{"id":2452,"date":"2026-04-16T08:00:31","date_gmt":"2026-04-16T08:00:31","guid":{"rendered":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/job\/head-cyber-security-at-kifiya-financial-technologies\/"},"modified":"2026-04-16T08:00:50","modified_gmt":"2026-04-16T08:00:50","slug":"head-cyber-security-at-kifiya-financial-technologies","status":"publish","type":"job_listing","link":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/job\/head-cyber-security-at-kifiya-financial-technologies\/","title":{"rendered":"Head, Cyber Security at Kifiya Financial Technologies"},"content":{"rendered":"<p>About the Job<\/p>\n<p>Location:<br \/>\nAddis Abeba<\/p>\n<p>Department:<br \/>\nCISO<\/p>\n<p>Reports To:<br \/>\nChief Information Security Officer<\/p>\n<p>About Kifiya:<br \/>\nKifiya is an AI-powered financial and market infrastructure company advancing inclusive economic growth across Africa. We design and deploy risk decisioning systems, intelligent financial infrastructure, and market linkage platforms that unlock credit, insurance, payments, and capital access for MSMEs and smallholder farmers. We build the AI, data, and financial infrastructure that helps financial institutions serve hard-to-finance segments at scale.<\/p>\n<p>Business Unit Description<\/p>\n<p>The CISO Unit safeguards Kifiya\u2019s enterprise systems, AI-driven financial infrastructure, data assets, internal technology stack, and digital transformation programs.<br \/>\nThe unit ensures enterprise-wide protection, operational continuity, regulatory compliance, secure architecture design, and automation governance aligned with global best practices and financial sector standards.<\/p>\n<p>Position Summary<\/p>\n<p>The Head of Cyber Security leads the operational execution of Kifiya\u2019s enterprise cyber defense program. The role translates the enterprise cyber risk strategy defined by the Chief Information Security Officer into operational security controls, monitoring capabilities, and incident response readiness across the organization\u2019s digital infrastructure.<br \/>\nThe Head oversees the Security Operations Center, vulnerability management program, threat detection capabilities, and cyber defense engineering functions. The role ensures the protection of Kifiya\u2019s financial systems, artificial intelligence platforms, cloud environments, data infrastructure, and digital capital market systems.<br \/>\nThis position also ensures the implementation of Zero Trust security architecture, secure development of lifecycle integration, identity security enforcement, and continuous threat monitoring across the enterprise technology ecosystem.<\/p>\n<p>Key Responsibilities<br \/>\nCyber Security Operations Leadership<\/p>\n<p>Lead the enterprise cyber defense capability responsible for protecting financial infrastructure, artificial intelligence systems, cloud environments, and enterprise applications.<br \/>\nOversee the Security Operations Center responsible for real time monitoring, threat detection, and incident triage.<br \/>\nEnsure continuous monitoring coverage across all critical enterprise systems, applications, and infrastructure.<br \/>\nDefine and enforce operational cyber defense procedures and escalation protocols.<br \/>\nEnsure operational readiness to detect and respond to advanced persistent threats targeting financial technology infrastructure.<\/p>\n<p>Threat Detection and Incident Response<\/p>\n<p>Establish detection capabilities across network, cloud, endpoint, and application layers.<br \/>\nOversee investigation and response to cyber incidents including malware, phishing, credential compromise, data exfiltration attempts, and infrastructure intrusion.<br \/>\nCoordinate cross functional response during cyber security incidents impacting enterprise operations.<br \/>\nEnsure post incident forensic analysis and lessons learned documentation.<br \/>\nMaintain incident response readiness through simulation exercises and red team testing.<\/p>\n<p>Vulnerability and Exposure Management<\/p>\n<p>Establish enterprise wide vulnerability scanning and exposure assessment program.<br \/>\nOversee vulnerability remediation across infrastructure, applications, and cloud environments.<br \/>\nDefine vulnerability prioritization frameworks based on enterprise risk exposure.<br \/>\nEnsure remediation of critical vulnerabilities within defined service level thresholds.<br \/>\nTrack vulnerability remediation performance and report exposure metrics to the CISO.<\/p>\n<p>Infrastructure and Cloud Security Enforcement<\/p>\n<p>Ensure implementation of enterprise security controls across cloud platforms, networks, and server infrastructure.<br \/>\nOversee security configuration of firewalls, web application firewalls, endpoint protection platforms, and intrusion detection systems.<br \/>\nEnsure secure deployment and configuration of cloud environments supporting financial and artificial intelligence platforms.<br \/>\nValidate infrastructure security compliance with enterprise architecture standards.<\/p>\n<p>Identity and Access Security<\/p>\n<p>Ensure enforcement of Identity and Access Management controls across all enterprise systems.<br \/>\nEnsure mandatory multi factor authentication across critical platforms and privileged access accounts.<br \/>\nMonitor identity governance frameworks to prevent unauthorized system access.<br \/>\nEnsure continuous monitoring of identity compromise risks and suspicious authentication patterns.<\/p>\n<p>Secure Software Development Integration<\/p>\n<p>Ensure integration of security controls into the software development lifecycle.<br \/>\nEnsure application security testing processes are embedded within development pipelines.<br \/>\nDefine application vulnerability remediation protocols.<br \/>\nWork closely with engineering teams to prevent security vulnerabilities within production systems.<\/p>\n<p>Security Monitoring and Intelligence<\/p>\n<p>Oversee enterprise threat intelligence monitoring to identify emerging threats targeting financial platforms and artificial intelligence systems.<br \/>\nEnsure integration of threat intelligence feeds into detection systems.<br \/>\nMonitor indicators of compromise across enterprise infrastructure.<br \/>\nContinuously improve detection rules and threat hunting capabilities.<\/p>\n<p>Security Metrics and Operational Reporting<\/p>\n<p>Define cyber security operational performance indicators.<br \/>\nReport cyber defense performance metrics to the CISO.<br \/>\nMaintain operational visibility of security incidents, vulnerabilities, and threat activity.<br \/>\nProduce regular security posture reports for executive review.<\/p>\n<p>Security Program Implementation<\/p>\n<p>Implement enterprise cyber security initiatives defined by the CISO.<br \/>\nSupport internal and external cyber security audits.<br \/>\nEnsure implementation of enterprise cyber security policies and standards.<br \/>\nCoordinate security remediation programs across technology teams.<\/p>\n<p>Key Outputs<\/p>\n<p>Cyber Defense Operations<br \/>\nVulnerability and Exposure Management<br \/>\nIdentity and Infrastructure Protection<br \/>\nSecurity Monitoring and Threat Intelligence<br \/>\nCyber Security Governance<\/p>\n<p>About You<\/p>\n<p>Qualifications and Experience<\/p>\n<p>Bachelor\u2019s or Master\u2019s degree in Cybersecurity, Information Security, Computer Science, or a related discipline.<br \/>\nMinimum ten to twelve years of cybersecurity experience including leadership of security operations or cyber defense teams.<br \/>\nExperience securing financial services platforms, fintech infrastructure, or regulated digital financial environments.<br \/>\nExperience managing Security Operations Center capabilities and incident response teams.<br \/>\nExperience implementing Zero Trust architecture, cloud security controls, and secure development lifecycle practices.<br \/>\nProfessional certifications such as CISSP, CISM, or equivalent are preferred.<\/p>\n<p>Core Competencies<\/p>\n<p>Cyber security operations management<br \/>\nThreat detection and incident response<br \/>\nVulnerability management frameworks<br \/>\nCloud and infrastructure security<br \/>\nIdentity and Access Management<br \/>\nSecurity monitoring platforms<br \/>\nSecure development lifecycle integration<br \/>\nThreat intelligence analysis<\/p>\n","protected":false},"author":2,"featured_media":0,"template":"","meta":{"_promoted":"","_job_location":"","_application":"","_company_name":"Kifiya Financial Technologies","_company_website":"","_company_tagline":"","_company_twitter":"","_company_video":"","_filled":0,"_featured":0,"_remote_position":0,"_job_salary":"","_job_salary_currency":"","_job_salary_unit":""},"job_listing_region":[11],"job-categories":[],"job-types":[12],"class_list":{"0":"post-2452","1":"job_listing","2":"type-job_listing","3":"status-publish","4":"hentry","5":"job_listing_region-ethiopia","7":"job-type-full-time"},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-listings\/2452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-listings"}],"about":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/types\/job_listing"}],"author":[{"embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/users\/2"}],"wp:attachment":[{"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/media?parent=2452"}],"wp:term":[{"taxonomy":"job_listing_region","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job_listing_region?post=2452"},{"taxonomy":"job_listing_category","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-categories?post=2452"},{"taxonomy":"job_listing_type","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/ethiopia\/wp-json\/wp\/v2\/job-types?post=2452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}