THE UNITED REPUBLIC OF TANZANIA PRESIDENT’S OFFICE
PUBLIC SERVICE RECRUITMENT SECRETARIAT
Ref.No.EA.7/96/01/J/9 25th August, 2017
VACANCIES ANNOUNCEMENT
On behalf of the TANZANIA COMMUNICATIONS REGULATORY AUTHORITY (TCRA), President’s Office, Public Service Recruitment Secretariat invites qualified Tanzanians to fill 10 vacant posts as mentioned below;
1.0 TANZANIAN COMMUNICATIONS REGULATORY AUTHORITY
The Tanzania Communications Regulatory Authority (TCRA) is a quasi-independent Government body responsible for regulating the Communications and Broadcasting sectors in Tanzania. It was established under the Tanzania Communications Regulatory Act No.12 of 2003 to regulate the electronic communications, and Postal services, and management of the national frequency spectrum in the United Republic of Tanzania. The Authority became operational on 1st November 2003 and effectively took over the functions of the now defunct Tanzania Communications Commission (TTC) and Tanzania Broadcasting Commission (TBC) respectively.
The Tanzania Communications Regulatory Authority (TCRA) is a quasi-independent Government body responsible for regulating the Communications and Broadcasting sectors in Tanzania. It was established under the Tanzania Communications Regulatory Act No.12 of 2003 to regulate the electronic communications, and Postal services, and management of the national frequency spectrum in the United Republic of Tanzania. The Authority became operational on 1st November 2003 and effectively took over the functions of the now defunct Tanzania Communications Commission (TTC) and Tanzania Broadcasting Commission (TBC) respectively.
1.1 CYBERSECURITY ANALYSTS -3 POSTS
1.1.1 DUTIES AND RESPONSIBILITIES
i. Perform cyber security incident coordination, analysis and response.
ii. Produce monthly and quarterly reports on Incidents and threats activity both locally, regionally and globally.
iii. Perform Digital Forensics investigation
iv. Monitoring and analyzing Cyber security threats on threat Intel’s Perform cybercrime incident coordination, analysis and response
v. Prepare security advisories.
1.1.1 DUTIES AND RESPONSIBILITIES
i. Perform cyber security incident coordination, analysis and response.
ii. Produce monthly and quarterly reports on Incidents and threats activity both locally, regionally and globally.
iii. Perform Digital Forensics investigation
iv. Monitoring and analyzing Cyber security threats on threat Intel’s Perform cybercrime incident coordination, analysis and response
v. Prepare security advisories.
1.1.2 QUALIFICATION AND EXPERIENCE
Bachelor degree in either computer Science; Engineering or Information Technology from recognized institution. A minimum of THREE (3) years post qualification experience in a well-established organization in areas of IT and preferably IT security
Bachelor degree in either computer Science; Engineering or Information Technology from recognized institution. A minimum of THREE (3) years post qualification experience in a well-established organization in areas of IT and preferably IT security
1.1.3 SPECIAL SPECIFICATIONS:
A: Skills/Abilities:
Excellent analytical skills
Demonstrate ability to work collaboratively as a team player
Good knowledge of security risks, threats and vulnerabilities
Flexible, creative and good team spirit
Ability to plan, organize, prioritize and manage complex and delicate tasks
Results and performance-driven with commitment to realization of the Authority’s strategic objectives
Ability communicate and present clearly and team work
Proactive, attention to detail, ability to work under pressure
Self confidence in work planning and decision making
Ability to explain difficult technical matters in easy wording.
Ability to use tools and techniques for problem solving
A good feeling for confidentiality and working in a procedural matter
Ability to handle stressful environment
Strong communicative and writing skills
Open minded and willing to learn
Passion with Information Technology Security
A: Skills/Abilities:
Excellent analytical skills
Demonstrate ability to work collaboratively as a team player
Good knowledge of security risks, threats and vulnerabilities
Flexible, creative and good team spirit
Ability to plan, organize, prioritize and manage complex and delicate tasks
Results and performance-driven with commitment to realization of the Authority’s strategic objectives
Ability communicate and present clearly and team work
Proactive, attention to detail, ability to work under pressure
Self confidence in work planning and decision making
Ability to explain difficult technical matters in easy wording.
Ability to use tools and techniques for problem solving
A good feeling for confidentiality and working in a procedural matter
Ability to handle stressful environment
Strong communicative and writing skills
Open minded and willing to learn
Passion with Information Technology Security
B: Desirable
Knowledge and understanding of various computing concepts especially Internet technologies, TCP/IP protocols and general computer security concepts
Basic knowledge of UNIX/ Linux distributions and Windows Operating systems.
Basic knowledge and experience of computer networking
Knowledge of various Internet protocols and applications such as SMTP, HTTP(s), DNS, FTP, telnet, SSH, etc
Knowledge of Security threats such as DDoS, Phishing, Malware, etc
Basic knowledge of various security tools and technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, Log Analysis, Encryption, Endpoint Security technologies such as Antivirus tools as Network Packet Analysers
Experienced in any of the following programming languages: C, Java, Perl, Python, Go and Shell scripting.
Have experience with social cultural implications of Information Technology.
Experience working in the field of Systems Administration, IT Security, Computer Networking, Systems Analysis, design and development.
Possession of IT security certification such as CEH, CHF and GREM will be an added advantage.
Knowledge and understanding of various computing concepts especially Internet technologies, TCP/IP protocols and general computer security concepts
Basic knowledge of UNIX/ Linux distributions and Windows Operating systems.
Basic knowledge and experience of computer networking
Knowledge of various Internet protocols and applications such as SMTP, HTTP(s), DNS, FTP, telnet, SSH, etc
Knowledge of Security threats such as DDoS, Phishing, Malware, etc
Basic knowledge of various security tools and technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, Log Analysis, Encryption, Endpoint Security technologies such as Antivirus tools as Network Packet Analysers
Experienced in any of the following programming languages: C, Java, Perl, Python, Go and Shell scripting.
Have experience with social cultural implications of Information Technology.
Experience working in the field of Systems Administration, IT Security, Computer Networking, Systems Analysis, design and development.
Possession of IT security certification such as CEH, CHF and GREM will be an added advantage.
1.1.4 INFORMATION SECURITY OFFICER -3 POSTS
1.1.5 DUTIES AND RESPONSIBILITIES
i. Perform security audits, vulnerability assessment and penetration testing;
ii. Create awareness in area of cyber security & carryout capacity Building programs;
iii. Prepare security alerts and warning;
Maintenance of TZ-CERT Website content and other communication
1.1.5 DUTIES AND RESPONSIBILITIES
i. Perform security audits, vulnerability assessment and penetration testing;
ii. Create awareness in area of cyber security & carryout capacity Building programs;
iii. Prepare security alerts and warning;
Maintenance of TZ-CERT Website content and other communication
1.1.6 QUALIFICATION AND EXPERIENCE
Bachelor degree in either computer Science; Engineering or Information Technology from recognized institution with relevant working. A minimum of THREE (3) years post qualification experience in a well-established organization in areas of IT and preferably IT security
Bachelor degree in either computer Science; Engineering or Information Technology from recognized institution with relevant working. A minimum of THREE (3) years post qualification experience in a well-established organization in areas of IT and preferably IT security
1.1.7 PERSONAL SPECIFICATIONS:
A: Skills/Abilities:
Strong communications and writing skills;
Ability to communicate complex security terms in easy to understand wording.
Excellent analytical skills;
Demonstrate ability to work collaboratively as a team player;
Flexible, creative and open minded;
Ability to plan, organize, prioritize and manage complex and delicate tasks;
Result and Performance-driven with commitment to realization of the Authority’s strategic objectives;
Proactive, attention to detail, ability to work under pressure;
Self confidence in work planning and decision making;
A good feeling for confidentiality and working in procedural matter;
Open minded and must show ambitions and willingness to learn;
Passionate with Information Technology Security.
A: Skills/Abilities:
Strong communications and writing skills;
Ability to communicate complex security terms in easy to understand wording.
Excellent analytical skills;
Demonstrate ability to work collaboratively as a team player;
Flexible, creative and open minded;
Ability to plan, organize, prioritize and manage complex and delicate tasks;
Result and Performance-driven with commitment to realization of the Authority’s strategic objectives;
Proactive, attention to detail, ability to work under pressure;
Self confidence in work planning and decision making;
A good feeling for confidentiality and working in procedural matter;
Open minded and must show ambitions and willingness to learn;
Passionate with Information Technology Security.
B: Desirable
Understanding of various computing concepts especially Internet technologies, TCP/IP protocols and general computer security concepts;
Knowledge and experience of UNIX/ Linux distributions and Windows Operating systems;
Experience in computer networking concepts;
Knowledge and a good understanding of various Internet protocols and applications such as SMTP, HTTP(s), DNS, FTP, telnet, SSH, etc.;
Knowledge of Security threats such as DDoS, Phishing, Malware, etc.;
Good understanding of Security Testing methodologies;
Experience in carrying out vulnerability assessment and penetration tests using various Kali Linux tools such as nmap, maltego, nikto, wireshark, metasploit, burpsuit, etc. Knowledge and experience of using various commercial tools will be an added advantage;
Demonstrates experience in any of the following programming languages: C, Java, Perl, Python, Go and Shell scripting;
A good knowledge and experience in various Information Security Framework such as NIST Cybersecurity Framework, ISO 27000, COBIT etc;
Have experience with social cultural implications of Information Technology;
Possession of IT security certification such as CEH, OSCE and CISA will be an added advantage.
Understanding of various computing concepts especially Internet technologies, TCP/IP protocols and general computer security concepts;
Knowledge and experience of UNIX/ Linux distributions and Windows Operating systems;
Experience in computer networking concepts;
Knowledge and a good understanding of various Internet protocols and applications such as SMTP, HTTP(s), DNS, FTP, telnet, SSH, etc.;
Knowledge of Security threats such as DDoS, Phishing, Malware, etc.;
Good understanding of Security Testing methodologies;
Experience in carrying out vulnerability assessment and penetration tests using various Kali Linux tools such as nmap, maltego, nikto, wireshark, metasploit, burpsuit, etc. Knowledge and experience of using various commercial tools will be an added advantage;
Demonstrates experience in any of the following programming languages: C, Java, Perl, Python, Go and Shell scripting;
A good knowledge and experience in various Information Security Framework such as NIST Cybersecurity Framework, ISO 27000, COBIT etc;
Have experience with social cultural implications of Information Technology;
Possession of IT security certification such as CEH, OSCE and CISA will be an added advantage.
1.1.8 SYSTEMS SECURITY ENGINEER- 4 POSTS
1.1.9 DUTIES AND RESPONSIBILITIES
i. Carryout Malware analysis and reverse engineering
ii. Deploy and manage Intrusion detection mechanisms
iii. Develop appropriate security tools and systems
iv. Administration and Management of TZ-CERT systems and network infrastructure
v. Deploy and manage Honey Pot systems
vi. Deploy and manage threat intelligence systems
1.1.9 DUTIES AND RESPONSIBILITIES
i. Carryout Malware analysis and reverse engineering
ii. Deploy and manage Intrusion detection mechanisms
iii. Develop appropriate security tools and systems
iv. Administration and Management of TZ-CERT systems and network infrastructure
v. Deploy and manage Honey Pot systems
vi. Deploy and manage threat intelligence systems
1.1.10 QUALIFICATION AND EXPERIENCE
Bachelor degree in either computer Science; Engineering or Information Technology from recognized institution. A minimum of THREE (3) years post qualification experience in a well-established organization in areas of IT and preferably IT security
Bachelor degree in either computer Science; Engineering or Information Technology from recognized institution. A minimum of THREE (3) years post qualification experience in a well-established organization in areas of IT and preferably IT security
1.1.11 SPECIAL SPECIFICATIONS:
A: Skills/Abilities:
i. Good communications and writing skills.
ii. Ability to communicate complex security terms in easy to understand wording.
iii. Excellent analytical skills.
iv. Demonstrate ability to work collaboratively as a team player;
v. Flexible, creative and open minded.
vi. Ability to plan, organizes, prioritize and manage complex and delicate tasks.
vii. Result and Performance-driven with commitment to realization of the Authority’s strategic objectives;
viii. Proactive, attention to detail, ability to work under pressure;
ix. Self confidence in work planning and decision making;
x. A good feeling for confidentiality and working in procedural matter.
xi. Open minded and must show ambitions and willingness to learn.
xii. Passionate with Information Technology Security.
A: Skills/Abilities:
i. Good communications and writing skills.
ii. Ability to communicate complex security terms in easy to understand wording.
iii. Excellent analytical skills.
iv. Demonstrate ability to work collaboratively as a team player;
v. Flexible, creative and open minded.
vi. Ability to plan, organizes, prioritize and manage complex and delicate tasks.
vii. Result and Performance-driven with commitment to realization of the Authority’s strategic objectives;
viii. Proactive, attention to detail, ability to work under pressure;
ix. Self confidence in work planning and decision making;
x. A good feeling for confidentiality and working in procedural matter.
xi. Open minded and must show ambitions and willingness to learn.
xii. Passionate with Information Technology Security.
B: Desirable
i. Understanding of various computing concepts especially Internet technologies, TCP/IP protocols and general computer security concepts.
ii. Experience in developing, deploying and managing information systems is required.
iii. Experience in Systems Administrations especially in UNIX/LINUX as well as Windows Operating systems is mandatory.
iv. Experience in computer networking concepts
v. Knowledge and a good understanding of various Internet protocols and applications such as SMTP, HTTP(s), DNS, FTP, telnet, SSH, etc.
vi. Knowledge of Security threats such as DDoS, Phishing, Malware, etc.
vii. Experience with security tools and technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, Endpoint Security technologies such as Antivirus tools.
viii. Experience in any of the following programming language is required: Python, Perl, Shell scripting, C and Java.
ix. Have experience with social cultural implications of Information Technology.
x. A thorough knowledge of Honeypot technologies.
xi. Experience working in the field of Systems Administration, IT Security, and Computer Networking as well Systems Analysis, design and development.
xii. Possession of IT security certification such as CCNA/CCNP and GREM will be an added advantage
i. Understanding of various computing concepts especially Internet technologies, TCP/IP protocols and general computer security concepts.
ii. Experience in developing, deploying and managing information systems is required.
iii. Experience in Systems Administrations especially in UNIX/LINUX as well as Windows Operating systems is mandatory.
iv. Experience in computer networking concepts
v. Knowledge and a good understanding of various Internet protocols and applications such as SMTP, HTTP(s), DNS, FTP, telnet, SSH, etc.
vi. Knowledge of Security threats such as DDoS, Phishing, Malware, etc.
vii. Experience with security tools and technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, Endpoint Security technologies such as Antivirus tools.
viii. Experience in any of the following programming language is required: Python, Perl, Shell scripting, C and Java.
ix. Have experience with social cultural implications of Information Technology.
x. A thorough knowledge of Honeypot technologies.
xi. Experience working in the field of Systems Administration, IT Security, and Computer Networking as well Systems Analysis, design and development.
xii. Possession of IT security certification such as CCNA/CCNP and GREM will be an added advantage
GENERAL CONDITIONS
i. All applicants must be Citizens of Tanzania of not more than 45 years of age;
ii. Applicants must attach an up-to-date Curriculum Vitae (CV) having reliable contacts; postal address/post code, e-mail and telephone numbers;
iii. Applicants should apply on the strength of the information given in this advertisement;
iv. Applicants must attach their certified copies of the following certificates;
Postgraduate/Degree/Advanced Diploma/Diploma/Certificates;
Postgraduate/Degree/Advanced Diploma/Diploma transcripts;
Form IV and Form VI National Examination Certificates;
Birth certificate
v. Applicants who will attach copies of the following certificates strictly not accepted;
Form IV and form VI results slips
Testimonials and all Partial transcripts
vi. Applicants employed in the Public Service should route their application letters through their respective employers;
vii. Applicants who have/were retired from the Public Service for whatever reason should not apply;
viii. Applicants should indicate three reputable referees with their reliable contacts;
ix. Certificates from foreign examination bodies for Ordinary or Advanced level education should be certified by The National Examination Council of Tanzania (NECTA) and National Council for Technical Education (NACTE);
x. Certificates from foreign Universities should be verified by The Tanzania Commission for Universities (TCU);
i. All applicants must be Citizens of Tanzania of not more than 45 years of age;
ii. Applicants must attach an up-to-date Curriculum Vitae (CV) having reliable contacts; postal address/post code, e-mail and telephone numbers;
iii. Applicants should apply on the strength of the information given in this advertisement;
iv. Applicants must attach their certified copies of the following certificates;
Postgraduate/Degree/Advanced Diploma/Diploma/Certificates;
Postgraduate/Degree/Advanced Diploma/Diploma transcripts;
Form IV and Form VI National Examination Certificates;
Birth certificate
v. Applicants who will attach copies of the following certificates strictly not accepted;
Form IV and form VI results slips
Testimonials and all Partial transcripts
vi. Applicants employed in the Public Service should route their application letters through their respective employers;
vii. Applicants who have/were retired from the Public Service for whatever reason should not apply;
viii. Applicants should indicate three reputable referees with their reliable contacts;
ix. Certificates from foreign examination bodies for Ordinary or Advanced level education should be certified by The National Examination Council of Tanzania (NECTA) and National Council for Technical Education (NACTE);
x. Certificates from foreign Universities should be verified by The Tanzania Commission for Universities (TCU);
xi. Applicants with special needs/case (disability) are supposed/advised to indicate;
xii. A signed application letters should be written either in Swahili or English and Addressed to Secretary, Presidents Office, Public Service Recruitment Secretariat, 27 Bibi Titi Mohammed Road, P.O.Box 63100, Maktaba Complex, 11102 Dar Es Salaam.
xiii. Deadline for application is 9th September, 2017 and;
xiv. Only short listed candidates will be informed on a date for interview.
xv. Presentation of forged certificates and other information will necessitate to legal action;
xii. A signed application letters should be written either in Swahili or English and Addressed to Secretary, Presidents Office, Public Service Recruitment Secretariat, 27 Bibi Titi Mohammed Road, P.O.Box 63100, Maktaba Complex, 11102 Dar Es Salaam.
xiii. Deadline for application is 9th September, 2017 and;
xiv. Only short listed candidates will be informed on a date for interview.
xv. Presentation of forged certificates and other information will necessitate to legal action;
NOTE: All applications must be sent through Recruitment Portal by using the following address; http://portal.ajira.go.tz/ and not otherwise (This address can also be found at PSRS Website, Click ‘Recruitment Portal’)
SECRETARY
PUBLIC SERVICE RECRUITMENT SECRETARIAT
PUBLIC SERVICE RECRUITMENT SECRETARIAT