Chief Information Security Officer job at GTBank Uganda
New
Website :
Today
Linkedid Twitter Share on facebook
Chief Information Security Officer
2025-11-03T07:42:43+00:00
GTBank Uganda
https://cdn.greatugandajobs.com/jsjobsdata/data/employer/comp_3995/logo/GTBank%20Uganda.png
FULL_TIME
 
Uganda
Kampala
00256
Uganda
Finance
Computer & IT
UGX
 
MONTH
2025-11-10T17:00:00+00:00
 
Uganda
8

REPORTING TO: Executive Director

Job Purpose Statement

This is a Senior management position whose holder is responsible to focuses on security strategies to protect information assets specifically in IT operations, systems, and innovation across the business, and protecting information systems and data from threats. This shall involve;

  • Reporting on an agreed interval but not less than once per quarter on the following:
  1. Assessment of the confidentiality, integrity and availability of the information systems in the Bank.
  2. Detailed exceptions to the approved cyber and technology policies and procedures.
  3. Assessment of the effectiveness of the approved cybersecurity program.
  4. All material cyber and technology events that affected the institution during the period.
  • Organizing professional cyber related trainings to improve technical proficiency of staff.
  • Safeguarding the confidentiality, integrity and availability of information.
  • Overseeing and implementing the institution’s cybersecurity program and enforcing the cyber and technology policy.
  • Ensuring that the institution maintains a current enterprise-wide knowledge base of its users, devices, applications, software licenses and their relationships, including but not limited to:
  1. Software and hardware asset inventory;
  2. Network maps (including boundaries, traffic and data flow); and
  3. Network utilization and performance data.
  • Ensuring that information systems meet the needs of the institution, and the ICT strategy, in particular information system development strategies, comply with the overall business strategies, risk appetite and ICT risk management policies of the institution.
  • Design cybersecurity controls with the consideration of users at all levels of the organization, including internal (i.e. management and staff) and external users (i.e. contractors/consultants, business partners and service providers).
  • Ensure that regular and comprehensive cyber risk assessments are conducted at least once a year.
  • Ensure that adequate processes are in place for monitoring IT systems to detect cyber and technology events and incidents in a timely manner.
  • Review and assess risks associated with exceptions/deviations to the approved cyber and technology policies and procedures and gain senior management approval for risk assessments.
  • Review periodically the approved exceptions/deviations to ensure the residual risks remain at an acceptable level.
  • Ensure timely update of the incident response mechanism and Business Continuity Plan (BCP) based on the latest cyber threat intelligence gathered.
  • Incorporate the utilization of scenario analysis to consider a material cyber-attack, mitigating actions, and identify potential control gaps.
  • Ensure frequent data backups of critical IT systems (e.g. real time back up of changes made to critical data) are carried out to a separate storage location.
  • Ensure the roles and responsibilities of managing cyber risks, including in emergency or crisis.
  • Decision-making, are clearly defined, documented and communicated to relevant staff.
  • Continuously test disaster recovery and Business Continuity Plans (BCP) arrangements to ensure that the institution can continue to function and meet its regulatory obligations in the event of an unforeseen attack through cyber-crime.
  • Safeguarding the confidentiality, integrity and availability of information.
  • Design and maintain a functional structure that is best suited and adaptive to the strategy.
  • Define and implement recruitment, learning and performance management strategies, as well as cultural practices that attract, nurture and retain the best talent.
 
 
 
bachelor degree
96
JOB-69085cf3c2438

Vacancy title:
Chief Information Security Officer

[Type: FULL_TIME, Industry: Finance, Category: Computer & IT]

Jobs at:
GTBank Uganda

Deadline of this Job:
Monday, November 10 2025

Duty Station:
Uganda | Kampala | Uganda

Summary
Date Posted: Monday, November 3 2025, Base Salary: Not Disclosed

Similar Jobs in Uganda
Learn more about GTBank Uganda
GTBank Uganda jobs in Uganda

JOB DETAILS:

REPORTING TO: Executive Director

Job Purpose Statement

This is a Senior management position whose holder is responsible to focuses on security strategies to protect information assets specifically in IT operations, systems, and innovation across the business, and protecting information systems and data from threats. This shall involve;

  • Reporting on an agreed interval but not less than once per quarter on the following:
  1. Assessment of the confidentiality, integrity and availability of the information systems in the Bank.
  2. Detailed exceptions to the approved cyber and technology policies and procedures.
  3. Assessment of the effectiveness of the approved cybersecurity program.
  4. All material cyber and technology events that affected the institution during the period.
  • Organizing professional cyber related trainings to improve technical proficiency of staff.
  • Safeguarding the confidentiality, integrity and availability of information.
  • Overseeing and implementing the institution’s cybersecurity program and enforcing the cyber and technology policy.
  • Ensuring that the institution maintains a current enterprise-wide knowledge base of its users, devices, applications, software licenses and their relationships, including but not limited to:
  1. Software and hardware asset inventory;
  2. Network maps (including boundaries, traffic and data flow); and
  3. Network utilization and performance data.
  • Ensuring that information systems meet the needs of the institution, and the ICT strategy, in particular information system development strategies, comply with the overall business strategies, risk appetite and ICT risk management policies of the institution.
  • Design cybersecurity controls with the consideration of users at all levels of the organization, including internal (i.e. management and staff) and external users (i.e. contractors/consultants, business partners and service providers).
  • Ensure that regular and comprehensive cyber risk assessments are conducted at least once a year.
  • Ensure that adequate processes are in place for monitoring IT systems to detect cyber and technology events and incidents in a timely manner.
  • Review and assess risks associated with exceptions/deviations to the approved cyber and technology policies and procedures and gain senior management approval for risk assessments.
  • Review periodically the approved exceptions/deviations to ensure the residual risks remain at an acceptable level.
  • Ensure timely update of the incident response mechanism and Business Continuity Plan (BCP) based on the latest cyber threat intelligence gathered.
  • Incorporate the utilization of scenario analysis to consider a material cyber-attack, mitigating actions, and identify potential control gaps.
  • Ensure frequent data backups of critical IT systems (e.g. real time back up of changes made to critical data) are carried out to a separate storage location.
  • Ensure the roles and responsibilities of managing cyber risks, including in emergency or crisis.
  • Decision-making, are clearly defined, documented and communicated to relevant staff.
  • Continuously test disaster recovery and Business Continuity Plans (BCP) arrangements to ensure that the institution can continue to function and meet its regulatory obligations in the event of an unforeseen attack through cyber-crime.
  • Safeguarding the confidentiality, integrity and availability of information.
  • Design and maintain a functional structure that is best suited and adaptive to the strategy.
  • Define and implement recruitment, learning and performance management strategies, as well as cultural practices that attract, nurture and retain the best talent.

 

Work Hours: 8

Experience in Months: 96

Level of Education: bachelor degree

Job application procedure
Interested in applying for this job? Click here to submit your application now.

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Uganda
Job Type: Full-time
Deadline of this Job: Monday, November 10 2025
Duty Station: Uganda | Kampala | Uganda
Posted: 03-11-2025
No of Jobs: 1
Start Publishing: 03-11-2025
Stop Publishing (Put date of 2030): 10-10-2076
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.