Looking for the best HOST for your website? Hostinger is the BEST. Try It NOW!

Company Info

Large organization

Moniepoint Incorporated is a global business payments and banking platform and recently became QED Investors’ first investment in Africa. We are the partner of choice for over 600,000 businesses of all sizes, powering the dreams of SMBs and providing them with equal access to the tools they need to grow and scale.

200 + Employees

Moniepoint Incorporated is a global business payments and banking platform and recently became QED Investors’ first investment in Africa. We are the partner of choice for over 600,000 businesses of all sizes, powering the dreams of SMBs and providing them with equal access to the tools they need to grow and scale.

1). Cloud Security Architect

Location: Lagos (Hybrid))

Employment Type: Full Time

Job Summary

  • We are actively seeking a Cloud Security Engineer to support the Chief  Information Security Officer in maintaining a secure and reliable cloud environment safeguarding the information assets of Moniepoint and also utilizing information and related technology to achieve the business objectives.

What You’ll Get To Do
Security Assessment:

  • Conduct thorough security assessments of applications through manual and automated testing.
  • Identify and evaluate vulnerabilities in web and mobile applications.

Security Architecture:

  • Collaborate with development teams to integrate security best practices into the application development lifecycle.
  • Design and implement security controls to protect sensitive data and ensure the confidentiality, integrity, and availability of applications.

Penetration Testing:

  • Perform penetration testing on applications to simulate real-world cyber-attacks and identify potential weaknesses.
  • Provide detailed reports on findings, including recommended remediation strategies.

Incident Response:

  • Act as a key contributor in incident response activities related to application security incidents.
  • Collaborate with cross-functional teams to investigate and resolve security incidents.

Compliance:

  • Ensure applications comply with relevant security standards, regulations, and industry best practices.
  • Stay abreast of emerging security threats and industry trends to proactively address potential risks.

Training and Awareness:

  • Develop and deliver security training programs for development teams to enhance awareness of secure coding practices.
  • Keep stakeholders informed about the latest security vulnerabilities and mitigation strategies.

Security Tools:

  • Manage and configure security tools for continuous monitoring and analysis of application security.
  • Stay current with advancements in security technologies and integrate them into the security framework.
  • Creating cloud-based infrastructure and programs including implementing identity and access management and configuring cloud environments securely.
  • Performing penetration testing and threat simulations to identify potential risks.
  • Managing cryptography and encryption in the cloud. • Monitoring for and responding to incidents in the cloud environment.
  • Keeping cloud infrastructure current, making recommendations,  and continually improving cloud security technologies.
  • Analyzing, designing, and developing programs, shell scripts, tests,  and infrastructure automation capabilities.
  • Working with analysts, engineers, and data scientists across the organization to continually improve cyber resilience.
  • To work collaboratively with the wider Information Security team.
  • To take part in post-incident reviews and propose engineering resolutions to improve results in any future recurrence.

To Succeed In This Role, We Think You Should Have

  • A Degree in Computer Science, Management Information  Systems, Computer Engineering or a related degree
  • Relevant cloud certifications include: Certificate of Cloud Security Knowledge (CCSK); Certified Cloud Security Professional (CCSP) AWS Certified Solutions Architect – Associate Microsoft Certified: Azure Solutions Architect Expert  Google Cloud Engineer Associate A minimum of 5 years experience in information  security/technology risk reviews across enterprise operating  systems, databases, banking applications and networks
  • Experience with designing, and implementing secure and highly available infrastructure, services, and data storage in hybrid-cloud or commercial cloud environments such as AWS, Azure or GCP.
  • Hands experience with a least 1 of the main cloud vendors  (Amazon Web Services, Azure, Google Cloud Platform)
  • Experience of Cloud Security Tools
  • An excellent knowledge of Information Security principles and an understanding of the Cyber Kill Chain, MITRE ATT&CK and other information security defence and intelligence frameworks.
  • Experience in scripting languages like Python, Ruby-on-Rails,  Javascript, building and consuming Application Program  Interfaces (APIs)/micro-services

Advantage If You Have:

  • A keen eye for detail.
  • Highly motivated, energetic and self-learner.
  • Ability to work with little supervision and meet strict deadlines. • Must be results-oriented, setting high standards, and intent on making things happen.
  • Takes the initiative within given parameters with freedom to act.

What We Can Offer You

Looking for the best HOST for your website? Hostinger is the BEST. Try It NOW!
  • Culture – We put our people first and prioritize the well-being of every team member. We’ve built a company where all opinions carry weight and where all voices are heard. We value and respect each other and always look out for one another. Above all, we are human.
  • Learning – We have a learning and development-focused environment with an emphasis on knowledge sharing, training, and regular internal technical talks.
  • Compensation – You’ll receive an attractive salary, pension, health insurance, Employee Stock Options, annual bonus, plus other benefits.

Application Closing Date
Not Specified.

===

===

2). Threat Intelligence Analyst 

Location: Lagos (Remote)
Employment Type: Full Time

Job Summary

  • We are seeking a highly analytical and detail-oriented Threat Intelligence Analyst to join our Information Security team.
  • The Threat Intelligence Analyst will be responsible for gathering, analyzing, and disseminating actionable threat intelligence to protect the organization’s assets from cyber threats.
  • The ideal candidate will have a strong background in cybersecurity, intelligence analysis, and threat research.

What You’ll Get To Do
Threat Intelligence Gathering:

  • Collect and analyze threat data from various internal and external sources, including open sources, dark web, threat feeds, and industry reports.
  • Monitor cyber threat landscape for new and emerging threats relevant to the organization.
  • Utilize threat intelligence platforms and tools to aggregate and analyze threat data.

Threat Analysis and Reporting:

  • Perform deep-dive analysis on cyber threats, threat actors, tactics, techniques, and procedures (TTPs).
  • Develop and maintain threat profiles and threat models to understand and predict adversarial behavior.
  • Create detailed threat intelligence reports, briefings, and alerts for technical and non-technical stakeholders.

Collaboration and Communication:

  • Collaborate with incident response, security operations, and risk management teams to provide actionable intelligence and support ongoing investigations.
  • Participate in threat-hunting activities to identify potential security incidents.
  • Maintain relationships with external intelligence communities, industry groups, and information-sharing organizations.

Continuous Improvement

  • Stay current with the latest cyber threats, vulnerabilities, and intelligence methodologies.
  • Continuously improve threat intelligence processes, tools, and techniques.
  • Participate in security-related training, conferences, and development activities.

Compliance and Standards:

  • Ensure threat intelligence practices comply with relevant regulations and standards such as PCI DSS, ISO 27001, and industry-specific requirements.
  • Contribute to the development and maintenance of security policies and procedures related to threat intelligence.

To Succeed In This Role, We Think You Should Have

  • Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field. Equivalent experience may be considered.
  • Minimum of 3 years of experience in threat intelligence, cybersecurity analysis, or a related field.
  • Proven experience in analyzing and interpreting threat data from multiple sources.
  • Relevant certifications such as CEH, GCTI, CISSP, or other SANS GIAC certifications are highly desirable.
  • Strong understanding of cyber threat intelligence frameworks such as MITRE ATT&CK, STIX/TAXII, and Cyber Kill Chain.
  • Proficiency with threat intelligence platforms and tools such as ThreatConnect, Anomali, or Recorded Future.
  • Knowledge of malware analysis, digital forensics, and incident response processes.
  • Experience with scripting and programming languages such as Python or PowerShell is a plus.
  • Excellent analytical and critical thinking skills.
  • Strong communication and report-writing skills.
  • Ability to work independently and collaboratively in a team environment.

What We Can Offer You

  • Culture -We put our people first and prioritize the well-being of every team member. We’ve built a company where all opinions carry weight and where all voices are heard. We value and respect each other and always look out for one another. Above all, we are human.
  • Learning – We have a learning and development-focused environment with an emphasis on knowledge sharing, training, and regular internal technical talks.
  • Compensation – You’ll receive an attractive salary, pension, health insurance,, Employee Stock Options, annual bonus, plus other benefits.

Application Closing Date
Not Specified.

===

Looking for the best HOST for your website? Hostinger is the BEST. Try It NOW!

===

3). Vunerability Management Engineer

Location: Lagos (Remote)
Employment Type: Full Time

Job Summary

  • We are seeking a proactive and detail-oriented Vulnerability Management Engineer to join our Information Security team.
  • The Vulnerability Management Engineer will be responsible for identifying, analyzing, and managing vulnerabilities within our IT infrastructure and applications.
  • The ideal candidate will have a strong technical background in vulnerability assessment, risk management, and remediation strategies.

What You’ll Get To Do
Vulnerability Identification and Assessment:

  • Conduct regular vulnerability scans and assessments on networks, systems, and applications.
  • Analyze scan results to identify vulnerabilities and potential risks.
  • Classify vulnerabilities based on severity and potential impact on the organization.

Remediation and Mitigation:

  • Collaborate with IT and development teams to prioritize and remediate identified vulnerabilities.
  • Develop and implement mitigation strategies to address vulnerabilities in a timely manner.
  • Track and report on the status of remediation efforts to ensure timely resolution.

Risk Management:

  • Perform risk assessments to evaluate the potential impact of vulnerabilities on the organization.
  • Develop risk mitigation plans and work with stakeholders to implement them.
  • Continuously monitor and reassess the risk landscape to adjust mitigation strategies as needed.

Security Tools and Technologies:

  • Manage and maintain vulnerability management tools and platforms.
  • Stay updated on the latest vulnerability management tools and technologies.
  • Develop custom scripts and tools to enhance vulnerability management processes.

Compliance and Standards:

  • Ensure vulnerability management practices comply with relevant regulations and standards such as PCI-DSS, ISO 27001, and NIST.
  • Contribute to the development and maintenance of security policies and procedures.
  •  Assist in audits and assessments related to vulnerability management.

Reporting and Documentation:

  • Create detailed reports on vulnerability findings, remediation efforts, and overall security posture.
  • Communicate vulnerability status and risks to technical and non-technical stakeholders.
  • Maintain accurate and up-to-date documentation of vulnerability management activities.

Continuous Improvement:

  • Stay current with the latest cybersecurity threats, vulnerabilities, and trends.
  • Continuously evaluate and improve vulnerability management processes and practices.
  • Participate in security-related training and development activities.

To Succeed In This Role, We Think You Should Have

  • Bachelor’s degree in Computer Science, Information Security, or a related field. Equivalent experience may be considered.
  • Minimum of 3 years of experience in vulnerability management, security engineering, or a related field.
  • Proven experience with vulnerability scanning tools and platforms.
  • Relevant certifications such as CISSP, CISM, CEH, or GIAC are highly desirable.
  • In-depth knowledge of vulnerability assessment and management methodologies.
  • Proficiency with vulnerability scanning tools such as Nessus, Qualys, and Rapid7.
  • Strong understanding of network and application security principles.
  • Experience with scripting and programming languages such as Python, Ruby, or Bash.
  • Excellent analytical and problem-solving skills.
  • Strong communication and reporting skills.
  • Ability to work independently and as part of a team.

What We Can Offer You

  • Culture -We put our people first and prioritize the well-being of every team member. We’ve built a company where all opinions carry weight and where all voices are heard. We value and respect each other and always look out for one another. Above all, we are human.
  • Learning – We have a learning and development-focused environment with an emphasis on knowledge sharing, training, and regular internal technical talks.
  • Compensation – You’ll receive an attractive salary, pension, health insurance,, Employee Stock Options, annual bonus, plus other benefits.

Application Closing Date
Not Specified.

===

===

4). Senior Penetration Tester

Location: Lagos
Employment Type: Full Time

Job Description

  • We are looking for a skilled and highly motivated Senior Penetration Tester to join our Information Security team.
  • The Senior Penetration Tester will be responsible for identifying and exploiting vulnerabilities in our systems, networks, and applications to enhance the organization’s security posture.
  • The ideal candidate will have a strong technical background in ethical hacking, vulnerability assessment, and security testing methodologies

Responsibilities
Vulnerability Assessment and Exploitation:

  • Conduct comprehensive offensive penetration testing on network infrastructure, web applications, mobile applications, and other digital assets.
  • Identify, analyze, and exploit security vulnerabilities using advanced tools and techniques.
  • Perform manual testing to complement automated tools and identify complex vulnerabilities.

Reporting and Documentation:

  • Document findings in detailed, clear, and concise penetration testing reports.
  • Provide actionable recommendations to mitigate identified vulnerabilities
  • Communicate findings and recommendations to technical and non-technical stakeholders

Security Tools and Methodologies:

  •  Utilize a variety of penetration testing tools such as Burp Suite, Metasploit, Nessus, Nmap, and others.
  •  Develop custom scripts and tools to assist in testing efforts.
  • Stay updated on the latest security vulnerabilities, tools, and methodologies.

Collaboration and Support:

  • Work closely with the security operations, development, and IT teams to address security issues..
  • Participate in red team/blue team exercises to improve overall security posture..
  • Provide support and guidance to junior penetration testers and security analysts

Compliance and Standards:

  • Ensure penetration testing activities comply with relevant regulations and standards such as PCI-DSS, ISO 27001, etc.
  • Contribute to the development and maintenance of security policies and procedures

Skills and Qualifications

  • A bachelor’s degree in Computer Science, Information Security,, Computer Engineering, or a related degree
  • Possesses relevant certifications such as OSCP, CEH, GPEN, or CISSP is required)
  • Minimum of 5 years of experience in penetration testing, ethical hacking, or a related field
  • Proven track record of identifying and exploiting vulnerabilities in diverse environments..
  • In-depth knowledge of network and application security principles.
  • Proficiency with penetration testing tools and methodologies.
  • Strong understanding of common vulnerabilities and exploitation techniques.
  • Experience with scripting and programming languages such as Python, Ruby, Bash, or PowerShell
  • Excellent analytical and problem-solving skills
  • Strong communication and reporting skills.
  • Ability to work independently and as part of a team.

Deadline: Not Specified.

How to Apply: Interested and qualified candidates should use the links below to apply:

Looking for the best HOST for your website? Hostinger is the BEST. Try It NOW!
Looking for the best HOST for your website? Hostinger is the BEST. Try It NOW!

    Other Jobs Listed By the Company.

    Moniepoint Incorporated is a global business payments and banking platform and recently became QED Investors’ first investment in Africa. We are the partner of choice for over 600,000 businesses of all sizes, powering the dreams of SMBs and providing them with equal access to the tools they need to grow and scale. | Cross River

    0 Views

    July 24, 2024

    Moniepoint Incorporated is a global business payments and banking platform and recently became QED Investors’ first investment in Africa. We are the partner of choice for over 600,000 businesses of all sizes, powering the dreams of SMBs and providing them with equal access to the tools they need to grow and scale. | Remote

    0 Views

    July 18, 2024

    Moniepoint Incorporated is a global business payments and banking platform and recently became QED Investors’ first investment in Africa. We are the partner of choice for over 600,000 businesses of all sizes, powering the dreams of SMBs and providing them with equal access to the tools they need to grow and scale. | Remote

    0 Views

    July 16, 2024