LIVE
πŸ”΄ POLITICS: Zambia heads to the polls β€” August 2026 General ElectionπŸ“Š ECONOMY: Zambian Kwacha β€” latest exchange rates and market updatesπŸ›οΈ INSTITUTIONS: ECZ announces 70 new constituencies for 2026 elections
The Zambian People's Pulse

THE ZAMBIAN
PEOPLE'S PULSE

ICT Security Specialist

ZCCM Investment Holdings Plc

FULL TIME

Location

πŸ‡ΏπŸ‡² Lusaka, Zambia

Posted

May 4, 2026

Work Type

On-Site

Job Description

\r\n2. Key Responsibilities\r\n\r\n2.1 Security Monitoring and Incident Management\r\n\r\n \tMonitor and analyse\u00a0security logs\u00a0from firewalls, intrusion detection/prevention systems, servers, and applications.\r\n \tDetect, investigate, and respond to\u00a0security incidents and anomalies.\r\n \tEscalate and report security breaches in accordance with defined procedures.\r\n \tMaintain proper documentation of incidents and actions taken.\r\n\r\n2.2 ICT Policy Implementation and Compliance\r\n\r\n \tEnsure full implementation of\u00a0ICT and Information Security policies.\r\n \tConduct periodic compliance checks and identify control gaps.\r\n \tRecommend corrective actions and track remediation progress.\r\n \tSupport internal and external\u00a0audit processes.\r\n\r\n2.3 Access Control and Identity Management\r\n\r\n \tPerform\u00a0periodic user access reviews, including privileged accounts.\r\n \tEnforce\u00a0least privilege principles\u00a0and segregation of duties.\r\n \tMonitor unauthorized access attempts and suspicious activities.\r\n \tEnsure compliance with access control policies and procedures.\r\n\r\n2.4 Disaster Recovery and Business Continuity\r\nComputer Security\r\n\r\n \tCoordinate and validate\u00a0periodic Disaster Recovery (DR) tests.\r\n \tEnsure DR documentation is regularly updated and accessible.\r\n \tEvaluate test results and recommend improvements where needed.\r\n \tMonitor readiness of backup systems and recovery processes.\r\n \tEnsure backups are regularly done and tested for both integrity and restorability.\r\n\r\n2.5 Vulnerability Management and Risk Assessment\r\n\r\n \t\r\n\r\n \tConduct routine\u00a0vulnerability assessments and security scans across the ZCCM-IH Group network.\r\n \tIdentify weaknesses in systems, networks, and applications for the ZCCM-IH Group\r\n \tRecommend\u00a0\u00a0risk mitigation\u00a0strategies and controls to be implemented.\r\n \tSupport enterprise\u00a0\u00a0risk management\u00a0initiatives across the group.\r\n\r\n\r\n\r\nData Backup & Recovery\r\n2.6 Security Awareness and Best Practices\r\n\r\n \tPromote\u00a0security awareness\u00a0among ZCCM-IH Group staff.\r\n \tGuide on safe ICT practices\r\n \tSupport training initiatives to reduce human\u2011related security risks.\r\n\r\n \r\n\r\n2.7 IT Control Environment Assurance\r\n\r\n \t\r\n\r\n \tContinuously assess the\u00a0effectiveness of IT controls\r\n \tEnsure critical controls remain operational and effective at all times.\r\n \tProvide periodic reports on the\u00a0security posture of the organisation.\r\n\r\n\r\n\r\nRisk Management\r\n\u00a0\r\n\r\n3. Key Deliverables\r\n\r\n \tSecurity monitoring and incident reports\r\n \tAccess control review reports\r\n \tDR testing reports and findings\r\n \tVulnerability and risk assessment reports\r\n \tCompliance and audit support documentation\r\n\r\nJob Requirements\r\n4. Qualifications and Experience\r\nJob search platform\r\n\u00a0Education\r\n\r\n \tBachelor\u2019s degree in:\r\n\r\n\u00fc\u00a0\u00a0Information Technology\r\n\u00fc\u00a0\u00a0Computer Science\r\n\u00fc\u00a0\u00a0Cybersecurity\r\n\u00fc\u00a0\u00a0Or related field\r\nProfessional Certifications (Advantage)\r\nEducational Resources\r\n\r\n \t\r\n\r\n \tCISSP (Certified Information Systems Security Professional)\r\n \tCISM (Certified Information Security Manager)\r\n \tCEH (Certified Ethical Hacker)\r\n \tCompTIA Security+\r\n \tOther recognised ICT Security Certifications\r\n\r\n\r\n\r\nMust be a paid member of ICTAZ\r\n\r\nExperience\r\n\r\n \tMinimum\u00a04 years\u00a0experience in ICT or cybersecurity roles\r\n \tHands\u2011on experience in security monitoring tools and log analysis\r\n \tExperience in risk management, compliance, or audits is an added advantage.\r\n\r\n5. Technical Skills\r\n\r\n \t\r\n\r\n \tSecurity tools (SIEM, firewalls, IDS/IPS)\r\n \tOperating systems (Windows, Linux)\r\n \tNetworking fundamentals (TCP/IP, VPNs, routing)\r\n \tIdentity and access management systems\r\n \tVulnerability scanning tools.\r\n\r\n\r\n\r\n6. Key Competencies\r\n\r\n \tStrong analytical and problem\u2011solving skills.\r\n \tAttention to detail and investigative mindset.\r\n \tHigh level of integrity and confidentiality\r\n \tAbility to work independently and objectively.\r\n \tEffective communication and reporting skills\r\n\r\n7. Working Relationships\r\n\r\n \t\r\n\r\n \tICT Operations Team\r\n \tInternal Audit and Risk Management\r\n \tExternal Auditors and Regulators\r\n \tAll Business Units (for compliance and awareness)\r\n\r\n\r\n\r\n8. Performance Indicators\r\n\r\n \tTimely detection and resolution of security incidents\r\n \tCompliance with ICT policies and audit requirements\r\n \tEffectiveness of access control and monitoring processes\r\n \tQuality and timeliness of reporting\r\n\r\nThe duration of the contract is 12 Months","datePosted":"2026-05-04T06:33:10","validThrough":"2026-05-14T00:00:00","employmentType":"FULL_TIME","hiringOrganization"...

ZCCM Investment Holdings Plc

Learn more about this employer

Ready to Apply?

Click the button below to submit your application for this exciting opportunity.