ICT Officer (Security Management)
2025-07-14T10:09:38+00:00
Muhimbili National Hospital (MNH)
https://cdn.greattanzaniajobs.com/jsjobsdata/data/employer/comp_3696/logo/Muhimbili%20National%20Hospital%20(MNH).jpg
https://www.greattanzaniajobs.com/jobs
FULL_TIME
Dar es Salaam
Dar es Salaam
00000
Tanzania
Healthcare
Computer & IT
2025-07-27T17:00:00+00:00
Tanzania
8
QUALIFICATION AND EXPERIENCE
i.Bachelor Degree in Information Technology, Computer Science, Computer Engineering, Computer Security, Software Engineering or equivalent degree from a recognized institution.
ii.Knowledge of industry ICT Security Management System, cyber security regulatory frameworks and best practices,
iii.Knowledge of ICT Risk Management, Knowledge of Networking, System Administration, Programming and Database Administration,
iv.Knowledge of SOC, NOC operations, threat vectors and basic mitigation controls such as IPS, IDS, WAF,
v.Demonstrated proficiency in using various open-source and proprietary cyber security tools,
vi.Certification in the ICT security field such as CEH, CIH, ECSA, LPT, CISA, CISSP, CISM, OCSP and CSX-CP will be an added advantage.
DUTIES AND RESPONSIBILITIES
i.To perform audit and security compliance checks, including network penetration testing, vulnerability scans, and other configuration analysis.
ii.To Lead the ICT team and consult them on the remediation of security vulnerabilities
iii.To Hunt cybersecurity threats and mitigate them before they compromise the organization.
iv.To Implement appropriate security tools and systems to uncover potential threats before they turn into attacks.
v.To Develop cyber threat models and security risk assessments and recommend mitigations and countermeasures to address risks, vulnerabilities, and threats.
vi.To Conduct Malware monitoring, analysis, and reverse engineering.
vii.To Perform Information Security Incident Handling and Digital Forensic Investigations.
viii.To Analyze network traffic for intrusions and cyberattacks in both parameters and internal networks.
ix.To Monitor and analyse events and alerts from a wide array of security devices and systems (SIEMs, Firewalls, IDS/IPS, WIPS, Systems, Networks, Anti-virus, etc.)
x.To Administer the Security Incident and Event Management system (SIEM) and ensure all mission-critical systems are well integrated.
xi.To Take Part in the software development lifecycle and uncover potential flaws before and after deployment.
xii.To Formulate and review IT Security controls following best practice benchmarks for applications, operating systems, network devices, storage, databases, and endpoints.
xiii.To Implement Cyber controls as stipulated in the policies and procedures.
xiv.To Perform cybercrime incident coordination, analysis, and response in collaboration with the authorities and the internal fraud unit.
xv.To access and document the damage caused by security breaches and report to all stakeholders.
xvi.To prepare security alerts and warnings to the users and interested parties.
xvii.To maintain technical knowledge by attending educational workshops; reviewing publications.
xviii.To be part of the team, support security initiatives through predictive and reactive analysis and articulate emerging trends to management and staff.
xix.To perform any other related information security duties assigned from time to time.
i.To perform audit and security compliance checks, including network penetration testing, vulnerability scans, and other configuration analysis. ii.To Lead the ICT team and consult them on the remediation of security vulnerabilities iii.To Hunt cybersecurity threats and mitigate them before they compromise the organization. iv.To Implement appropriate security tools and systems to uncover potential threats before they turn into attacks. v.To Develop cyber threat models and security risk assessments and recommend mitigations and countermeasures to address risks, vulnerabilities, and threats. vi.To Conduct Malware monitoring, analysis, and reverse engineering. vii.To Perform Information Security Incident Handling and Digital Forensic Investigations. viii.To Analyze network traffic for intrusions and cyberattacks in both parameters and internal networks. ix.To Monitor and analyse events and alerts from a wide array of security devices and systems (SIEMs, Firewalls, IDS/IPS, WIPS, Systems, Networks, Anti-virus, etc.) x.To Administer the Security Incident and Event Management system (SIEM) and ensure all mission-critical systems are well integrated. xi.To Take Part in the software development lifecycle and uncover potential flaws before and after deployment. xii.To Formulate and review IT Security controls following best practice benchmarks for applications, operating systems, network devices, storage, databases, and endpoints. xiii.To Implement Cyber controls as stipulated in the policies and procedures. xiv.To Perform cybercrime incident coordination, analysis, and response in collaboration with the authorities and the internal fraud unit. xv.To access and document the damage caused by security breaches and report to all stakeholders. xvi.To prepare security alerts and warnings to the users and interested parties. xvii.To maintain technical knowledge by attending educational workshops; reviewing publications. xviii.To be part of the team, support security initiatives through predictive and reactive analysis and articulate emerging trends to management and staff. xix.To perform any other related information security duties assigned from time to time.
Bachelor Degree in Information Technology, Computer Science, Computer Engineering, Computer Security, Software Engineering or equivalent degree from a recognized institution. ii.Knowledge of industry ICT Security Management System, cyber security regulatory frameworks and best practices, iii.Knowledge of ICT Risk Management, Knowledge of Networking, System Administration, Programming and Database Administration, iv.Knowledge of SOC, NOC operations, threat vectors and basic mitigation controls such as IPS, IDS, WAF, v.Demonstrated proficiency in using various open-source and proprietary cyber security tools, vi.Certification in the ICT security field such as CEH, CIH, ECSA, LPT, CISA, CISSP, CISM, OCSP and CSX-CP will be an added advantage.
No Requirements
JOB-6874d7629a612
Vacancy title:
ICT Officer (Security Management)
[Type: FULL_TIME, Industry: Healthcare, Category: Computer & IT]
Jobs at:
Muhimbili National Hospital (MNH)
Deadline of this Job:
Sunday, July 27 2025
Duty Station:
Dar es Salaam | Dar es Salaam | Tanzania
Summary
Date Posted: Monday, July 14 2025, Base Salary: Not Disclosed
Similar Jobs in Tanzania
Learn more about Muhimbili National Hospital (MNH)
Muhimbili National Hospital (MNH) jobs in Tanzania
JOB DETAILS:
QUALIFICATION AND EXPERIENCE
i.Bachelor Degree in Information Technology, Computer Science, Computer Engineering, Computer Security, Software Engineering or equivalent degree from a recognized institution.
ii.Knowledge of industry ICT Security Management System, cyber security regulatory frameworks and best practices,
iii.Knowledge of ICT Risk Management, Knowledge of Networking, System Administration, Programming and Database Administration,
iv.Knowledge of SOC, NOC operations, threat vectors and basic mitigation controls such as IPS, IDS, WAF,
v.Demonstrated proficiency in using various open-source and proprietary cyber security tools,
vi.Certification in the ICT security field such as CEH, CIH, ECSA, LPT, CISA, CISSP, CISM, OCSP and CSX-CP will be an added advantage.
DUTIES AND RESPONSIBILITIES
i.To perform audit and security compliance checks, including network penetration testing, vulnerability scans, and other configuration analysis.
ii.To Lead the ICT team and consult them on the remediation of security vulnerabilities
iii.To Hunt cybersecurity threats and mitigate them before they compromise the organization.
iv.To Implement appropriate security tools and systems to uncover potential threats before they turn into attacks.
v.To Develop cyber threat models and security risk assessments and recommend mitigations and countermeasures to address risks, vulnerabilities, and threats.
vi.To Conduct Malware monitoring, analysis, and reverse engineering.
vii.To Perform Information Security Incident Handling and Digital Forensic Investigations.
viii.To Analyze network traffic for intrusions and cyberattacks in both parameters and internal networks.
ix.To Monitor and analyse events and alerts from a wide array of security devices and systems (SIEMs, Firewalls, IDS/IPS, WIPS, Systems, Networks, Anti-virus, etc.)
x.To Administer the Security Incident and Event Management system (SIEM) and ensure all mission-critical systems are well integrated.
xi.To Take Part in the software development lifecycle and uncover potential flaws before and after deployment.
xii.To Formulate and review IT Security controls following best practice benchmarks for applications, operating systems, network devices, storage, databases, and endpoints.
xiii.To Implement Cyber controls as stipulated in the policies and procedures.
xiv.To Perform cybercrime incident coordination, analysis, and response in collaboration with the authorities and the internal fraud unit.
xv.To access and document the damage caused by security breaches and report to all stakeholders.
xvi.To prepare security alerts and warnings to the users and interested parties.
xvii.To maintain technical knowledge by attending educational workshops; reviewing publications.
xviii.To be part of the team, support security initiatives through predictive and reactive analysis and articulate emerging trends to management and staff.
xix.To perform any other related information security duties assigned from time to time.
Work Hours: 8
Experience: No Requirements
Level of Education: bachelor degree
Job application procedure
Interested and qualified? Click here to apply
All Jobs | QUICK ALERT SUBSCRIPTION