ICT Officer (Security Management) job at Muhimbili National Hospital (MNH)
Website :
20 Days Ago
Linkedid Twitter Share on facebook
ICT Officer (Security Management)
2025-07-14T10:09:38+00:00
Muhimbili National Hospital (MNH)
https://cdn.greattanzaniajobs.com/jsjobsdata/data/employer/comp_3696/logo/Muhimbili%20National%20Hospital%20(MNH).jpg
FULL_TIME
 
Dar es Salaam
Dar es Salaam
00000
Tanzania
Healthcare
Computer & IT
TZS
 
MONTH
2025-07-27T17:00:00+00:00
 
Tanzania
8

QUALIFICATION AND EXPERIENCE    

i.Bachelor Degree in Information Technology, Computer Science, Computer Engineering, Computer Security, Software Engineering or equivalent degree from a recognized institution.

ii.Knowledge of industry ICT Security Management System, cyber security regulatory frameworks and best practices,

iii.Knowledge of ICT Risk Management, Knowledge of Networking, System Administration, Programming and Database Administration,

iv.Knowledge of SOC, NOC operations, threat vectors and basic mitigation controls such as IPS, IDS, WAF,

v.Demonstrated proficiency in using various open-source and proprietary cyber security tools,

vi.Certification in the ICT security field such as CEH, CIH, ECSA, LPT, CISA, CISSP, CISM, OCSP and CSX-CP will be an added advantage.

DUTIES AND RESPONSIBILITIES

i.To perform audit and security compliance checks, including network penetration testing, vulnerability scans, and other configuration analysis.

ii.To Lead the ICT team and consult them on the remediation of security vulnerabilities

iii.To Hunt cybersecurity threats and mitigate them before they compromise the organization.

iv.To Implement appropriate security tools and systems to uncover potential threats before they turn into attacks.

v.To Develop cyber threat models and security risk assessments and recommend mitigations and countermeasures to address risks, vulnerabilities, and threats.

vi.To Conduct Malware monitoring, analysis, and reverse engineering.

vii.To Perform Information Security Incident Handling and Digital Forensic Investigations.

viii.To Analyze network traffic for intrusions and cyberattacks in both parameters and internal networks.

ix.To Monitor and analyse events and alerts from a wide array of security devices and systems (SIEMs, Firewalls, IDS/IPS, WIPS, Systems, Networks, Anti-virus, etc.)

x.To Administer the Security Incident and Event Management system (SIEM) and ensure all mission-critical systems are well integrated.

xi.To Take Part in the software development lifecycle and uncover potential flaws before and after deployment.

xii.To Formulate and review IT Security controls following best practice benchmarks for applications, operating systems, network devices, storage, databases, and endpoints.

xiii.To Implement Cyber controls as stipulated in the policies and procedures.

xiv.To Perform cybercrime incident coordination, analysis, and response in collaboration with the authorities and the internal fraud unit.

xv.To access and document the damage caused by security breaches and report to all stakeholders.

xvi.To prepare security alerts and warnings to the users and interested parties.

xvii.To maintain technical knowledge by attending educational workshops; reviewing publications.

xviii.To be part of the team, support security initiatives through predictive and reactive analysis and articulate emerging trends to management and staff.

xix.To perform any other related information security duties assigned from time to time.

i.To perform audit and security compliance checks, including network penetration testing, vulnerability scans, and other configuration analysis. ii.To Lead the ICT team and consult them on the remediation of security vulnerabilities iii.To Hunt cybersecurity threats and mitigate them before they compromise the organization. iv.To Implement appropriate security tools and systems to uncover potential threats before they turn into attacks. v.To Develop cyber threat models and security risk assessments and recommend mitigations and countermeasures to address risks, vulnerabilities, and threats. vi.To Conduct Malware monitoring, analysis, and reverse engineering. vii.To Perform Information Security Incident Handling and Digital Forensic Investigations. viii.To Analyze network traffic for intrusions and cyberattacks in both parameters and internal networks. ix.To Monitor and analyse events and alerts from a wide array of security devices and systems (SIEMs, Firewalls, IDS/IPS, WIPS, Systems, Networks, Anti-virus, etc.) x.To Administer the Security Incident and Event Management system (SIEM) and ensure all mission-critical systems are well integrated. xi.To Take Part in the software development lifecycle and uncover potential flaws before and after deployment. xii.To Formulate and review IT Security controls following best practice benchmarks for applications, operating systems, network devices, storage, databases, and endpoints. xiii.To Implement Cyber controls as stipulated in the policies and procedures. xiv.To Perform cybercrime incident coordination, analysis, and response in collaboration with the authorities and the internal fraud unit. xv.To access and document the damage caused by security breaches and report to all stakeholders. xvi.To prepare security alerts and warnings to the users and interested parties. xvii.To maintain technical knowledge by attending educational workshops; reviewing publications. xviii.To be part of the team, support security initiatives through predictive and reactive analysis and articulate emerging trends to management and staff. xix.To perform any other related information security duties assigned from time to time.
 
Bachelor Degree in Information Technology, Computer Science, Computer Engineering, Computer Security, Software Engineering or equivalent degree from a recognized institution. ii.Knowledge of industry ICT Security Management System, cyber security regulatory frameworks and best practices, iii.Knowledge of ICT Risk Management, Knowledge of Networking, System Administration, Programming and Database Administration, iv.Knowledge of SOC, NOC operations, threat vectors and basic mitigation controls such as IPS, IDS, WAF, v.Demonstrated proficiency in using various open-source and proprietary cyber security tools, vi.Certification in the ICT security field such as CEH, CIH, ECSA, LPT, CISA, CISSP, CISM, OCSP and CSX-CP will be an added advantage.
bachelor degree
No Requirements
JOB-6874d7629a612

Vacancy title:
ICT Officer (Security Management)

[Type: FULL_TIME, Industry: Healthcare, Category: Computer & IT]

Jobs at:
Muhimbili National Hospital (MNH)

Deadline of this Job:
Sunday, July 27 2025

Duty Station:
Dar es Salaam | Dar es Salaam | Tanzania

Summary
Date Posted: Monday, July 14 2025, Base Salary: Not Disclosed

Similar Jobs in Tanzania
Learn more about Muhimbili National Hospital (MNH)
Muhimbili National Hospital (MNH) jobs in Tanzania

JOB DETAILS:

QUALIFICATION AND EXPERIENCE    

i.Bachelor Degree in Information Technology, Computer Science, Computer Engineering, Computer Security, Software Engineering or equivalent degree from a recognized institution.

ii.Knowledge of industry ICT Security Management System, cyber security regulatory frameworks and best practices,

iii.Knowledge of ICT Risk Management, Knowledge of Networking, System Administration, Programming and Database Administration,

iv.Knowledge of SOC, NOC operations, threat vectors and basic mitigation controls such as IPS, IDS, WAF,

v.Demonstrated proficiency in using various open-source and proprietary cyber security tools,

vi.Certification in the ICT security field such as CEH, CIH, ECSA, LPT, CISA, CISSP, CISM, OCSP and CSX-CP will be an added advantage.

DUTIES AND RESPONSIBILITIES

i.To perform audit and security compliance checks, including network penetration testing, vulnerability scans, and other configuration analysis.

ii.To Lead the ICT team and consult them on the remediation of security vulnerabilities

iii.To Hunt cybersecurity threats and mitigate them before they compromise the organization.

iv.To Implement appropriate security tools and systems to uncover potential threats before they turn into attacks.

v.To Develop cyber threat models and security risk assessments and recommend mitigations and countermeasures to address risks, vulnerabilities, and threats.

vi.To Conduct Malware monitoring, analysis, and reverse engineering.

vii.To Perform Information Security Incident Handling and Digital Forensic Investigations.

viii.To Analyze network traffic for intrusions and cyberattacks in both parameters and internal networks.

ix.To Monitor and analyse events and alerts from a wide array of security devices and systems (SIEMs, Firewalls, IDS/IPS, WIPS, Systems, Networks, Anti-virus, etc.)

x.To Administer the Security Incident and Event Management system (SIEM) and ensure all mission-critical systems are well integrated.

xi.To Take Part in the software development lifecycle and uncover potential flaws before and after deployment.

xii.To Formulate and review IT Security controls following best practice benchmarks for applications, operating systems, network devices, storage, databases, and endpoints.

xiii.To Implement Cyber controls as stipulated in the policies and procedures.

xiv.To Perform cybercrime incident coordination, analysis, and response in collaboration with the authorities and the internal fraud unit.

xv.To access and document the damage caused by security breaches and report to all stakeholders.

xvi.To prepare security alerts and warnings to the users and interested parties.

xvii.To maintain technical knowledge by attending educational workshops; reviewing publications.

xviii.To be part of the team, support security initiatives through predictive and reactive analysis and articulate emerging trends to management and staff.

xix.To perform any other related information security duties assigned from time to time.

 

Work Hours: 8

Experience: No Requirements

Level of Education: bachelor degree

Job application procedure

Interested and qualified? Click here to apply

 

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Tanzania
Job Type: Full-time
Deadline of this Job: Sunday, July 27 2025
Duty Station: Dar es Salaam | Dar es Salaam | Tanzania
Posted: 14-07-2025
No of Jobs: 1
Start Publishing: 14-07-2025
Stop Publishing (Put date of 2030): 14-07-2088
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.