News
Skip to main content

New Job Vodacom Tanzania - Cyber Security Demand & Delivery Manage

Vodacom Tanzania - Cyber Security Demand & Delivery Manager

New Job Opportunity at VODACOM Tanzania

New Job Vodacom Tanzania - Cyber Security Demand & Delivery Manager
Job Title: Cyber Security Demand & Delivery Manager
Posting Country:  Tanzania, United Republic of
Date Posted:  03-May-2021
Full Time / Part Time:  Full Time
Contract Type:  Permanent

Vodacom Tanzania

At Vodacom, we’re working hard to build a better future. A more connected, inclusive and sustainable world. As a dynamic global community, it's our human spirit, together with technology, that empowers us to achieve this.

We challenge and innovate in order to connect people, businesses, and communities across the world. Delighting our customers and earning their loyalty drive us, and we experiment, learn fast and get it done, together.

With us, you can be truly be yourself and belong, share inspiration, embrace new opportunities, thrive, and make a real difference.

Role Purpose & Key Responsibilities

Role purpose:

This role is responsible for effective, efficient and careful planning of Vodacom Tanzania cyber security projects and operations, to ensure very minimal business operations. This includes identification of security needs (demands), coordinating delivery of the needs and ensuring security operations are running as designed. Capacity growth and trends, management reports and presentations are also key responsibilities of this role.

Key accountabilities and decision ownership:

Impact on the business

  • Own demand planning and forecasting for Technology security, for all systems, services and processes within the portfolio, working together with vendors and internal customers
  • Coordinate delivery and assessment of cyber security baselines (CSBs) across all Vodacom relevant business areas and processes
  • Perform internal controls self-assessment (CSAs) to validate compliance to security policies, such as user access management, information security and Technology security policies.
  • Ensure adequacy coverage of Security tooling across technologies.
  • Lead security implementation within emerging technologies, including Infrastructure, IOT, Cloud and Office IT Security Customers, supplier and third parties
  • Monitor compliance of the Technology security managed services contract, to ensure it is within agreed SLA
  • Ensure proper implementation and change management process compliance for all planned and emergency changes in Technology systems Leadership and teamwork
  • Monitor and minimize licenses utilization charges as a result of excess usage of un-needed services
  • Owner of the Technology Security Incidents, Requests, Changes and Escalation processes, ensuring high levels of performance in these processes, accurate reporting and establishing service improvement activities when required
  • Be accountable for the quality of Service and performance; ensuring future demand from growth and projects is understood and factored into capacity plans for all associated Technology security systems
  • Provide regular and accurate management reporting on Technology security service performance. This includes management KPIs reports and SLA reports
  • Continuous improve and Ensure proper validation, timely completion and accuracy of audit checklists and user access rights review for Technology areas Innovation and change
  • Delivery of Technology security services and operations to ensure operational metrics are optimized
  • Drive continuous improvement through simplification of key cyber security processes

Communication

  • Drive internal and third party service review meetings covering performance, service improvements, quality and processes
  • Make recommendations for Technology security service Improvement Plans and ensure actions are followed through to completion in a timely manner
  • Responsible for chairing and driving Management and/or Technical conference calls and discussions, and escalations, related to cyber Prevent, defence and delivery
  • Ensure licenses and support renewals for all security products are performed well in advance of expiry, to avoid service interruptions
  • Perform any other task that may be assigned to him/her from Cyber Security management   

Qualifications, Competences & Experience

Core competencies, knowledge and experience

  • Must have technical / professional qualifications:
  • Bachelor of Science Degree in Telecommunications, Information/Cyber Security, Information technology or Computer Science
  • Security certifications (CEH, GCIA, CISM, CISA, CISSP or equivalent) will be an added advantage
  • Minimum of Five experience in Technology Systems three of those in security and/or Cyber security field
  • Advanced knowledge of mobile telecommunications network architectures, IT systems, networks and applications.
  • A reputation for self-motivation, integrity, cultural sensitivity and strong interpersonal skills

Skills

  • Good communication skills
  • Excellent interpersonal skills;
  • High level negotiation skills;
  • Extensive computer user knowledge and skills essential
  • Strong analytical skills;
  • Excellent planning and organizing skills.
  • Good business acumen
  • Project Management skills
  • Conflict resolution skills
  • Ability to work independently and under pressure.
  • Security
  • Risk and Compliance

Commitment from Vodacom

Vodacom is committed to attracting, developing and retaining the very best people by offering a flexible, motivating and inclusive workplace in which talent is truly recognized, developed and rewarded. We believe that diversity plays an important role in the success of our business and we are committed to creating an inclusive work environment which respects, values, celebrates and makes the most of people’s individual differences - we are not only multinational but multicultural too. At Vodacom you will have access to our excellent flexible benefits programme that you would expect from any global company.

CLICK HERE TO APPLY!

Popular posts from this blog

Matokeo ya kidato cha pili

MATOKEO YA KIDATO CHA PILI 2025  - FTSEE NECTA Results 2025/2026 FORM TWO NATIONAL ASSESSMENT FORMATS (Matokeo kidato cha pili mwaka 2025)   Share on WhatsApp | Share On Twitter MATOKEO YA UPIMAJI WA KITAIFA KIDATO CHA PILI (FTNA) 2024/2025 YEMETANGAZWA Here on this page we promise you to get the latest information on matokeo ya kidato cha pili as and when they are published by necta Tanzania . Just scroll down to  view all the exam results for form two this year and other previous years. You may also view form four exam results 2025 (matokeo kidato cha nne)  and also SFNA Results (matokeo darasa la nne 2025 Hapa)    How many students passed Form two necta exams? (Ni wanafunzi wangapi waliofaulu mtihani wa kidato cha pili 2024?) While announcing the form two exam results Dr. Mohamed  said that 680,574 out of 796,825 students with results equal to 85.41 percent have succeeded in continuing to form three who have obtained division 1, 2,...

HOW TO BE SUCCESSFUL IN LIFE

HOW TO BE SUCCESSFUL IN LIFE People’s beliefs about their abilities have a profound effect on those abilities. Ability is not a fixed property; there is a huge variability in how you perform. People who have a sense of self-efficacy bounce back from failure; they approach things in terms of how to handle them rather than worrying about what can go wrong. Albert Bandura, US psychologist (b.1925). Share on WhatsApp | Share On Twitter 13 Things Mentally Strong People Don’t Do On Their Walk To Success 1. They Don’t Waste Time Feeling Sorry for Themselves Mentally strong people don’t sit around feeling sorry about their circumstances or how others have treated them. Instead, they take responsibility for their role in life and understand that life isn’t always easy or fair. 2. They Don’t Give Away Their Power They don’t allow others to control them, and they don’t give someone else power over them. They don’t say things like, “My boss makes me feel bad,” because they understa...

Ajira Portal Tanzania

Ajira Portal Tips for System Users The proper use of the Recruitment Portal will simplify, improve value for money and enhance Good Governance in recruitment process for Public Service in Tanzania. Therefore all users must ensure that they use the system with integrity. How to use Ajira Portal - Ajira portal manual Make sure that you have scanned copies of all your certificates in pdf format so as enable you to complete the process of completing your profile. The manual intends to show the users how to use the recruitment portal effectively. By going through this, the reader will be able to get information on how to register, create profiles, apply for available vacancies and get the feedback on their application status. How to create Account On  - Ajira Portal Applicant Registration Enter your email address and password (which will be used as a username and password respectively during log in to the system). Click the button Register to continue with the registration proces...

Contact Us Follow Us On WhatsApp