Key Responsibilities:

fe
  • Change Management: Develop and implement overall change management strategies to facilitate the adoption of new technologies within the organization.
  • IT Research: Conduct ongoing research to identify emerging Information Technology (IT) trends and potential solutions that can be adapted to enhance business processes and efficiencies.
  • Solution Formulation: Formulate innovative IT solutions that address specific business challenges and contribute to organizational growth and objectives.
  • Solution Evaluation: Thoroughly verify and evaluate proposed IT solutions, ensuring compatibility with existing infrastructure and user needs.
  • User Communication: Effectively communicate and collaborate with functional users to understand their requirements and translate those needs into actionable IT solutions.
  • Policy Development: Develop and implement policies and procedures for the IT unit, adhering to company guidelines and providing clear guidance on interpretation and implementation.
  • Quality Assurance: Continuously review and improve customer service, quality assurance policies, procedures, and processes to maintain high standards of service delivery.
  • Process Integration: Ensure seamless integration of processes to maintain and develop the required services, supporting and improving the effectiveness of core activities.
  • Business-IT Alignment: Translate business practices and processes into IT architectures to enable the delivery of appropriate and effective solutions.
  • Network Upgrades: Regularly review network configurations and infrastructure, planning cost-effective upgrades to keep pace with evolving technology, organizational growth, and the needs of the Fund’s components.
  • Network Recommendations: Conduct thorough research and make informed recommendations on network products, services, protocols, and standards to support network procurement and development efforts.
  • Information Security: Formulate and implement Information Security Section policies and procedures, ensuring strict adherence to IT security policies and practices.
  • Application Implementation: Oversee the installation, testing, and implementation of applications and databases, ensuring seamless integration and optimal performance.
  • System Administration: Coordinate the day-to-day administration of systems and user IDs, including creation, deletion, modification, resets or extensions, and roles assignment.
  • Information Risk Management: Conduct comprehensive information risk assessments to identify security gaps and vulnerabilities, providing effective solutions to mitigate security incidents and breaches.

Job Requirements:

  • Bachelor’s Degree: Bachelor’s degree in Computer Science, Information Technology, or a related field from a recognized institution.
  • Master’s Degree (Preferred): Master’s degree in Computer Science, Information Technology, or a related field from a recognized institution is an added advantage.
  • Professional Qualifications: Professional qualification such as CISA, MCSE, CCNA, CCNP, CCIE, CNE, or any other relevant qualification from a recognized institution.
  • Work Experience: At least ten (10) years of relevant work experience, with three (3) years in a supervisory role.
  • Professional Membership: Membership to a relevant and accredited professional body and in good standing.
  • Management Course: Management course from a recognized institution.
  • Computer Proficiency: Proficiency in computer applications, including operating systems, networking, programming languages, and project management software.

Additional Skills and Qualifications:

  • Strong analytical and problem-solving skills.
  • Excellent written and verbal communication skills.
  • Ability to work independently and as part of a team.
  • Strong organizational and time management skills.
  • Commitment to ethical and professional conduct.
  • Experience with IT project management methodologies and tools.
  • Knowledge of emerging IT trends and technologies.
  • Strong understanding of information security principles and practices.

Apply by hand or courier to Mail Office, Social Security House by Monday, December 11, 2023, at 5:00 p.m.

Address to: The Managing Trustee/CEO, National Social Security Fund, P.O. Box 30599-00100, NAIROBI

Note: Only shortlisted candidates will be contacted. Canvassing will lead to disqualification. NSSF does not charge fees and is an equal opportunity employer.

Leave a Reply

Your email address will not be published. Required fields are marked *

WP2Social Auto Publish Powered By : XYZScripts.com