Equity Bank is one of the region’s leading banks whose purpose is to transform the lives and livelihoods of the people of Africa socially and economically by availing them modern and inclusive financial services that maximize their opportunities. With a strong footprint in Kenya, Uganda, Tanzania, Rwanda, South Sudan and DRC Congo, Equity Bank is now home to over 12 million customers – the largest customer base in Africa. Currently the Bank is seeking additional talent to serve in the role outlined below.
The CISRO Function
The Group Chief Information Security Risk Officer (CISRO) function is instrumental in protecting and ensuring the resilience of Equity Group’s data and IT systems by managing information, cybersecurity, and IT risk across the enterprise. As a critical function reporting into the Group Chief Risk Officer (CRO), the CISRO function serves as the second line of defence for assuring ICS controls are implemented effectively and in accordance with the Risk Framework and for instilling a culture of cyber security within the Bank.
The Group CISRO is responsible for ICS governance, strategy, policy, risk assessments, industry partnerships, and regulatory engagement. The Office of the CISRO is central to ensuring the Bank’s ability to meet its ICS commitments to internal and external stakeholders, including regulators, as well as maintaining an acceptable ICS risk profile that is regularly reported to the Board.
The IT Risk Specialist role is highly technical and challenging with opportunities to be part of a team that will have a meaningful impact. The is expected to possess a adequate understanding of both cyber security and information technology and should understand concepts including computer networking, web and native application functionality, operating system functionality, cloud services, corporate network environments and operations.
He should be able to learn advanced concepts such as endpoint protection evasion, covert operations, and tailored exploit development.
The role leverages previous penetration testing and Red Team experience. This may involve delivering Threat Intel-led Red Team exercises, developing social engineering test campaigns and the associated collateral, executing phishing campaigns and attempting to compromise internet-facing systems, conducting privilege escalation and lateral movement within the group’s networks, hunting for objectives with little-to-no information provided at hand and attempting to ex-filtrate data from the network; all while avoiding detection from the bank’s security operations teams. The role will require you to perform exploits at scale while remaining stealthy, identify and exploit misconfigurations in the corporate infrastructure, quickly and effectively parse data, present relevant data in a digestible manner, think well outside the box.
Support the review and update of the technology risk management framework on an annual basis with the changes in the environment.
Review technology policies, processes and procedures identify potential opportunities for improvement and alignment.
Working across the technology department to analyze and better understand their
Review IT initiatives from technology risk perspectives and provide advisory and recommendation.
Supervise the IT disaster recovery measures deployed across the group.
Defining a risk and control methodology and framework to use in conducting risk assessments.
Proactively managing risks so that there are no major incidents, breaches, or examples of non-compliance.
Adhere to, advise, oversee, monitor and enforce enterprise frameworks and methodologies that relate to technology controls activities.
Support the definition of the technology risk appetite statements
Monitor Key Risk Indicators (KRIs) and report on deviation from defined technology risk appetite.
Assist with the Technology Risk reporting operations, including scheduling key monthly meetings, monitoring key milestones, escalation of past due activities, problem triage and management.
Increase awareness and enhance risk culture across the organization and provide day to day risk and control advise as trusted 2nd line subject matter expert.
The Ideal Candidate
Bachelor’s degree in Computer Science, Information and Cyber Security, Technology or equivalent
5 years of relevant in information security or risk management, audit, information assurance preferably in Banking and Financial sector
Must have CISA (Certified Information Systems Auditor) certification
CISSP (Certified Information Systems Security Professional) * Added advantage
Must have CCSP (Certified Cloud Security Professional) certification
Other ISACA related Certification (e.g., CISM, CRISC or CGEIT) * Added advantage
Consistently able to demonstrate or articulate value proposition
Candidates must have hands on experience in performing risk assessments in diverse technology environments
Good understanding of technology infrastructure, networks, and database management systems.
Good understanding of cloud computing technologies and Microsoft Azure environment.
Expertise in Linux machine recommended Kali and parrot.
Familiar with various operating systems and databases
Ability to both assess priorities and to focus on work in a structured fashion which delivers results
Sound judgement and anticipation
Strong integrity, independence, and resilience
Deliver with minimal supervision.
Avid researcher of best practices and happenings in the global cyber space.
Engage key stakeholders on actions required.
Team player and contributor
Strong problem-solving, persuasive skills and an ability to grasp abstract concepts and complex technology situations to challenge the status quo and further develop and build on our IT Risk Management Framework.
Excellent communication skill, both verbal and written, with the ability to initiate and lead conversations with technology and business leaders and risk colleagues regarding anticipated and emerging issues.
how to apply
For more information and job application details, see; https://equitybank.taleo.net/careersection/ext_new/jobsearch.ftl?lang=en