Information Systems Officer – Lusaka Stock Exchange job at Capacity recruitment agency limited
Website :
185 Days Ago
Linkedid Twitter Share on facebook
Information Systems Officer – Lusaka Stock Exchange
2025-06-03T11:24:38+00:00
Capacity recruitment agency limited
https://cdn.greatzambiajobs.com/jsjobsdata/data/default_logo_company/defaultlogo.png
FULL_TIME
 
Lusaka
Lusaka
10101
Zambia
Consulting
Computer & IT
ZMW
 
MONTH
2025-06-06T17:00:00+00:00
 
Zambia
8

Role Requirement
We are looking for an Information systems and security officer (ISSO) who will be responsible for defining and maintaining policies and documentation for the organizational security program in order to address risks in the organization and maintaining a healthy security posture. The officer will be conducting risk assessments regularly with data owners, and reporting the effectiveness of the organization’s security controls to the IT Manager.
The ISSO will ensure that the organization IT policy is implemented and enforced with a goal of protecting the organization’s information assets, preventing unauthorized access as well as well as ensuring availability of
information and systems. The officer will define, create and maintain the documentation for certification and accreditation of each information system in accordance with the organization’s requirements. The Officer will also be able to assess the impacts on system modifications and technological advances. Additionally, the ISSO will constantly review systems in order to identify potential security weaknesses, recommend improvements to amend vulnerabilities, implement changes and document upgrades. The ISSO will also be responsible for administering the mobile applications run by the LuSE. This role will be reporting to IT Manager.

Principal Accountabilities

  • Protection of the organization from emerging security risks and implement control technologies
  • Planning, Implementation, operation and maintenance of the Information Security Management System(s) based on security policies and best practices
  • Offering internal advice and practical assistance on information security risk and control matters throughout the organization
  • Backups, replications and testing system restores (both primary and DRS), ensuring availability of data
  • Promoting the advantages of managing information security risks more efficiently and effectively.
  • Implementation of necessary information security policies, standards, procedures and guidelines
  • Discussing with user on issues such as computer data access needs, security violations, and systems security changes.
  • Ensure user compliance both with internal security policies etc. and applicable laws and regulations
  • Leading suitable information security awareness, training and educational activities with respect to information security
  • Documenting computer security measures, policies, procedures, and tests.
  • Training users on the company’s security policies and promote security awareness to ensure systems security and improve systems and network efficiency.
  • Monitoring and regulating systems accessibility to safeguard systems and company data.
  • Upgrading and / or modification of computer security files to incorporate new software, correcting errors, or changing individual access status.
  • Performing security risk assessments and ensure risk areas are covered / and or reduced as per the company’s security policies.
  • Developing plans and implementing solutions to safeguard systems data/ information against accidental or unauthorized modification, destruction, or disclosure.
  • Ensuring updated statuses of security systems e.g antivirus, firewalls
  • Ensuring data encryption of company data transmissions and storage
  • Reviewing violations of computer security procedures and discussing procedures with violators to ensure violations are not repeated.
  • Supporting the LuSE Mobile Application and other custom systems
  • Systems and database support
  • Covering for any member of department as may be assignment when necessary i.e Officer –Infrastructure officer and / or Manager – Information Technology
  • Any other lawful duties as assigned.

Candidate Requirements:

  • Education and Qualifications: Bachelor’s degree in information technology / software engineering, Computer Science, Cyber Security, Business and Information Technology field.
  • Experience: 3 years of experience, working in a complex IT environment
  • Certifications in Cyber Security, Microsoft and Cisco
  • Exceptional active listening and verbal and written communication skills.
  • Strong research, decision making, critical thinking, and problem-solving skills.
  • Awareness of industry trends, technology, and developments.
Protection of the organization from emerging security risks and implement control technologies Planning, Implementation, operation and maintenance of the Information Security Management System(s) based on security policies and best practices Offering internal advice and practical assistance on information security risk and control matters throughout the organization Backups, replications and testing system restores (both primary and DRS), ensuring availability of data Promoting the advantages of managing information security risks more efficiently and effectively. Implementation of necessary information security policies, standards, procedures and guidelines Discussing with user on issues such as computer data access needs, security violations, and systems security changes. Ensure user compliance both with internal security policies etc. and applicable laws and regulations Leading suitable information security awareness, training and educational activities with respect to information security Documenting computer security measures, policies, procedures, and tests. Training users on the company’s security policies and promote security awareness to ensure systems security and improve systems and network efficiency. Monitoring and regulating systems accessibility to safeguard systems and company data. Upgrading and / or modification of computer security files to incorporate new software, correcting errors, or changing individual access status. Performing security risk assessments and ensure risk areas are covered / and or reduced as per the company’s security policies. Developing plans and implementing solutions to safeguard systems data/ information against accidental or unauthorized modification, destruction, or disclosure. Ensuring updated statuses of security systems e.g antivirus, firewalls Ensuring data encryption of company data transmissions and storage Reviewing violations of computer security procedures and discussing procedures with violators to ensure violations are not repeated. Supporting the LuSE Mobile Application and other custom systems Systems and database support Covering for any member of department as may be assignment when necessary i.e Officer –Infrastructure officer and / or Manager – Information Technology Any other lawful duties as assigned.
Education and Qualifications: Bachelor’s degree in information technology / software engineering, Computer Science, Cyber Security, Business and Information Technology field. Experience: 3 years of experience, working in a complex IT environment Certifications in Cyber Security, Microsoft and Cisco Exceptional active listening and verbal and written communication skills. Strong research, decision making, critical thinking, and problem-solving skills. Awareness of industry trends, technology, and developments.
Education and Qualifications: Bachelor’s degree in information technology / software engineering, Computer Science, Cyber Security, Business and Information Technology field. Experience: 3 years of experience, working in a complex IT environment Certifications in Cyber Security, Microsoft and Cisco Exceptional active listening and verbal and written communication skills. Strong research, decision making, critical thinking, and problem-solving skills. Awareness of industry trends, technology, and developments.
bachelor degree
36
JOB-683edb76b1a27

Vacancy title:
Information Systems Officer – Lusaka Stock Exchange

[Type: FULL_TIME, Industry: Consulting, Category: Computer & IT]

Jobs at:
Capacity recruitment agency limited

Deadline of this Job:
Friday, June 6 2025

Duty Station:
Lusaka | Lusaka | Zambia

Summary
Date Posted: Tuesday, June 3 2025, Base Salary: Not Disclosed

Similar Jobs in Zambia
Learn more about Capacity recruitment agency limited
Capacity recruitment agency limited jobs in Zambia

JOB DETAILS:

Role Requirement
We are looking for an Information systems and security officer (ISSO) who will be responsible for defining and maintaining policies and documentation for the organizational security program in order to address risks in the organization and maintaining a healthy security posture. The officer will be conducting risk assessments regularly with data owners, and reporting the effectiveness of the organization’s security controls to the IT Manager.
The ISSO will ensure that the organization IT policy is implemented and enforced with a goal of protecting the organization’s information assets, preventing unauthorized access as well as well as ensuring availability of
information and systems. The officer will define, create and maintain the documentation for certification and accreditation of each information system in accordance with the organization’s requirements. The Officer will also be able to assess the impacts on system modifications and technological advances. Additionally, the ISSO will constantly review systems in order to identify potential security weaknesses, recommend improvements to amend vulnerabilities, implement changes and document upgrades. The ISSO will also be responsible for administering the mobile applications run by the LuSE. This role will be reporting to IT Manager.

Principal Accountabilities

  • Protection of the organization from emerging security risks and implement control technologies
  • Planning, Implementation, operation and maintenance of the Information Security Management System(s) based on security policies and best practices
  • Offering internal advice and practical assistance on information security risk and control matters throughout the organization
  • Backups, replications and testing system restores (both primary and DRS), ensuring availability of data
  • Promoting the advantages of managing information security risks more efficiently and effectively.
  • Implementation of necessary information security policies, standards, procedures and guidelines
  • Discussing with user on issues such as computer data access needs, security violations, and systems security changes.
  • Ensure user compliance both with internal security policies etc. and applicable laws and regulations
  • Leading suitable information security awareness, training and educational activities with respect to information security
  • Documenting computer security measures, policies, procedures, and tests.
  • Training users on the company’s security policies and promote security awareness to ensure systems security and improve systems and network efficiency.
  • Monitoring and regulating systems accessibility to safeguard systems and company data.
  • Upgrading and / or modification of computer security files to incorporate new software, correcting errors, or changing individual access status.
  • Performing security risk assessments and ensure risk areas are covered / and or reduced as per the company’s security policies.
  • Developing plans and implementing solutions to safeguard systems data/ information against accidental or unauthorized modification, destruction, or disclosure.
  • Ensuring updated statuses of security systems e.g antivirus, firewalls
  • Ensuring data encryption of company data transmissions and storage
  • Reviewing violations of computer security procedures and discussing procedures with violators to ensure violations are not repeated.
  • Supporting the LuSE Mobile Application and other custom systems
  • Systems and database support
  • Covering for any member of department as may be assignment when necessary i.e Officer –Infrastructure officer and / or Manager – Information Technology
  • Any other lawful duties as assigned.

Candidate Requirements:

  • Education and Qualifications: Bachelor’s degree in information technology / software engineering, Computer Science, Cyber Security, Business and Information Technology field.
  • Experience: 3 years of experience, working in a complex IT environment
  • Certifications in Cyber Security, Microsoft and Cisco
  • Exceptional active listening and verbal and written communication skills.
  • Strong research, decision making, critical thinking, and problem-solving skills.
  • Awareness of industry trends, technology, and developments.

 

Work Hours: 8

Experience in Months: 36

Level of Education: bachelor degree

Job application procedure
Interested in applying for this job? Click here to submit your application now.

Applications including a cover letter, CV and copies of certificates should be not later than 06/06/2025. Please note that only shortlisted candidates will be contacted.

 

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Zambia
Job Type: Full-time
Deadline of this Job: Friday, June 6 2025
Duty Station: Lusaka | Lusaka | Zambia
Posted: 03-06-2025
No of Jobs: 1
Start Publishing: 03-06-2025
Stop Publishing (Put date of 2030): 03-06-2066
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.