimer

  • Do not pay any fee to any Recruiter.
  • The Recruiter may amend, delete or expire jobs at any time without notification.
  • The Recruiter reserves the right not to proceed with filling the position.
  • An application will not in itself entitle the applicant to an interview.

DSPA VACANCIES & GOVERNMENT JOBS IN SOUTH AFRICA TODAY

JobSearch South Africa is your most reliable website for latest jobs in South Africa today. If you are interested in getting genuine and reviewed job vacancies in South Africa from the best companies, then you are in the right place. Browse For DPSA vacancies, Government jobs & More. You can find LinkedIn jobs and Indeed jobs, here

TOP CAREER ARTICLES FROM EXPERTS

Job search is not an easy journey especially for job vacancies in South Africa. That is why we have engaged experts to write seasoned articles to guide your job search in South Africa. We cover interviews, cover letters, CVs, aptitude tests, workplace life, entrepreneurship, personal finance and more. Check out our career articles page today!

Top