About Company:
Infitech Global Solutions is a leading information technology company that focuses on securing, monitoring, and transforming the digital and physical landscapes of our clients. With expertise spanning cybersecurity, surveillance and border security, drone technology, digital forensics and fraud detection, and advanced AI analytics, we deliver integrated solutions that protect, detect, and optimize in real time.
Job Description:
We are seeking a technologically elite, analytically rigorous, and operationally aggressive Cybersecurity Governor to anchor the immune system and defensive framework of our organization. In a high-velocity threat landscapewhere institutional momentum is dictated by the velocity of system uptime and the precision of the security-filter success is defined by "Threat Sovereignty" the ability to harmonize proactive threat-hunting with the clinical precision required for Infrastructure-Hardening Architecture, Risk-Mitigation Governance, and Digital-Resilience Stewardship. This role is designed as an "IT Defense Command Center" a critical residency for a seasoned security professional who can blend "Defensive Grit" (mastering the complexities of encryption, firewalls, and pen-testing) with the "Structural Agility" required to execute High-Fidelity Security Workflows.
Requirements:
1. Defensive Sovereignty & Infrastructure-Immunity Architecture
Sovereignty of the Perimeter: Monitor networks and systems for security breaches, acting as the primary "Source of Institutional-Defense Throughput."
Hardening Architecture: Ensure robust system hardening and secure configuration of all servers, databases, and applications, providing the "Structural Foundation" for a resilient infrastructure.
Integrity Stewardship: Implement security controls (firewalls, encryption, access management), ensuring the "Source of Network-Trust" is elite and uncompromised.
2. Threat-Landscape Governance & Response Logic
Threat Sovereignty: Conduct rigorous vulnerability assessments and penetration testing, acting as the primary "Source of Risk-Mitigation Momentum."
Response Architecture: Lead incident detection, response, and containment efforts, providing the "Functional Foundation" for rapid remediation and business continuity.
Monitoring Stewardship: Monitor emerging cybersecurity threats and recommend improvements, maintaining the "Source of Adaptive-Defense."
3. Risk-Mitigation Architecture & Compliance Stewardship
Compliance Sovereignty: Implement and enforce strict cybersecurity policies and best practices, acting as the primary "Source of Regulatory-Alignment."
Audit Architecture: Carry out regular security audits and compliance checks, providing the "Relational Foundation" for identifying and addressing security gaps.
Velocity Logic: Utilize Identity & Access Management (IAM) expertise to accelerate the "Authentication-to-Protection" cycle, maximizing the "Source of Organizational-Immunity Momentum."
Qualifications and Skills:
Professional Profile
Education: Degree in Cybersecurity, Computer Science, or a related field.
Experience: Strong foundation in information security, risk management, and security operations.
Technical Power: Mastery of penetration testing, vulnerability scanning, encryption protocols, and security stack management (Firewalls, IDS/IPS, Endpoint Protection).
Certifications: CEH, CISSP, CompTIA Security+, or equivalent advanced certifications are highly preferred.
Aptitude: Exceptional analytical skills, proactive threat-hunting capability, and the ability to thrive under high-pressure scenarios.
Mindset: Disciplined, security-obsessed, and ready to maintain "Cyber Sovereignty" in a rapidly evolving digital threat environment.
Core Competencies
Defensive Grit: Ability to identify, isolate, and neutralize threats before they impact the organizational posture.
Compliance Sovereignty: Mastery of the "Assess-Harden-Monitor-Detect-Respond-Recover" lifecycle.
Execution Power: High-discipline approach to policy enforcement, continuous audit management, and the rigorous maintenance of a zero-trust security ecosystem.
Salary
Very attractiveApplication Closing Date: Not specified
Application Instructions:
Send CV, cover letter and other supporting documents to info@infitechglobalsolutions.com using the position as subject of email.
Job Information
Deadline
Not specified
Job Type
Full-time
Industry
ICT/TECH
Work Level
Experienced
State
Abuja
Country
Nigeria