Chief Information Security Officer job at NCBA
16 Days Ago
Linkedid Twitter Share on facebook
Chief Information Security Officer
2025-04-08T06:18:14+00:00
NCBA
https://www.greatugandajobs.com/jsjobsdata/data/employer/comp_3292/logo/NCBA%20Bank.png
FULL_TIME
 
kampala
Kampala
00256
Uganda
Information Technology
Admin & Office
UGX
 
MONTH
2025-04-19T17:00:00+00:00
 
Uganda
8

Job Purpose Statement

The Chief information Security Officer is a key participant in shaping the Bank’s Information and Security strategy. The role focuses on security strategies to protect information assets specifically in IT operations, systems, and innovation across the business, and protecting information systems and data from threats.

Key Accountabilities (Duties and Responsibilities)

  •  Along-side the EXCOM, is accountable for achievement of the set targets and strategic outcomes within approved budget.
    •    Reporting to the Executive Director on an agreed interval but not less than once per quarter on; assessment of the confidentiality, integrity and availability of the information systems in the Bank, detailed exceptions to the approved cyber and technology policies and procedures, assessment of the effectiveness of the approved cybersecurity program, all material cyber and technology events that affected the institution during the period.
    •    Organizing professional cyber related trainings to improve technical proficiency of staff.
    •    Safeguarding the confidentiality, integrity and availability of information.
    •    Overseeing and implementing the institution’s cybersecurity program and enforcing the cyber and technology policy. 
    •    Ensuring that the institution maintains a current enterprise-wide knowledge base of its users, devices, applications, software licenses and their relationships, including but not limited to: Software and hardware asset inventory; Network maps (including boundaries, traffic and data flow); and Network utilization and performance data.
    •    Ensuring that information systems meet the needs of the institution, and the ICT strategy, in particular information system development strategies, comply with the overall business strategies, risk appetite and ICT risk management policies of the institution.
    •    Design cybersecurity controls with the consideration of users at all levels of the organization, including internal (i.e. management and staff) and external users (i.e. contractors/consultants, business partners and service providers).
    •    Ensure that regular and comprehensive cyber risk assessments are conducted at least once a year.
    •    Ensure that adequate processes are in place for monitoring IT systems to detect cyber and technology events and incidents in a timely manner. 
    •    Review and assess risks associated with exceptions/deviations to the approved cyber and technology policies and procedures and gain senior management approval for risk assessments.
    •    Review periodically the approved exceptions/deviations to ensure the residual risks remain at an acceptable level. 
    •    Ensure timely update of the incident response mechanism and Business Continuity Plan (BCP) based on the latest cyber threat intelligence gathered.
    •    Incorporate the utilization of scenario analysis to consider a material cyber-attack, mitigating actions, and identify potential control gaps.
    •    Ensure frequent data backups of critical IT systems (e.g. real time back up of changes made to critical data) are carried out to a separate storage location.
    •    Ensure the roles and responsibilities of managing cyber risks, including in emergency or crisis 
    •    decision-making, are clearly defined, documented and communicated to relevant staff.
    •    Continuously test disaster recovery and Business Continuity Plans (BCP) arrangements to ensure that the institution can continue to function and meet its regulatory obligations in the event of an unforeseen attack through cyber-crime.
    •    Safeguarding the confidentiality, integrity and availability of information.
    •    Define and implement recruitment, learning and performance management strategies, as well as cultural practices that attract, nurture and retain the best talent.
    •    Drive competency focus through continuous learning and job enrichment to ensure high performance.

Job Specifications

Academic and Professional Certifications:
•    Bachelor of Science in Computer Science or technical field. MBA or a Master’s degree in a technology field preferred. 
•    IT management certifications are desirable: ITIL, COBIT, TOGAF, PRINCE2, ISO, Cloud technology, CISSP, CRISC.
Experience:
At least 10 years’ experience in Information Technology management, 5 of which should have been in a middle management capacity in a similar sized organization having lead successful IT transformation projects and/or initiatives.

 Along-side the EXCOM, is accountable for achievement of the set targets and strategic outcomes within approved budget. •    Reporting to the Executive Director on an agreed interval but not less than once per quarter on; assessment of the confidentiality, integrity and availability of the information systems in the Bank, detailed exceptions to the approved cyber and technology policies and procedures, assessment of the effectiveness of the approved cybersecurity program, all material cyber and technology events that affected the institution during the period. •    Organizing professional cyber related trainings to improve technical proficiency of staff. •    Safeguarding the confidentiality, integrity and availability of information. •    Overseeing and implementing the institution’s cybersecurity program and enforcing the cyber and technology policy.  •    Ensuring that the institution maintains a current enterprise-wide knowledge base of its users, devices, applications, software licenses and their relationships, including but not limited to: Software and hardware asset inventory; Network maps (including boundaries, traffic and data flow); and Network utilization and performance data. •    Ensuring that information systems meet the needs of the institution, and the ICT strategy, in particular information system development strategies, comply with the overall business strategies, risk appetite and ICT risk management policies of the institution. •    Design cybersecurity controls with the consideration of users at all levels of the organization, including internal (i.e. management and staff) and external users (i.e. contractors/consultants, business partners and service providers). •    Ensure that regular and comprehensive cyber risk assessments are conducted at least once a year. •    Ensure that adequate processes are in place for monitoring IT systems to detect cyber and technology events and incidents in a timely manner.  •    Review and assess risks associated with exceptions/deviations to the approved cyber and technology policies and procedures and gain senior management approval for risk assessments. •    Review periodically the approved exceptions/deviations to ensure the residual risks remain at an acceptable level.  •    Ensure timely update of the incident response mechanism and Business Continuity Plan (BCP) based on the latest cyber threat intelligence gathered. •    Incorporate the utilization of scenario analysis to consider a material cyber-attack, mitigating actions, and identify potential control gaps. •    Ensure frequent data backups of critical IT systems (e.g. real time back up of changes made to critical data) are carried out to a separate storage location. •    Ensure the roles and responsibilities of managing cyber risks, including in emergency or crisis  •    decision-making, are clearly defined, documented and communicated to relevant staff. •    Continuously test disaster recovery and Business Continuity Plans (BCP) arrangements to ensure that the institution can continue to function and meet its regulatory obligations in the event of an unforeseen attack through cyber-crime. •    Safeguarding the confidentiality, integrity and availability of information. •    Define and implement recruitment, learning and performance management strategies, as well as cultural practices that attract, nurture and retain the best talent. •    Drive competency focus through continuous learning and job enrichment to ensure high performance.
 
Bachelor of Science in Computer Science or technical field. MBA or a Master’s degree in a technology field preferred.  •    IT management certifications are desirable: ITIL, COBIT, TOGAF, PRINCE2, ISO, Cloud technology, CISSP, CRISC. Experience: At least 10 years’ experience in Information Technology management, 5 of which should have been in a middle management capacity in a similar sized organization having lead successful IT transformation projects and/or initiatives.
bachelor degree
60
JOB-67f4bfa6119b4

Vacancy title:
Chief Information Security Officer

[Type: FULL_TIME, Industry: Information Technology, Category: Admin & Office]

Jobs at:
NCBA

Deadline of this Job:
Saturday, April 19 2025

Duty Station:
kampala | Kampala | Uganda

Summary
Date Posted: Tuesday, April 8 2025, Base Salary: Not Disclosed

Similar Jobs in Uganda
Learn more about NCBA
NCBA jobs in Uganda

JOB DETAILS:

Job Purpose Statement

The Chief information Security Officer is a key participant in shaping the Bank’s Information and Security strategy. The role focuses on security strategies to protect information assets specifically in IT operations, systems, and innovation across the business, and protecting information systems and data from threats.

Key Accountabilities (Duties and Responsibilities)

  •  Along-side the EXCOM, is accountable for achievement of the set targets and strategic outcomes within approved budget.
    •    Reporting to the Executive Director on an agreed interval but not less than once per quarter on; assessment of the confidentiality, integrity and availability of the information systems in the Bank, detailed exceptions to the approved cyber and technology policies and procedures, assessment of the effectiveness of the approved cybersecurity program, all material cyber and technology events that affected the institution during the period.
    •    Organizing professional cyber related trainings to improve technical proficiency of staff.
    •    Safeguarding the confidentiality, integrity and availability of information.
    •    Overseeing and implementing the institution’s cybersecurity program and enforcing the cyber and technology policy. 
    •    Ensuring that the institution maintains a current enterprise-wide knowledge base of its users, devices, applications, software licenses and their relationships, including but not limited to: Software and hardware asset inventory; Network maps (including boundaries, traffic and data flow); and Network utilization and performance data.
    •    Ensuring that information systems meet the needs of the institution, and the ICT strategy, in particular information system development strategies, comply with the overall business strategies, risk appetite and ICT risk management policies of the institution.
    •    Design cybersecurity controls with the consideration of users at all levels of the organization, including internal (i.e. management and staff) and external users (i.e. contractors/consultants, business partners and service providers).
    •    Ensure that regular and comprehensive cyber risk assessments are conducted at least once a year.
    •    Ensure that adequate processes are in place for monitoring IT systems to detect cyber and technology events and incidents in a timely manner. 
    •    Review and assess risks associated with exceptions/deviations to the approved cyber and technology policies and procedures and gain senior management approval for risk assessments.
    •    Review periodically the approved exceptions/deviations to ensure the residual risks remain at an acceptable level. 
    •    Ensure timely update of the incident response mechanism and Business Continuity Plan (BCP) based on the latest cyber threat intelligence gathered.
    •    Incorporate the utilization of scenario analysis to consider a material cyber-attack, mitigating actions, and identify potential control gaps.
    •    Ensure frequent data backups of critical IT systems (e.g. real time back up of changes made to critical data) are carried out to a separate storage location.
    •    Ensure the roles and responsibilities of managing cyber risks, including in emergency or crisis 
    •    decision-making, are clearly defined, documented and communicated to relevant staff.
    •    Continuously test disaster recovery and Business Continuity Plans (BCP) arrangements to ensure that the institution can continue to function and meet its regulatory obligations in the event of an unforeseen attack through cyber-crime.
    •    Safeguarding the confidentiality, integrity and availability of information.
    •    Define and implement recruitment, learning and performance management strategies, as well as cultural practices that attract, nurture and retain the best talent.
    •    Drive competency focus through continuous learning and job enrichment to ensure high performance.

Job Specifications

Academic and Professional Certifications:
•    Bachelor of Science in Computer Science or technical field. MBA or a Master’s degree in a technology field preferred. 
•    IT management certifications are desirable: ITIL, COBIT, TOGAF, PRINCE2, ISO, Cloud technology, CISSP, CRISC.
Experience:
At least 10 years’ experience in Information Technology management, 5 of which should have been in a middle management capacity in a similar sized organization having lead successful IT transformation projects and/or initiatives.

 

Work Hours: 8

Experience in Months: 60

Level of Education: bachelor degree

Job application procedure

Interested and qualified? Click here

 

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Security, Homeland Security jobs in Uganda
Job Type: Full-time
Deadline of this Job: Saturday, April 19 2025
Duty Station: kampala | Kampala | Uganda
Posted: 08-04-2025
No of Jobs: 1
Start Publishing: 08-04-2025
Stop Publishing (Put date of 2030): 08-04-2066
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.