Applications have closed
About Organization / Project:

Bank-e- Millie Afghan (BMA) was the first financial institution established in Afghanistan in 1933. Similarly, it was the first financial institution established in a public private partnership set up with 72 percent share held by private sector. As a first bank in Afghanistan, BMA introduced formal banking services to the people and government of Islamic Republic of Afghanistan. Since then, the banks competitive strength and ongoing market leadership philosophy lays in its strong capital base and proven trustworthiness.
In 1976, it was fully nationalized by the government of Afghanistan. Since its establishment, BMA is a leading banking in providing modern and secure banking services. Securing depositors' funds is the top priority of the bank. At the same time, the bank is contributing considerably to the development of manufacturing, agriculture, services, and international trade in the country. BMA is operating based on strong corporate governance principles, financial risk management and strict compliance to keep its credibility and trust. BMA has 15 city branches in Kabul and 21 provincial branches and equity investments in United States of America and England. And it is celebrating its 88th years of fame.

Job Summary:

IT Security Analyst is responsible for assessing information risk and facilitates remediation of identified vulnerabilities for IT security and IT risk across the enterprise.


Duties and Responsibilities:

Protecting BMA network and systems from cyber-attacks. This involves researching upcoming IT trends, creating contingency plans, reviewing suspicious activities, reporting security breaches, and educating the rest of the BMA employee on security measure
Assessing information risk and facilitates remediation of identified vulnerabilities for IT security and IT risk across the enterprise.
Assesses information risk and facilitates remediation of identified vulnerabilities with the BMA network, systems and applications.
Monitoring security access. Conducting security assessments through vulnerability testing and risk analysis.
Performing both internal and external security audits, analyzing security breaches to identify the root cause.
Perform network security monitoring and analysis identifies suspicious and malicious activities, review logs and remediate them.
Continuously works with system, network and database administrators to tune security tools to minimize false positives and maximize detection and prevention effectiveness.
Analyses malware and attacker tactics to improve network detection capabilities
Provided technical support for network/system and application oriented queries, maintaining network security and implementing new technologies.
Provide technical expertise and consultation on troubleshooting/provisioning processes and new product procurement.
Monitor Windows server’s logs, Linux systems logs, network devices log, and provide necessary recommendations.
With coordination of each sections admin, monitor computer networks for security issues.
Investigate security breaches and other cyber security incidents.
Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
Document security breaches and assess the damage they cause.
Work with system admin, network admin and database admin to perform tests, uncover network/system, and database vulnerabilities.
Fix detected vulnerabilities to maintain a high-security standard.
Stay current on IT security trends and news.
Develop practices for BMA IT security.
Perform penetration testing.
Help colleagues install security software and understand information security management.
Research security enhancements and make recommendations to management.
Stay up-to-date on information technology trends and security standards.
Gather feedback from end users to continue to improve systems.
Design, analyze and implement efficient IT security systems.
Perform any other tasks assign by the line manager.

Job Requirements:

Minimum a bachelor’s degree in Computer Science (IT).
Should be a CISSP (Certified Information Systems Security Professional) or CEH (Certified Ethical Hacker) and having at least 2 years’ experience in the related filed.
Experience with computer network penetration testing and techniques.
Understanding of firewalls, proxies, antivirus, active directory, group policy and Linux OS.
Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact.
Having ability to work under pressure.
Must possess strong interpersonal and communication skills.
Ability to work long hours in case of need.

How to Apply:

You should apply electronically by sending your CV and a one-page covering letter explaining your interest and suitability for the position to E-mail given below.




Job Overview

Sign in

Sign Up

Forgotten Password