SYSTEMS ENGINEER (IT SECURITY) FIXED TERM CONTRACT X2
ZESA Enterprises (Private) Limited Source Verified
Harare
Jan 22, 2026
Job Description
Applications are invited from suitably qualified and experienced candidates to fill the
following positions on a fixed term basis. Prospective female candidates are encouraged
to submit their applications.
Key Responsibilities:
• Research emerging cyber threats and develop detailed threat intelligence profiles.
• Conduct continuous security monitoring and digital surveillance to identify
vulnerabilities across systems and networks.
• Perform penetration testing to validate and assess system, application, and
network security weaknesses.
• Carry out cybersecurity self-assessments, audits, and control effectiveness
reviews.
• Provide technical support to enterprise risk management programs by identifying
mission-critical systems, threat exposures, and existing or emerging vulnerabilities.
• Contribute to the design and implementation of secure digital architectures and
cyber defense strategies.
• Enforce digital identity and access management controls.
• Monitor, detect, and investigate anomalous or unauthorized access to systems,
data, applications, and networks.
• Support advanced cyber defense and network exploitation analysis, including
identification, deterrence, and investigation of intrusions.
• Actively defend systems during live cyber incidents and sustained attack
campaigns.
• Analyze malware, including viruses and ransomware, to determine impact and
remediation strategies.
• Lead or support cyber incident response, containment, recovery, and remediation
activities.
• Monitor cybersecurity compliance requirements and produce reports for internal
and regulatory stakeholders.
Requirements
Qualifications and Experience
• A degree in Computer Science, Information Systems or equivalent
• Cyber defensive security certification will be an added advantage
• Membership of a recognized professional body,
• At least two (2) years proven information security related experience
• Proven experience in developing, operating and maintaining security systems
• Concrete knowledge of technology risk management principles and practices
• Proficiency in networking technologies, network security and network monitoring
solutions,
• Fundamental understanding of cyber threat intelligence and monitoring practices,
• Knowledge and experience of deploying and maintaining security systems including
anti-malware solutions, content filtering, firewalls, authentication systems and intrusion
detection and prevention systems,
• In-depth knowledge of security protocols and principles,
• Knowledge of security frameworks and standards (e.g., NIST Cybersecurity
Framework, ISO/IEC 27001).
• Knowledge of Identity Access Management and Privileged Access Management
technologies
• Excellent report writing experience
Special Attributes/Skills
• Critical thinking skills and ability to solve complex problems
• Effective time management and communication skills
• Excellent report writing experience
• Self-starter with desire for professional excellence, able to work with minimal
supervision
• Excellent communication skills and able to prioritize and adapt to dynamic changes in
the environment
• Ability to execute multiple tasks and engagements simultaneously with tight
schedules,
• Resourcefulness and problem-solving aptitude.
Responsibilities
• Research emerging cyber threats and develop detailed threat intelligence profiles.
• Conduct continuous security monitoring and digital surveillance to identify
vulnerabilities across systems and networks.
• Perform penetration testing to validate and assess system, application, and
network security weaknesses.
• Carry out cybersecurity self-assessments, audits, and control effectiveness
reviews.
• Provide technical support to enterprise risk management programs by identifying
mission-critical systems, threat exposures, and existing or emerging vulnerabilities.
• Contribute to the design and implementation of secure digital architectures and
cyber defense strategies.
• Enforce digital identity and access management controls.
• Monitor, detect, and investigate anomalous or unauthorized access to systems,
data, applications, and networks.
• Support advanced cyber defense and network exploitation analysis, including
identification, deterrence, and investigation of intrusions.
• Actively defend systems during live cyber incidents and sustained attack
campaigns.
• Analyze malware, including viruses and ransomware, to determine impact and
remediation strategies.
• Lead or support cyber incident response, containment, recovery, and remediation
activities.
• Monitor cybersecurity compliance requirements and produce reports for internal
and regulatory stakeholders.
How To Apply
Applications should be received by not later than 22nd January 2026 and should be addressed to:- The Head: Corporate Services (A) ZESA Holdings (Pvt) Ltd 25. Samora Machel Avenue P. O. Box 377 Harare OR emailed to recruitment@zesaholdings.co.zw Please note that only shortlisted candidates will be responded to
Quick Info
ict
3 days, 2 hours ago
1 day, 10 hours ago