Information Security Manager job at ACB Bank
New
Today
Linkedid Twitter Share on facebook
Information Security Manager
2025-06-23T10:38:16+00:00
ACB Bank
https://cdn.greattanzaniajobs.com/jsjobsdata/data/employer/comp_5124/logo/OIP.jpg
FULL_TIME
 
Dar es Salaam
Dar es Salaam
00000
Tanzania
Banking
Computer & IT
TZS
 
MONTH
2025-06-29T17:00:00+00:00
 
Tanzania
8

The Information Security Manager will be responsible for the protection of the Bank’s information processing assets, managing vulnerabilities within the information processing infrastructure, managing threats and incidents impacting the Bank’s information resources, ensuring appropriate use of the Bank’s information processing resources, and conducting awareness campaigns for all users regarding their responsibilities for the Bank’s security and privacy of information.

The Role:

  • Organizing Information Security:
    • Establish and implement an information security program for communicating and coordinating information security activities in the Bank.
    • Work with business, internal IT, and third-party vendor teams to promote and adopt security practices.
    • Ensure daily backups for all systems are taken.
    • Check if backups are successfully taken.
    • Oversee the implementation of security measures, such as access control, encryption, and authentication mechanisms.
    • Proactively manage threat detection and vulnerability management services and lead required remedial activities.
  • Security Policy Management:
    • Provide management advice for the Bank’s information security program.
    • Develop and maintain information security policies, standards, guidelines, processes, and procedures.
    • Oversee the monitoring and compliance with security policies, standards, guidelines, processes, and procedures.
    • Create a security policy acknowledgment process for all employees.
    • Provide security awareness training to employees to promote a security-conscious culture within the organization.
  • Access Control:
    • Review procedures for applying the appropriate rules and rights for each user or group.
    • Manage and control privileged user access.
    • Ensure the identification and separation of systems, applications, and information based on criticality and sensitivity.
    • Ensure users are made aware of their responsibilities in accessing, protecting, and using information assets.
  • System Communication Protection:
    • Provide guidance for the integrity and availability of information and systems.
    • Ensure structure for the protection of networks and supporting infrastructure.
    • Provide guidance for the prevention of unauthorized disclosure, modification, removal, or destruction of assets.
    • Lead in the development and implementation of security measures to ensure the integrity and confidentiality of information while accessing electronically.
  • Assets Management and Protection:
    • Ensure that the Bank’s assets are under an inventory with clear ownership designations for accountability.
    • Provide implementation guidance to ensure that employees are fully informed with regard to their responsibilities for protecting Bank assets.
    • Ensure effective and appropriate monitoring controls and measures are in place to protect systems and data.
    • Ensure that the Bank has established policies and procedures for data classification in accordance with laws, regulations, and best practices.
  • Information Security Incident Management:
    • Accountable for security incident management.
    • Maintain and improve security incident response procedures and playbooks.
    • Develop and document corrective action plans and implement lessons learned to mitigate recurrence.
    • Follow Bank policy for the notification and reporting of incidents immediately upon discovery.
  • Disaster Recovery Management:
    • Oversee and manage BCM in the bank (BCM manager).
    • Lead in the planning efforts for the Bank’s disaster recovery plan and provide oversight to ensure it is maintained.
    • Participate in the testing and management of the plan.
    • Implement BCP in the bank (lead champion).
Organizing Information Security: Establish and implement an information security program for communicating and coordinating information security activities in the Bank. Work with business, internal IT, and third-party vendor teams to promote and adopt security practices. Ensure daily backups for all systems are taken. Check if backups are successfully taken. Oversee the implementation of security measures, such as access control, encryption, and authentication mechanisms. Proactively manage threat detection and vulnerability management services and lead required remedial activities. Security Policy Management: Provide management advice for the Bank’s information security program. Develop and maintain information security policies, standards, guidelines, processes, and procedures. Oversee the monitoring and compliance with security policies, standards, guidelines, processes, and procedures. Create a security policy acknowledgment process for all employees. Provide security awareness training to employees to promote a security-conscious culture within the organization. Access Control: Review procedures for applying the appropriate rules and rights for each user or group. Manage and control privileged user access. Ensure the identification and separation of systems, applications, and information based on criticality and sensitivity. Ensure users are made aware of their responsibilities in accessing, protecting, and using information assets. System Communication Protection: Provide guidance for the integrity and availability of information and systems. Ensure structure for the protection of networks and supporting infrastructure. Provide guidance for the prevention of unauthorized disclosure, modification, removal, or destruction of assets. Lead in the development and implementation of security measures to ensure the integrity and confidentiality of information while accessing electronically. Assets Management and Protection: Ensure that the Bank’s assets are under an inventory with clear ownership designations for accountability. Provide implementation guidance to ensure that employees are fully informed with regard to their responsibilities for protecting Bank assets. Ensure effective and appropriate monitoring controls and measures are in place to protect systems and data. Ensure that the Bank has established policies and procedures for data classification in accordance with laws, regulations, and best practices. Information Security Incident Management: Accountable for security incident management. Maintain and improve security incident response procedures and playbooks. Develop and document corrective action plans and implement lessons learned to mitigate recurrence. Follow Bank policy for the notification and reporting of incidents immediately upon discovery. Disaster Recovery Management: Oversee and manage BCM in the bank (BCM manager). Lead in the planning efforts for the Bank’s disaster recovery plan and provide oversight to ensure it is maintained. Participate in the testing and management of the plan. Implement BCP in the bank (lead champion).
 
 
bachelor degree
No Requirements
JOB-68592e980fd3a

Vacancy title:
Information Security Manager

[Type: FULL_TIME, Industry: Banking, Category: Computer & IT]

Jobs at:
ACB Bank

Deadline of this Job:
Sunday, June 29 2025

Duty Station:
Dar es Salaam | Dar es Salaam | Tanzania

Summary
Date Posted: Monday, June 23 2025, Base Salary: Not Disclosed

Similar Jobs in Tanzania
Learn more about ACB Bank
ACB Bank jobs in Tanzania

JOB DETAILS:

The Information Security Manager will be responsible for the protection of the Bank’s information processing assets, managing vulnerabilities within the information processing infrastructure, managing threats and incidents impacting the Bank’s information resources, ensuring appropriate use of the Bank’s information processing resources, and conducting awareness campaigns for all users regarding their responsibilities for the Bank’s security and privacy of information.

The Role:

  • Organizing Information Security:
    • Establish and implement an information security program for communicating and coordinating information security activities in the Bank.
    • Work with business, internal IT, and third-party vendor teams to promote and adopt security practices.
    • Ensure daily backups for all systems are taken.
    • Check if backups are successfully taken.
    • Oversee the implementation of security measures, such as access control, encryption, and authentication mechanisms.
    • Proactively manage threat detection and vulnerability management services and lead required remedial activities.
  • Security Policy Management:
    • Provide management advice for the Bank’s information security program.
    • Develop and maintain information security policies, standards, guidelines, processes, and procedures.
    • Oversee the monitoring and compliance with security policies, standards, guidelines, processes, and procedures.
    • Create a security policy acknowledgment process for all employees.
    • Provide security awareness training to employees to promote a security-conscious culture within the organization.
  • Access Control:
    • Review procedures for applying the appropriate rules and rights for each user or group.
    • Manage and control privileged user access.
    • Ensure the identification and separation of systems, applications, and information based on criticality and sensitivity.
    • Ensure users are made aware of their responsibilities in accessing, protecting, and using information assets.
  • System Communication Protection:
    • Provide guidance for the integrity and availability of information and systems.
    • Ensure structure for the protection of networks and supporting infrastructure.
    • Provide guidance for the prevention of unauthorized disclosure, modification, removal, or destruction of assets.
    • Lead in the development and implementation of security measures to ensure the integrity and confidentiality of information while accessing electronically.
  • Assets Management and Protection:
    • Ensure that the Bank’s assets are under an inventory with clear ownership designations for accountability.
    • Provide implementation guidance to ensure that employees are fully informed with regard to their responsibilities for protecting Bank assets.
    • Ensure effective and appropriate monitoring controls and measures are in place to protect systems and data.
    • Ensure that the Bank has established policies and procedures for data classification in accordance with laws, regulations, and best practices.
  • Information Security Incident Management:
    • Accountable for security incident management.
    • Maintain and improve security incident response procedures and playbooks.
    • Develop and document corrective action plans and implement lessons learned to mitigate recurrence.
    • Follow Bank policy for the notification and reporting of incidents immediately upon discovery.
  • Disaster Recovery Management:
    • Oversee and manage BCM in the bank (BCM manager).
    • Lead in the planning efforts for the Bank’s disaster recovery plan and provide oversight to ensure it is maintained.
    • Participate in the testing and management of the plan.
    • Implement BCP in the bank (lead champion).

 

Work Hours: 8

Experience: No Requirements

Level of Education: bachelor degree

Job application procedure
Interested in applying for this job? Click here to submit your application now.

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Tanzania
Job Type: Full-time
Deadline of this Job: Sunday, June 29 2025
Duty Station: Dar es Salaam | Dar es Salaam | Tanzania
Posted: 23-06-2025
No of Jobs: 1
Start Publishing: 23-06-2025
Stop Publishing (Put date of 2030): 23-06-2067
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.