Skills
Information Technology Security; Technical Support; SLAs; Business; Information Technology (IT) Infrastructure; Information Security; End Users; Network Infrastructures; Cybersecurity; Change Management; System Administration; Leadership; People Management; Project Management; Accountability
About
Provides leadership and direction to Cybersecurity Incident Detection and
Response team that comprised of six staff members for ensuring security
operations thereby proactively managing cyber security threat for
Vodacom and ensure security breaches in its operational environment are
effectively detected, prevented, and mitigated.
- Oversees all day-to-day operations, functions, and capabilities of
Vodacom DRC cyber defence capabilities and collaborates with the
AfrAsia Kingdom
Zimbabwe Ltd:
- Kaspersky Antivirus
Deployment:
Deployed a Group
antivirus endpoint
solution onto network
infrastructure, trained
personnel and offered
administrative
services for deployed
solution.
- T24 Re-
implementation: Was
responsible for
Quality Assurance and
Change Control and
ensured all changes
implemented
conformed to change
management policies
and procedures.
Fuzzy Electronics:
- Metropolitan Bank:
Project-managed
Technicians during
installation of
biometric access
devices for restricted
areas and training of
support staff.
- ZB: Project-managed
Technicians during
installation of
biometric access
devices for restricted
areas and enrolled
support staff.
- TN Bank: Project-
managed Technicians
during installation of
biometric access
devices for restricted
areas.
- Bio Key Project:
Designed and
5 | Page
C2 General
Vodafone Group Incident Response Team.
- Oversees the implementation of strategy and business goals of the
security department, performs an analysis of market trends and positions
the product portfolio to achieve the business plan objectives.
- Manage third party contractors offering Cyber Services to Vodacom DRC.
Key Roles & Accountabilities:
- Defend and respond to all manner of cyber threats and attacks.
- Build and manage a local SIEM and SOC
- Recruit, develop and retain people with outstanding skills, qualifications
and potential.
- Develop and implement Security Strategy.
- Develop the divisional KPAs and KPIs that will be cascaded down to each
area.
- Cyber Incident Detection and Response
- Cyber Incidents Detection Sources Review and Reporting
- Cyber Security Baselines 4.0
- Design and deploy secure architectures.
- Ad Hoc Demands from Group
Core Overview:
- Developed, drove, and implemented incorporation of IS controls into various internal security frameworks, methodologies, governance practices and control points.
Key Roles & Accountabilities:
- Supervised twelve Support Engineers and assisted with their training.
- Designed and implemented enterprise IS architecture.
- Carried out technical delivery of security projects.
- Managed and maintained IS governance deliverables and current security architecture and implementations.
- Gave strategic recommendations for IS aspects of the business, such as ICT strategy and any new ICT trends.
- Escalated support to customers both remote and on-site.
Managed and monitored AKZL security infrastructure for breaches;
developed metrics and measurements to determine maturity and efficacy
of IS strategy and architecture execution within business.
Key Roles & Accountabilities:
- Advised the business on IT security matters.
- Ensured changes to production environments aligned with Group change
management policy and model.
- Developed, maintained and enforced all IT and IS related policies,
procedures and standards as well as Business Continuity Plans.
- Supervised IT Helpdesk to ensure efficient service delivery according to
best practice service delivery standards.
- Monitored and maintained an IT incident log.
- Analysed IT incident trends and built knowledge base for resolution.
- Oversaw incident response activities of IT Helpdesk personnel.
- Coordinated projects to ensure adherence to best practice project
management standards.
- Managed SLA’s between AKZL and Service Providers, and between IT and
AKZL business units to ensure quality service delivery.
- Conducted IS reviews and all IT related business process reviews.
- Led a comprehensive IT Security Awareness Campaign.
Enterprise Security Solutions
Core Overview:
- Oversees the implementation of strategy and business goals of the
security department, performs an analysis of market trends and positions
the product portfolio to achieve the business plan objectives. This is
achieved through effectively managing products and services through the
product lifecycle and supporting Sales.
- The position carries the commercial responsibility for the company’s
existing and new Security product portfolio and ensuring that each
product performs against the business plan. To achieve this, the full
product life cycle must be managed by the multiple product managers
and product developers under the leadership of this position.
- Oversee a staff complement of ten and work with third party providers to
offer commercial solutions to MTN customers.
Key Roles & Accountabilities:
- Recruit, develop and retain people with outstanding skills, qualifications
and potential.
- Develop and implement Security Strategy.
- Develop the divisional KPAs and KPIs that will be cascaded down to each
customised a bio key
to be used as a
registration tool for
conferences and
events.
Core Overview:
- Monitored client application performance, investigated application performance incidents to establish cause and escalated serious incidents.
Key Roles & Accountabilities:
- Carried out network health checks and documented results.
- Presented findings to client Management in a non-technical manner.
- Researched alternative monitoring solutions.
- Managed and maintained equipment backups and software updates.
- Designed and implemented monitoring solutions and deployed monitoring equipment.
- Carried out and analysed packet captures to aid investigations.
- Adhered to ITIL change management processes.
- Conducted IS reviews and all IT related business process reviews.
area.
- Evaluate and assess people performance.
- Train and develop staff to be able to use resources optimally and enhance
performance.
- Enforce a customer centric approach.
- Build employee relations and collaborative teamwork.
- Manage Employment Equity and diversity.
- Ongoing measuring of products against the business plan
- Migration of customer from “old” product to the “new” product
- Manage the margin of the product within the agreed DOA
- Support the sales team with regards to training of the product
- Competitive (local and global) benchmarking
- Identification of new revenue / new product opportunities
- Analyse product value chains
Provides leadership and direction to the Infrastructure Team, which
comprises of twelve staff members and four third party contractor
companies. Responsible for the design and Implementation of Secure IT
Infrastructure in compliance to Vodacom Technology 2025 guiding
principles.
- Oversees all day-to-day operations, functions, and capabilities of
Vodacom DRC IT. Establishes, explains, and validates solutions and
services in technology and operations Architecture.
- Oversees the implementation of strategy and business goals of the
security department, performs an analysis of market trends and positions
the product portfolio to achieve the business plan objectives.
- Manages and coordinates all Enterprise Projects within IT.
Key Roles & Accountabilities:
- Establish and perform maintenance programs following company and
vendor standards.
- Install, setup, monitor local area network. Create metrics to measure and
report on SLAs.
- Identify utilization patterns and optimize performance across
Infrastructure.
- Maintain and manage the IT Assets discovery process.
- Lead engagements with the projects team as the IT SPEC and ensure
capacity planning is factored into any new engagements.
- Design and deploy secure architectures.
- Ad Hoc Demands from Group
- Recruit, develop and retain people with outstanding skills, qualifications
and potential.
Core Overview:
- Developing Security Programs: Creates, manages and operationalizes the information security program that protects the Ikhokha's data and IT infrastructure. This involves establishing security policies, standards, and procedures that align with business objectives.
- Risk Management: Identifies, assesses, and mitigates risks to the Ikhokha's information assets. This includes monitoring for vulnerabilities and threats and implementing strategies to reduce risks effectively.
- Compliance and Governance: Advises the board regarding security threats and ensuring compliance with relevant laws and regulations. This involves regular reporting on security posture and incidents.
- Team Leadership: Leads the IT and Networks teams and is responsible for resource allocation to optimize security efforts.