Information Security Manager
2025-06-23T10:38:16+00:00
ACB Bank
https://cdn.greattanzaniajobs.com/jsjobsdata/data/employer/comp_5124/logo/OIP.jpg
https://www.acbbank.co.tz/
FULL_TIME
Dar es Salaam
Dar es Salaam
00000
Tanzania
Banking
Computer & IT
2025-06-29T17:00:00+00:00
Tanzania
8
The Information Security Manager will be responsible for the protection of the Bank’s information processing assets, managing vulnerabilities within the information processing infrastructure, managing threats and incidents impacting the Bank’s information resources, ensuring appropriate use of the Bank’s information processing resources, and conducting awareness campaigns for all users regarding their responsibilities for the Bank’s security and privacy of information.
The Role:
- Organizing Information Security:
- Establish and implement an information security program for communicating and coordinating information security activities in the Bank.
- Work with business, internal IT, and third-party vendor teams to promote and adopt security practices.
- Ensure daily backups for all systems are taken.
- Check if backups are successfully taken.
- Oversee the implementation of security measures, such as access control, encryption, and authentication mechanisms.
- Proactively manage threat detection and vulnerability management services and lead required remedial activities.
- Security Policy Management:
- Provide management advice for the Bank’s information security program.
- Develop and maintain information security policies, standards, guidelines, processes, and procedures.
- Oversee the monitoring and compliance with security policies, standards, guidelines, processes, and procedures.
- Create a security policy acknowledgment process for all employees.
- Provide security awareness training to employees to promote a security-conscious culture within the organization.
- Access Control:
- Review procedures for applying the appropriate rules and rights for each user or group.
- Manage and control privileged user access.
- Ensure the identification and separation of systems, applications, and information based on criticality and sensitivity.
- Ensure users are made aware of their responsibilities in accessing, protecting, and using information assets.
- System Communication Protection:
- Provide guidance for the integrity and availability of information and systems.
- Ensure structure for the protection of networks and supporting infrastructure.
- Provide guidance for the prevention of unauthorized disclosure, modification, removal, or destruction of assets.
- Lead in the development and implementation of security measures to ensure the integrity and confidentiality of information while accessing electronically.
- Assets Management and Protection:
- Ensure that the Bank’s assets are under an inventory with clear ownership designations for accountability.
- Provide implementation guidance to ensure that employees are fully informed with regard to their responsibilities for protecting Bank assets.
- Ensure effective and appropriate monitoring controls and measures are in place to protect systems and data.
- Ensure that the Bank has established policies and procedures for data classification in accordance with laws, regulations, and best practices.
- Information Security Incident Management:
- Accountable for security incident management.
- Maintain and improve security incident response procedures and playbooks.
- Develop and document corrective action plans and implement lessons learned to mitigate recurrence.
- Follow Bank policy for the notification and reporting of incidents immediately upon discovery.
- Disaster Recovery Management:
- Oversee and manage BCM in the bank (BCM manager).
- Lead in the planning efforts for the Bank’s disaster recovery plan and provide oversight to ensure it is maintained.
- Participate in the testing and management of the plan.
- Implement BCP in the bank (lead champion).
Organizing Information Security: Establish and implement an information security program for communicating and coordinating information security activities in the Bank. Work with business, internal IT, and third-party vendor teams to promote and adopt security practices. Ensure daily backups for all systems are taken. Check if backups are successfully taken. Oversee the implementation of security measures, such as access control, encryption, and authentication mechanisms. Proactively manage threat detection and vulnerability management services and lead required remedial activities. Security Policy Management: Provide management advice for the Bank’s information security program. Develop and maintain information security policies, standards, guidelines, processes, and procedures. Oversee the monitoring and compliance with security policies, standards, guidelines, processes, and procedures. Create a security policy acknowledgment process for all employees. Provide security awareness training to employees to promote a security-conscious culture within the organization. Access Control: Review procedures for applying the appropriate rules and rights for each user or group. Manage and control privileged user access. Ensure the identification and separation of systems, applications, and information based on criticality and sensitivity. Ensure users are made aware of their responsibilities in accessing, protecting, and using information assets. System Communication Protection: Provide guidance for the integrity and availability of information and systems. Ensure structure for the protection of networks and supporting infrastructure. Provide guidance for the prevention of unauthorized disclosure, modification, removal, or destruction of assets. Lead in the development and implementation of security measures to ensure the integrity and confidentiality of information while accessing electronically. Assets Management and Protection: Ensure that the Bank’s assets are under an inventory with clear ownership designations for accountability. Provide implementation guidance to ensure that employees are fully informed with regard to their responsibilities for protecting Bank assets. Ensure effective and appropriate monitoring controls and measures are in place to protect systems and data. Ensure that the Bank has established policies and procedures for data classification in accordance with laws, regulations, and best practices. Information Security Incident Management: Accountable for security incident management. Maintain and improve security incident response procedures and playbooks. Develop and document corrective action plans and implement lessons learned to mitigate recurrence. Follow Bank policy for the notification and reporting of incidents immediately upon discovery. Disaster Recovery Management: Oversee and manage BCM in the bank (BCM manager). Lead in the planning efforts for the Bank’s disaster recovery plan and provide oversight to ensure it is maintained. Participate in the testing and management of the plan. Implement BCP in the bank (lead champion).
No Requirements
JOB-68592e980fd3a
Vacancy title:
Information Security Manager
[Type: FULL_TIME, Industry: Banking, Category: Computer & IT]
Jobs at:
ACB Bank
Deadline of this Job:
Sunday, June 29 2025
Duty Station:
Dar es Salaam | Dar es Salaam | Tanzania
Summary
Date Posted: Monday, June 23 2025, Base Salary: Not Disclosed
Similar Jobs in Tanzania
Learn more about ACB Bank
ACB Bank jobs in Tanzania
JOB DETAILS:
The Information Security Manager will be responsible for the protection of the Bank’s information processing assets, managing vulnerabilities within the information processing infrastructure, managing threats and incidents impacting the Bank’s information resources, ensuring appropriate use of the Bank’s information processing resources, and conducting awareness campaigns for all users regarding their responsibilities for the Bank’s security and privacy of information.
The Role:
- Organizing Information Security:
- Establish and implement an information security program for communicating and coordinating information security activities in the Bank.
- Work with business, internal IT, and third-party vendor teams to promote and adopt security practices.
- Ensure daily backups for all systems are taken.
- Check if backups are successfully taken.
- Oversee the implementation of security measures, such as access control, encryption, and authentication mechanisms.
- Proactively manage threat detection and vulnerability management services and lead required remedial activities.
- Security Policy Management:
- Provide management advice for the Bank’s information security program.
- Develop and maintain information security policies, standards, guidelines, processes, and procedures.
- Oversee the monitoring and compliance with security policies, standards, guidelines, processes, and procedures.
- Create a security policy acknowledgment process for all employees.
- Provide security awareness training to employees to promote a security-conscious culture within the organization.
- Access Control:
- Review procedures for applying the appropriate rules and rights for each user or group.
- Manage and control privileged user access.
- Ensure the identification and separation of systems, applications, and information based on criticality and sensitivity.
- Ensure users are made aware of their responsibilities in accessing, protecting, and using information assets.
- System Communication Protection:
- Provide guidance for the integrity and availability of information and systems.
- Ensure structure for the protection of networks and supporting infrastructure.
- Provide guidance for the prevention of unauthorized disclosure, modification, removal, or destruction of assets.
- Lead in the development and implementation of security measures to ensure the integrity and confidentiality of information while accessing electronically.
- Assets Management and Protection:
- Ensure that the Bank’s assets are under an inventory with clear ownership designations for accountability.
- Provide implementation guidance to ensure that employees are fully informed with regard to their responsibilities for protecting Bank assets.
- Ensure effective and appropriate monitoring controls and measures are in place to protect systems and data.
- Ensure that the Bank has established policies and procedures for data classification in accordance with laws, regulations, and best practices.
- Information Security Incident Management:
- Accountable for security incident management.
- Maintain and improve security incident response procedures and playbooks.
- Develop and document corrective action plans and implement lessons learned to mitigate recurrence.
- Follow Bank policy for the notification and reporting of incidents immediately upon discovery.
- Disaster Recovery Management:
- Oversee and manage BCM in the bank (BCM manager).
- Lead in the planning efforts for the Bank’s disaster recovery plan and provide oversight to ensure it is maintained.
- Participate in the testing and management of the plan.
- Implement BCP in the bank (lead champion).
Work Hours: 8
Experience: No Requirements
Level of Education: bachelor degree
Job application procedure
Interested in applying for this job? Click here to submit your application now.
All Jobs | QUICK ALERT SUBSCRIPTION