AFRICA IT OPERATIONAL SECURITY MANAGER
- Customer Service
- 12/24/2025
- Full Time
- Featured
- Urgent
|
RECRUITMENT NOTICE |
|
AFRICA IT OPERATIONAL SECURITY MANAGER |
|
Department: Cybersecurity Start Date: As soon as possible Contract Type: Permanent Working Hours: Full-time, On-site Location: Norrsken House, Kigali, Rwanda
|
The Organization is the leading multimodal logistics operator in Africa, covering port, logistics, maritime, and rail activities. Now part of a global leader in maritime and logistics, The Organization combines more than a century of expertise with a strong presence in 49 countries and a team of over 23,000 employees. The Organization delivers innovative, tailor-made logistics solutions to African and international customers, with the ambition of driving sustainable transformation across the continent. Beyond Africa, The Organization also operates in Haiti, Timor-Leste, and Indonesia.
As part of The Organization, the Shared Service Center, established in 2025, includes a dedicated MIS/IT department. The center is entering a strategic growth phase, and to support this expansion and deliver high-value digital services across the network, we are recruiting talented professionals to join our dynamic team. The center plays a key role in MIS activities through standardized service delivery, operational excellence, and strong cross-site collaboration.
ASCENS, the MIS/IT department, supports 250 subsidiaries from hubs in Paris, Abidjan, Johannesburg, and Kigali, ensuring the effective use, management, and continuous evolution of the Group’s digital tools.
As part of innovation drive, ASCENS launched its first Innovation Center—YIRI—in Abidjan, a collaborative space dedicated to digital transformation and partnerships with internal teams, technology providers, universities, and start-ups. Building on this success, a second Innovation Center will soon open in Kigali, aiming to become a hub for open innovation in East Africa - stimulating creativity, accelerating projects, and strengthening regional synergies.
Do you want to grow in a truly international environment and contribute to a company that places Africa at the heart of its mission?
Join KSSC and be part of the team shaping the future of logistics in Africa!
JOB FUNCTION & KEY RESPONSIBILITIES
Position in the organization chart:
o Functionally reporting to the Chief Information Security Officer - Africa (CISO)
o Hierarchically reporting to the JACC Manager
Interim: Replacement in case of absence is guaranteed by a member of the Africa IT Operational Security Manager’s team.
Global mission
The Africa IT Operational Security Manager ensures the day-to-day planning, management, and monitoring of IT Operational Security throughout Africa. He oversees scaling, increasing performance, providing team leadership and guidance to help evolve the security programs in accordance with strategic objectives, identify and assist in engineering technology initiatives, to develop and enhance defensive measures, through the setup of security incident detection services and supervises the entire unit. He ensures the proper execution of security event supervision and management processes. He establishes the complete and accurate reporting of the key indicators and defines the axes of improvement of the services.
He manages and coordinates all the experts of the Security Operations Center (SOC) composed of analysts, security engineers, as well as managers supervising security operations.
KEY DUTIES & RESPONSIBILITIES
· Lead a team of highly capable security engineering staff who maintain security for system
· environments.
· Ability to mentor and have the capability of influencing the Organization.
· Ensure relations with CERT (Computer Emergency Response Team) or CSIRT (Computer
· Security Incident Response Team) teams, particularly in a crisis to coordinate the various operational security teams.
· Plan, Maintain and organize the day-to-day operations of the SOC and configuration management platforms which include application deployment and settings distribution.
· Create and drive proactive monitoring and reporting for endpoint and health system including, patching, compliance, and other performance metrics.
· Manage and provide operational support for security vulnerability remediation, incident handling and crisis management across global resources.
· Implement new security technologies as required to support a dynamic/challenging business environment.
· Define the SOC strategy, ensure technical consistency, considering regulatory requirements.
· Identify operational opportunities to implement security orchestration and automation capabilities.
· Define and implement SOC tools for the enforcement of global security controls such as event collection, access to security platforms, searches for suspicious events, alert management, and security incident monitoring workflows.
· Evaluate and validate the effectiveness of the tools deployed in the SOC but also lead to any necessary corrective action plans.
· Effectively provide general information, security guidance & technology support to the business.
· Define, manage and implement notification and on call schedules for incident escalation processes.
· Work as the escalation point between various teams for security related activities.
· Drive client and system security model best practices.
· Feed the detection strategy from a global vision.
· Drive business decisions through data using tools like Splunk, CrowdStrike, Vectra etc.
· Manage transition plans for major upgrades or patches.
· Diagnose and investigate unique and complex systemic problems.
· Work proficiently with minimal daily guidance and bring mature seasoned skills when working.
· Evaluate and communicate security risk to a wide and varying audience.
· Support in developing IT operational security awareness training and education programs, but also participate in local, regional, and worldwide awareness and education events.
· Create synergies with other security teams by sharing information on identified threats (internally and externally)
EDUCATION & EXPERIENCE REQUIRED
Education:
· A Diploma / Degree in IT would be a distinct advantage.
· Professional certification training, such as CISSP, CISM, CISA or other relevant information Security training preferred.
· ISO27001, ISO27002 and ISO27005 would be an advantage.
· ITIL Foundations Certified.
Experience:
· At least 10 - 15 years of varied information technology experience is required, applicable experience includes, but is not limited to, computer, server and networking infrastructure, operating systems, applications software, project management, regulatory compliance, risk management, and providing training. Two years of direct experience in management information systems duties.
5+ years’ experience, with an IT Security focused role.
KEY SKILLS REQUIRED
· Previous involvement in the management of IT projects would be an advantage.
· Experience in Security Information and Event Management (SIEM):
o Log analysis (Systems or Applications)
o Network flows
o Event log correlation tools and methods
o Security monitoring solutions
o Attack and intrusion techniques
o Vulnerabilities of environments
· Familiar with security controls or concepts related to various security community groups or standards: CISSP, NIST cybersecurity & privacy frameworks, CIS benchmarks, OSI model.
· Experience within Incident Response situations and demonstrated ability to handle and maintain confidential information in a professional manner.
· Familiar with compliance and privacy regulations such as PCI, GDPR, CCPA, SOX, and other regulations/standards.
BEHAVORIAL SKILLS REQUIRED
· Managerial / Leadership ability to mentor and provide guidance.
· Supervisory skills to balance workloads, priority, but also boost productivity and efficiency.
· Team player with a high degree of initiative, dependability and ability to work with little supervision and cross-functional teams.
· Inherently demonstrate a high level of integrity and trustworthiness, always given the level of confidential information available to the person.
· Adaptable and flexible to changes and various situations and scenarios.
· Ability to conceptualize IT networks and systems and identify potential risks in both the hardware and software environment.
· The ability to maintain confidentiality regarding information processed, stored, or accessed by the systems.
· The ability to manage multiple concurrent projects and to reason analytically.
· The ability to work with and train people possessing differing levels of technical knowledge.
<span lang="EN-US" style="font-size: 11pt; line-height: 16.8667px; font-family:<