IT Cybersecurity Lead job at Hariss International
New
Today
Linkedid Twitter Share on facebook
IT Cybersecurity Lead
2026-03-17T06:09:49+00:00
Hariss International
https://cdn.greatugandajobs.com/jsjobsdata/data/employer/comp_6615/logo/Hariss%20International%20Ltd%20(Riham).jpg
FULL_TIME
Kampala
Kampala
00256
Uganda
Beverages
Computer & IT, Management
UGX
MONTH
2026-03-30T17:00:00+00:00
8

Job Purpose:

The IT Cybersecurity Lead oversees an organization's security operations, protecting networks, systems, and data from internal/external threats. The lead directs the teams to manage threat detection, incident response, vulnerability assessments, and policy enforcement. This role bridges technical security tasks with strategic compliance.

Key Responsibilities

Security Operations:

Lead the security team in monitoring, incident response, and implementing defense protocols.

Security Strategy:

  • Selection of tools to manage the environments security.
  • Decisions on insourced versus outsourced services.

Technical Management:

Oversee firewall management, Privileged Access Management (PAM), Security Information and Event Management (SIEM), and patch management.

Risk & Compliance:

  • Drive risk assessments, security audits, and ensure compliance with frameworks such as ISO 27001 and Data Protection Act, 2012 (Act 843).
  • Develop a detailed response procedure to any cybersecurity breach.

Threat Management:

Identify vulnerabilities, conduct penetration testing, and stay updated on emerging cybercrime tactics.

Leadership & Collaboration:

Collaborate with IT, legal, and HR to enforce security policies and conduct training. Report security risks to senior leadership.

Documentation:

Maintain detailed records of security guidelines, procedures, and standards.

Education and/or Work Experience Requirements:

Education:

Bachelor’s degree in Computer Science or related acceptable qualification.

Experience:

Proven experience in cybersecurity operations, threat management, or as a security analyst/engineer.

Technical Knowledge:

Proficiency in network security, endpoint protection, and security tools (e.g., SIEM, PAM).

Certifications:

Requires certifications such as CISSP, CISM, or GIAC.

Soft Skills:

Strong leadership, communication, negotiation, and analytical skills.

Key Requirements:

Network Security:

In-depth knowledge of firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), VPNs, and network protocols (TCP/IP).

Security Tools & Platforms:

Proficiency with SIEM (Security Information and Event Management), EDR/XDR (Endpoint Detection and Response), NDR (Network Detection and Response), and DLP (Data Leak Prevention) tools.

Incident Response & Forensics:

Experience in leading threat detection, incident handling, and digital forensics.

Governance, Risk, and Compliance (GRC):

Knowledge of frameworks such as NIST CSF, ISO 27001.

Scripting and Automation:

Ability to use Python, PowerShell, or Bash for automating security tasks

Strategic Planning:

Ability to align security initiatives with overall business objectives.

Communication:

Strong ability to translate complex technical risks into clear, concise business impacts for non-technical stakeholders and executives.

Team Management:

Experience building, mentoring, and the Cyber Security team and supporting the other IT team members.

Problem-Solving:

Creative thinking to resolve complex security challenges and identify root causes.

Crisis Management:

Capability to maintain calm and direct response team under high-pressure scenarios

Cloud Security Architecture:

Designing secure hybrid/multi-cloud environments.

AI/ML Integration:

Utilizing AI for threat detection and behaviour analytics.

DevSecOps:

Integrating security into the software development & Systems pipeline.

Equal Employment Opportunity Policy

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status.

Hariss International is an equal opportunity employer Minorities/Females/People with Disabilities/Protected Veterans/Sexual Orientation/Gender Identity.

  • Lead the security team in monitoring, incident response, and implementing defense protocols.
  • Selection of tools to manage the environments security.
  • Decisions on insourced versus outsourced services.
  • Oversee firewall management, Privileged Access Management (PAM), Security Information and Event Management (SIEM), and patch management.
  • Drive risk assessments, security audits, and ensure compliance with frameworks such as ISO 27001 and Data Protection Act, 2012 (Act 843).
  • Develop a detailed response procedure to any cybersecurity breach.
  • Identify vulnerabilities, conduct penetration testing, and stay updated on emerging cybercrime tactics.
  • Collaborate with IT, legal, and HR to enforce security policies and conduct training. Report security risks to senior leadership.
  • Maintain detailed records of security guidelines, procedures, and standards.
  • Strong leadership, communication, negotiation, and analytical skills.
  • In-depth knowledge of firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), VPNs, and network protocols (TCP/IP).
  • Proficiency with SIEM (Security Information and Event Management), EDR/XDR (Endpoint Detection and Response), NDR (Network Detection and Response), and DLP (Data Leak Prevention) tools.
  • Experience in leading threat detection, incident handling, and digital forensics.
  • Knowledge of frameworks such as NIST CSF, ISO 27001.
  • Ability to use Python, PowerShell, or Bash for automating security tasks
  • Ability to align security initiatives with overall business objectives.
  • Strong ability to translate complex technical risks into clear, concise business impacts for non-technical stakeholders and executives.
  • Experience building, mentoring, and the Cyber Security team and supporting the other IT team members.
  • Creative thinking to resolve complex security challenges and identify root causes.
  • Capability to maintain calm and direct response team under high-pressure scenarios
  • Designing secure hybrid/multi-cloud environments.
  • Utilizing AI for threat detection and behaviour analytics.
  • Integrating security into the software development & Systems pipeline.
  • Bachelor’s degree in Computer Science or related acceptable qualification.
  • Proven experience in cybersecurity operations, threat management, or as a security analyst/engineer.
  • Proficiency in network security, endpoint protection, and security tools (e.g., SIEM, PAM).
  • Requires certifications such as CISSP, CISM, or GIAC.
bachelor degree
24
JOB-69b8f02d43dbf

Vacancy title:
IT Cybersecurity Lead

[Type: FULL_TIME, Industry: Beverages, Category: Computer & IT, Management]

Jobs at:
Hariss International

Deadline of this Job:
Monday, March 30 2026

Duty Station:
Kampala | Kampala

Summary
Date Posted: Tuesday, March 17 2026, Base Salary: Not Disclosed

Similar Jobs in Uganda
Learn more about Hariss International
Hariss International jobs in Uganda

JOB DETAILS:

Job Purpose:

The IT Cybersecurity Lead oversees an organization's security operations, protecting networks, systems, and data from internal/external threats. The lead directs the teams to manage threat detection, incident response, vulnerability assessments, and policy enforcement. This role bridges technical security tasks with strategic compliance.

Key Responsibilities

Security Operations:

Lead the security team in monitoring, incident response, and implementing defense protocols.

Security Strategy:

  • Selection of tools to manage the environments security.
  • Decisions on insourced versus outsourced services.

Technical Management:

Oversee firewall management, Privileged Access Management (PAM), Security Information and Event Management (SIEM), and patch management.

Risk & Compliance:

  • Drive risk assessments, security audits, and ensure compliance with frameworks such as ISO 27001 and Data Protection Act, 2012 (Act 843).
  • Develop a detailed response procedure to any cybersecurity breach.

Threat Management:

Identify vulnerabilities, conduct penetration testing, and stay updated on emerging cybercrime tactics.

Leadership & Collaboration:

Collaborate with IT, legal, and HR to enforce security policies and conduct training. Report security risks to senior leadership.

Documentation:

Maintain detailed records of security guidelines, procedures, and standards.

Education and/or Work Experience Requirements:

Education:

Bachelor’s degree in Computer Science or related acceptable qualification.

Experience:

Proven experience in cybersecurity operations, threat management, or as a security analyst/engineer.

Technical Knowledge:

Proficiency in network security, endpoint protection, and security tools (e.g., SIEM, PAM).

Certifications:

Requires certifications such as CISSP, CISM, or GIAC.

Soft Skills:

Strong leadership, communication, negotiation, and analytical skills.

Key Requirements:

Network Security:

In-depth knowledge of firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), VPNs, and network protocols (TCP/IP).

Security Tools & Platforms:

Proficiency with SIEM (Security Information and Event Management), EDR/XDR (Endpoint Detection and Response), NDR (Network Detection and Response), and DLP (Data Leak Prevention) tools.

Incident Response & Forensics:

Experience in leading threat detection, incident handling, and digital forensics.

Governance, Risk, and Compliance (GRC):

Knowledge of frameworks such as NIST CSF, ISO 27001.

Scripting and Automation:

Ability to use Python, PowerShell, or Bash for automating security tasks

Strategic Planning:

Ability to align security initiatives with overall business objectives.

Communication:

Strong ability to translate complex technical risks into clear, concise business impacts for non-technical stakeholders and executives.

Team Management:

Experience building, mentoring, and the Cyber Security team and supporting the other IT team members.

Problem-Solving:

Creative thinking to resolve complex security challenges and identify root causes.

Crisis Management:

Capability to maintain calm and direct response team under high-pressure scenarios

Cloud Security Architecture:

Designing secure hybrid/multi-cloud environments.

AI/ML Integration:

Utilizing AI for threat detection and behaviour analytics.

DevSecOps:

Integrating security into the software development & Systems pipeline.

Equal Employment Opportunity Policy

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status.

Hariss International is an equal opportunity employer Minorities/Females/People with Disabilities/Protected Veterans/Sexual Orientation/Gender Identity.

Work Hours: 8

Experience in Months: 24

Level of Education: bachelor degree

Job application procedure

Application Link:Click Here to Apply Now

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Uganda
Job Type: Full-time
Deadline of this Job: Monday, March 30 2026
Duty Station: Kampala | Kampala
Posted: 17-03-2026
No of Jobs: 1
Start Publishing: 17-03-2026
Stop Publishing (Put date of 2030): 10-10-2076
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.