ICT Security Specialist job at ZCCM Investment Holdings Plc
New
2 Days Ago
Linkedid Twitter Share on facebook
ICT Security Specialist
2026-05-02T17:47:18+00:00
ZCCM Investment Holdings Plc
https://cdn.greatzambiajobs.com/jsjobsdata/data/employer/comp_3458/logo/ZCCM%20Investments%20Holding%20Plc.jpg
TEMPORARY
Lusaka
Lusaka
10101
Zambia
Professional Services
Computer & IT, Science & Engineering
ZMW
MONTH
2026-05-12T17:00:00+00:00
8

The ICT Security Specialist is responsible for protecting the organisation’s information systems, networks, and data assets by ensuring the effective implementation, monitoring, and continuous improvement of ICT security controls. The role provides independent oversight, proactive threat detection, and assurance that ICT policies, standards, and regulatory requirements (such as the Data Protection

2. Key Responsibilities

2.1 Security Monitoring and Incident Management

  • Monitor and analyse security logs from firewalls, intrusion detection/prevention systems, servers, and applications.
  • Detect, investigate, and respond to security incidents and anomalies.
  • Escalate and report security breaches in accordance with defined procedures.
  • Maintain proper documentation of incidents and actions taken.

2.2 ICT Policy Implementation and Compliance

  • Ensure full implementation of ICT and Information Security policies.
  • Conduct periodic compliance checks and identify control gaps.
  • Recommend corrective actions and track remediation progress.
  • Support internal and external audit processes.

2.3 Access Control and Identity Management

  • Perform periodic user access reviews, including privileged accounts.
  • Enforce least privilege principles and segregation of duties.
  • Monitor unauthorized access attempts and suspicious activities.
  • Ensure compliance with access control policies and procedures.

2.4 Disaster Recovery and Business Continuity

  • Coordinate and validate periodic Disaster Recovery (DR) tests.
  • Ensure DR documentation is regularly updated and accessible.
  • Evaluate test results and recommend improvements where needed.
  • Monitor readiness of backup systems and recovery processes.
  • Ensure backups are regularly done and tested for both integrity and restorability.

2.5 Vulnerability Management and Risk Assessment

  • Conduct routine vulnerability assessments and security scans across the ZCCM-IH Group network.
  • Identify weaknesses in systems, networks, and applications for the ZCCM-IH Group
  • Recommend risk mitigation strategies and controls to be implemented.
  • Support enterprise risk management initiatives across the group.

2.6 Security Awareness and Best Practices

  • Promote security awareness among ZCCM-IH Group staff.
  • Guide on safe ICT practices
  • Support training initiatives to reduce human‑related security risks.

2.7 IT Control Environment Assurance

  • Continuously assess the effectiveness of IT controls
  • Ensure critical controls remain operational and effective at all times.
  • Provide periodic reports on the security posture of the organisation.

3. Key Deliverables

  • Security monitoring and incident reports
  • Access control review reports
  • DR testing reports and findings
  • Vulnerability and risk assessment reports
  • Compliance and audit support documentation

4. Qualifications and Experience

Education

  • Bachelor’s degree in:
  • Information Technology
  • Computer Science
  • Cybersecurity
  • Or related field

Professional Certifications (Advantage)

  • CISSP (Certified Information Systems Security Professional)
  • CISM (Certified Information Security Manager)
  • CEH (Certified Ethical Hacker)
  • CompTIA Security+
  • Other recognised ICT Security Certifications

Must be a paid member of ICTAZ

Experience

  • Minimum 4 years experience in ICT or cybersecurity roles
  • Hands‑on experience in security monitoring tools and log analysis
  • Experience in risk management, compliance, or audits is an added advantage.

5. Technical Skills

  • Security tools (SIEM, firewalls, IDS/IPS)
  • Operating systems (Windows, Linux)
  • Networking fundamentals (TCP/IP, VPNs, routing)
  • Identity and access management systems
  • Vulnerability scanning tools.

6. Key Competencies

  • Strong analytical and problem‑solving skills.
  • Attention to detail and investigative mindset.
  • High level of integrity and confidentiality
  • Ability to work independently and objectively.
  • Effective communication and reporting skills

7. Working Relationships

  • ICT Operations Team
  • Internal Audit and Risk Management
  • External Auditors and Regulators
  • All Business Units (for compliance and awareness)

8. Performance Indicators

  • Timely detection and resolution of security incidents
  • Compliance with ICT policies and audit requirements
  • Effectiveness of access control and monitoring processes
  • Quality and timeliness of reporting
  • Monitor and analyse security logs from firewalls, intrusion detection/prevention systems, servers, and applications.
  • Detect, investigate, and respond to security incidents and anomalies.
  • Escalate and report security breaches in accordance with defined procedures.
  • Maintain proper documentation of incidents and actions taken.
  • Ensure full implementation of ICT and Information Security policies.
  • Conduct periodic compliance checks and identify control gaps.
  • Recommend corrective actions and track remediation progress.
  • Support internal and external audit processes.
  • Perform periodic user access reviews, including privileged accounts.
  • Enforce least privilege principles and segregation of duties.
  • Monitor unauthorized access attempts and suspicious activities.
  • Ensure compliance with access control policies and procedures.
  • Coordinate and validate periodic Disaster Recovery (DR) tests.
  • Ensure DR documentation is regularly updated and accessible.
  • Evaluate test results and recommend improvements where needed.
  • Monitor readiness of backup systems and recovery processes.
  • Ensure backups are regularly done and tested for both integrity and restorability.
  • Conduct routine vulnerability assessments and security scans across the ZCCM-IH Group network.
  • Identify weaknesses in systems, networks, and applications for the ZCCM-IH Group
  • Recommend risk mitigation strategies and controls to be implemented.
  • Support enterprise risk management initiatives across the group.
  • Promote security awareness among ZCCM-IH Group staff.
  • Guide on safe ICT practices
  • Support training initiatives to reduce human‑related security risks.
  • Continuously assess the effectiveness of IT controls
  • Ensure critical controls remain operational and effective at all times.
  • Provide periodic reports on the security posture of the organisation.
  • Security tools (SIEM, firewalls, IDS/IPS)
  • Operating systems (Windows, Linux)
  • Networking fundamentals (TCP/IP, VPNs, routing)
  • Identity and access management systems
  • Vulnerability scanning tools.
  • Bachelor’s degree in: Information Technology, Computer Science, Cybersecurity, Or related field
  • CISSP (Certified Information Systems Security Professional)
  • CISM (Certified Information Security Manager)
  • CEH (Certified Ethical Hacker)
  • CompTIA Security+
  • Other recognised ICT Security Certifications
  • Must be a paid member of ICTAZ
bachelor degree
48
JOB-69f638a63ce7d

Vacancy title:
ICT Security Specialist

[Type: TEMPORARY, Industry: Professional Services, Category: Computer & IT, Science & Engineering]

Jobs at:
ZCCM Investment Holdings Plc

Deadline of this Job:
Tuesday, May 12 2026

Duty Station:
Lusaka | Lusaka

Summary
Date Posted: Saturday, May 2 2026, Base Salary: Not Disclosed

Similar Jobs in Zambia
Learn more about ZCCM Investment Holdings Plc
ZCCM Investment Holdings Plc jobs in Zambia

JOB DETAILS:

The ICT Security Specialist is responsible for protecting the organisation’s information systems, networks, and data assets by ensuring the effective implementation, monitoring, and continuous improvement of ICT security controls. The role provides independent oversight, proactive threat detection, and assurance that ICT policies, standards, and regulatory requirements (such as the Data Protection

2. Key Responsibilities

2.1 Security Monitoring and Incident Management

  • Monitor and analyse security logs from firewalls, intrusion detection/prevention systems, servers, and applications.
  • Detect, investigate, and respond to security incidents and anomalies.
  • Escalate and report security breaches in accordance with defined procedures.
  • Maintain proper documentation of incidents and actions taken.

2.2 ICT Policy Implementation and Compliance

  • Ensure full implementation of ICT and Information Security policies.
  • Conduct periodic compliance checks and identify control gaps.
  • Recommend corrective actions and track remediation progress.
  • Support internal and external audit processes.

2.3 Access Control and Identity Management

  • Perform periodic user access reviews, including privileged accounts.
  • Enforce least privilege principles and segregation of duties.
  • Monitor unauthorized access attempts and suspicious activities.
  • Ensure compliance with access control policies and procedures.

2.4 Disaster Recovery and Business Continuity

  • Coordinate and validate periodic Disaster Recovery (DR) tests.
  • Ensure DR documentation is regularly updated and accessible.
  • Evaluate test results and recommend improvements where needed.
  • Monitor readiness of backup systems and recovery processes.
  • Ensure backups are regularly done and tested for both integrity and restorability.

2.5 Vulnerability Management and Risk Assessment

  • Conduct routine vulnerability assessments and security scans across the ZCCM-IH Group network.
  • Identify weaknesses in systems, networks, and applications for the ZCCM-IH Group
  • Recommend risk mitigation strategies and controls to be implemented.
  • Support enterprise risk management initiatives across the group.

2.6 Security Awareness and Best Practices

  • Promote security awareness among ZCCM-IH Group staff.
  • Guide on safe ICT practices
  • Support training initiatives to reduce human‑related security risks.

2.7 IT Control Environment Assurance

  • Continuously assess the effectiveness of IT controls
  • Ensure critical controls remain operational and effective at all times.
  • Provide periodic reports on the security posture of the organisation.

3. Key Deliverables

  • Security monitoring and incident reports
  • Access control review reports
  • DR testing reports and findings
  • Vulnerability and risk assessment reports
  • Compliance and audit support documentation

4. Qualifications and Experience

Education

  • Bachelor’s degree in:
  • Information Technology
  • Computer Science
  • Cybersecurity
  • Or related field

Professional Certifications (Advantage)

  • CISSP (Certified Information Systems Security Professional)
  • CISM (Certified Information Security Manager)
  • CEH (Certified Ethical Hacker)
  • CompTIA Security+
  • Other recognised ICT Security Certifications

Must be a paid member of ICTAZ

Experience

  • Minimum 4 years experience in ICT or cybersecurity roles
  • Hands‑on experience in security monitoring tools and log analysis
  • Experience in risk management, compliance, or audits is an added advantage.

5. Technical Skills

  • Security tools (SIEM, firewalls, IDS/IPS)
  • Operating systems (Windows, Linux)
  • Networking fundamentals (TCP/IP, VPNs, routing)
  • Identity and access management systems
  • Vulnerability scanning tools.

6. Key Competencies

  • Strong analytical and problem‑solving skills.
  • Attention to detail and investigative mindset.
  • High level of integrity and confidentiality
  • Ability to work independently and objectively.
  • Effective communication and reporting skills

7. Working Relationships

  • ICT Operations Team
  • Internal Audit and Risk Management
  • External Auditors and Regulators
  • All Business Units (for compliance and awareness)

8. Performance Indicators

  • Timely detection and resolution of security incidents
  • Compliance with ICT policies and audit requirements
  • Effectiveness of access control and monitoring processes
  • Quality and timeliness of reporting

Work Hours: 8

Experience in Months: 48

Level of Education: bachelor degree

Job application procedure

Application Link:Click Here to Apply Now

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Zambia
Job Type: Full-time
Deadline of this Job: Tuesday, May 12 2026
Duty Station: Lusaka | Lusaka
Posted: 02-05-2026
No of Jobs: 1
Start Publishing: 02-05-2026
Stop Publishing (Put date of 2030): 10-10-2076
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.