Recruitment at Growth in Value Alliance (GV Alliance) Partners
Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities.
We are recruiting to fill the position below:
Job Title: IT Security Planning & Architecture Resources Officer (Level 2)
Location: Nigeria
Job Description
- Lead investigations and proactively assist Senior Management in defining strategies to protect the organisation’s data from attack.
- Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
- Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
- Lead the implementation of information security projects.
- Define and enforce security requirements for applications in development.
- Design, document, and deploy secure infrastructure solutions to enhance and evaluate the security posture of the business to ensure integrity, availability, and confidentiality of all critical enterprise data.
- Collaborate with development teams to integrate security best practices into the software development lifecycle.
- Monitor and ensure compliance with security requirements throughout the development process.
- Liaise with stakeholders in respect of operational implementation of security policies and best practices.
- Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risk and adverse impact to servers, workstations, and user productivity.
- Implement the infrastructure, configurations, and processes to monitor security related events.
- Prevent data loss and services interruptions by researching new technologies that will effectively protect the enterprise network.
- Document and operationalize information security.
- Ensure all security documentation s are up to date.
- Ensure conformance to Cybersecurity Blueprint/Roadmap
- Provide inputs to company strategic plan on all initiatives to ensure that security gaps/vulnerabilities are identified & closed.
- End-to-end planning, and execution of program.
- Communicate and engage with stakeholders.
- Anticipate problems and complications, and formulate solutions so as not to impede the progress of the project,
- Ensure processes, procedure and policies defined with the it division is understood and adhered to.
- Develop and deliver security awareness training programs on a quarterly, annual, and on-demand basis.
- Create and distribute security awareness materials, such as presentations, posters, and email alerts.
- Measure the effectiveness of security awareness programs through surveys, tests, and other metrics.
Qualifications
- Minimum of Four (4) years’ work experience of which includes Three (3) years Security Architecture experience.
- Experience in the following: Identity Management technology. Vulnerability assessment and treatment, Systems Auditing, Security Architecture, Network, wireless Security.
- Proven experience in the full Secure software development lifecycle (SSDLC) – project vision through project implementation – for both small and medium enterprise projects
- Good working knowledge of Security Design & Architecture.
Application Closing Date
28th February, 2026.
How to Apply
Interested and qualified candidates should send their CVs in PDF to: tisea@gvapartners.com, eniolaa@gvapartners.com and copy contact@gvapartners.com using the job title as subject of the mail.
Job Title: IT Security Engineer
Location: Nigeria
Job Description
- An exciting opportunity exists for a highly skilled IT security engineer to join a dynamic project team.
Responsibilities
- Carry out procedural system maintenance on all IT systems.
- Ensure all networks including but not limited to LAN, MAN, WAN, GAN meets the demand of the company.
- Troubleshoot system and network problems, diagnosing and solving hardware or software faults and replace parts as required.
- Maintain all IT system work flows.
- Maintain and update all IT Networks.
- Maintain and contribute to the development of IT Network.
- Participate actively in developing, planning and implementing advance IT systems.
- Other duties as assigned.
Functions:
- Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
- Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
- Lead the implementation of Information Security projects
- Drive internal and external vulnerability assessment, penetration tests engagements and manage results to remediation.
- Respond to escalated security events and drive security incident response processes to ensure timely resolution with minimal disruption.
- Design, document, and deploy secure infrastructure solutions to enhance and evolve the security posture of the business to ensure integrity, availability and confidentiality of all critical enterprise data.
- Provide expertise on security tools, including but not limited to firewalls, Web Application firewalls, IDS/IDP, anti-malware software
- Liaise with stakeholders in respect of operational implementation of security policies and best practices Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risks and adverse impact to servers, workstations and user productivity.
- Implement the infrastructure, configurations and processes to monitor security related events
- Prevent data loss and service interruptions by researching new technologies that will effectively protect the enterprise network. Supervisory/Managerial Responsibilities:
- Ensure conformance to Cybersecurity Blueprint/Roadmap
- Provide inputs to company strategic plan on all initiatives to ensure that Security gaps/vulnerabilities are identified & closed
- Establish and ensure credibility through strong relationships, value-add to operations and professionalism
Requirements
- Minimum of 5 years experience in an area of Security specialisation; with experience working with others
- Experience working in a Large organization and preferably in the Telecommunications industry
- Strong background as an Engineer/Architect in application security infrastructure and various network technologies to include devices such as firewalls, VPN, intrusion/extrusion detection, vulnerability & risk assessment tools, encryption technologies, virus/worm/malware prevention, E-business and web application technologies, Data Loss Prevention, whole disk & device encryption solutions, two factor authentication, common Windows (desktop & server) platforms
- Experience with Microsoft, Solaris, Unix, Oracle and MS SQL
- Experience working in telecommunications industry
- Managing network and/or network security
- Knowledge should be current with information security best practices and global trends
- Knowledge of security best practices such as; defense in-depth, least privileges, need-to-know, separation of duties, access controls, encryption
- User account identity, authorization and authentication management.
- Security incident and event management
- Experience in researching new or emerging technologies and processes that may be incorporated as solutions to reoccurring security concern.
Training:
- Penetration Testing
- Vulnerability lifecycle management
- Advanced Security Incidence Reponses
- Systems Auditing, Database Security, Firewall Design, Intrusion detection system administration Implementation
- Security enforcement on systems level, security audit and vulnerability management
- Telecommunications, Network, wireless & Internet Security.
Application Closing Date
28th February, 2026.
How to Apply
Interested and qualified candidates should:
Click here to apply online
Job Title: Senior SOC Analyst
Location: Nigeria
Employment Type: Full-time
Job Description
- Tailoring the SIEM solution to unique infrastructure and business needs
- Monitor the overall performance of security systems depicted in appendix A
- Identity and Access Management Monitoring/Alerting
- Endpoint monitoring
- Constantly oversee and analyze security defenses per on-prem and cloud infrastructure
- Participate in the delivery of cybersecurity operations through vulnerability and threat identification, incident detection and response, forensic investigations, Patch and Vulnerability Management. Engage with infrastructure and applications teams in mitigation and remediation efforts.
- Maintain key metrics that are indicative of the security posture of the infrastructure.
- Keep abreast of threat intelligence feeds to stay abreast of industry reports and emerging threat that may affect.
- Produce Executive Dashboard Security reporting showing actionable insights from IT Security monitoring tools
- Engage with other IT units, where applicable, to establish and enforce security best practices, protection objectives, and process improvements.
Education, Experience, and Skills Required
- Bachelor’s degree / HND in Computer Science, Information Technology or Cybersecurity related field
- Minimum of 7 years of experience in Cyber security, with at least 5 years of working as SOC Analyst
- Experience with Windows/Unix/Linux Operating systems with a focus on cybersecurity
- Relevant industry certifications (i.e. CISSP, CASP+ CEH, GCIH, GCIA, OSCP)
- Experience with SIEM (Arcsight), EDR (Falcon Crowdstrike, Packet Analysis, HIPS/NIPS, Network Monitoring tools, Service Now Ticketing, Web Security.
- Communicates clearly with diverse technical and business owners.
- Familiarity with regulations and frameworks such as NIST, PCI, ISO 27001.
Application Closing Date
13th March, 2026.
How to Apply
Interested and qualified candidates should send their CVs in PDF to: tisea@gvapartners.com, eniolaa@gvapartners.com and copy contact@gvapartners.com using the job title as subject of the mail.
Note: The role is demanding and environment is dynamic.
Job Title: IT Security Planning & Architecture Resources
Location: Nigeria
Employment Type: Full-time
Job Description
- Lead investigations and proactively assist Senior Management in defining strategies to protect Organization’s data from attack.
- Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
- Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
- Lead the implementation of information security projects.
- Define and enforce security requirements for applications in development.
- Design, document, and deploy secure infrastructure solutions to enhance and evaluate the security posture of the business to ensure integrity, availability, and confidentiality of all critical enterprise data.
- Collaborate with development teams to integrate security best practices into the software development lifecycle.
- Monitor and ensure compliance with security requirements throughout the development process.
- Liaise with stakeholders in respect of operational implementation of security policies and best practices.
- Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risk and adverse impact to servers, workstations, and user productivity.
- Implement the infrastructure, configurations, and processes to monitor security related events.
- Prevent data loss and services interruptions by researching new technologies that will effectively protect the enterprise network.
- Document and operationalize information security.
- Ensure all security documentation s are up to date.
- Ensure conformance to Cybersecurity Blueprint/Roadmap.
- Provide inputs to company strategic plan on all initiatives to ensure that security gaps/vulnerabilities are identified & closed.
- End-to-end planning, and execution of program.
- Communicate and engage with stakeholders.
- Anticipate problems and complications, and formulate solutions so as not to impede the progress of the project
- Ensure processes, procedure and policies defined with the it division is understood and adhered to.
- Develop and deliver security awareness training programs on a quarterly, annual, and on-demand basis.
- Create and distribute security awareness materials, such as presentations, posters, and email alerts.
- Measure the effectiveness of security awareness programs through surveys, tests, and other metrics.
Qualifications
- Minimum of eight (8) years’ work experience of which includes four (4) years’ experience integrating applications and technology into a complex environment.
- Experience in the following Identity Management technology.
- Vulnerability assessment and treatment, Systems Auditing, Policy, Database Security, Security Architecture and Models, Network, wireless Security.
- Minimum of 3 years security compliance & threats modeling
- Proven experience in the full Secure software development lifecycle (SSDLC) – project vision through project implementation – for both small and large enterprise projects
- Proven experience in Security Architecture Governance and standards
Application Closing Date
28th February, 2026.
How to Apply
Interested and qualified candidates should send their CV in PDF to: tisea@gvapartners.com, eniolaa@gvapartners.com and copy contact@gvapartners.com using the job title as the subject of the email.
Job Title: Linux Engineer (RedHat)
Locations: Nigeria
Employment Type: Full-time
Job Description
- RedHat, Oracle Enterprise Linux and Solaris operating system installation.
- Operating system hardening and configuration.
- Break and fix.
- Capacity optimization and reporting.
- Observability and monitoring of infrastructure.
- Service management operations, includes – incident, request, problem and change implementations.
- Host storage sub-system administration and migration.
- Platform automation and scripting.
- Package and repository management.
- System patch and vulnerability remediation.
- Platform management utilizing tools such as RedHat Satellite and Ansible Automation Platform.
- Engineered system administration, such as Oracle Sparc M6 and Exadata.
- Virtualized platform administration such as Oracle Virtual Machine Manager, KVM and VMWare VCenter.
- Business reporting and presentation.
- Customer engagement and troubleshoot sessions.
- Platform upgrade and migration.
- Research and development.
- Business tasks reporting.
Scope
- Patching: This activity is to address swiftly vulnerable hosts in the Unix ecosystem. It also includes vulnerability remediation to mitigate security attack surfaces identified and improve system performance by addressing known system bugs.
- Operating system conversion: This activity is for the conversion of Oracle Enterprise Linux to Red Hat Enterprise Linux systems respectively for operating system consolidation and to get Red Hat subscription coverage.
- Red Hat Satellite registration: This is consolidation of all Red Hat Enterprise Linux footprints on a centralized management system – Red Hat Satellite. This centralizes package, patch, job execution, and management.
- Operating system upgrade: This activity aims at upgrading Red Hat Enterprise Linux 7.9 to 8.10 respectively. This assures the environment is security compliant and within support.
Key Responsibilities
- Lead and support the migration from Oracle Enterprise Linux (OEL) to Red Hat Enterprise Linux (RHEL).
- Integrate Linux hosts with RedHat Satellite for centralized management.
- Perform advanced troubleshooting of Linux operating systems and applications.
- Automate routine tasks using tools like Ansible.
- Apply ITIL processes (change, incident, problem management) in daily operations.
- Collaborate with cross-functional teams to ensure seamless infrastructure upgrades and transparent system migrations.
Required Skills & Qualifications
- Strong proficiency in Linux system administration (RHEL preferred).
- Experience with RedHat Satellite, Ansible, and shell scripting (Bash, Python).
- Familiarity with network services: DNS, NFS, LDAP/Kerberos, Apache, NTP.
- Analytical mindset with strong problem-solving capabilities.
- Excellent communication and teamwork skills.
- Certifications such as RHCE, RHCSA, or ITIL are advantageous.
Application Closing Date
28th February, 2026.
How to Apply
Interested and qualified candidates should send their CV in PDF to: tisea@gvapartners.com, eniolaa@gvapartners.com and copy contact@gvapartners.com using the job title as the subject of the email.
Recruitment at Growth in Value Alliance (GV Alliance) Partners
Join Our WhatsApp Channel
JOB SEARCH
-
Federal and State Government Recruitment
-
Oil and Gas Jobs
-
Banking and Finance Jobs
-
International NGOs Recruitment
-
Teaching Jobs
-
Federal and State University Jobs
-
Federal and State Polytechnic Jobs
-
Customer Service Jobs
Tired of applying for many job offers and not getting interviews?
We have the solution you are looking for!
Getting your dream job starts with a lot of personal branding and our CV writing experts will help your CV gain clarity and turn your career journey into a professional story by using words – ATS keys specific to your sector that will communicate your skills and experience. And the ability to employers in a unique and professional way, which earns you more job interviews.
Most of our clients testified of getting up to 3 interviews in a week after renewing our professional resume and using our creative cover letter and LinkedIn profile improvement services.
We offer:
* Creative and Professional CV Services
* Creative services and cover letter
* Professional profile improvement services on LinkedIn.
You can purchase any of these services by clicking on the link below.
Let’s help you win more opportunities today, at iCreative Writers Hub, we are more than the hype💯. Email Us: sheglobalconsult@gmail.com
MUST READ: How to Write Your Own Professional CV (Curriculum Vitae)
RECOMMENDED SCHOLARSHIP SEARCH FOR INTERNATIONAL STUDENTS
-
Scholarship In America
-
Scholarship in UK
-
Scholarship in Europe
-
Scholarship in Australia
-
Fully Funded scholarships and Grants
Premium Trust Bank Graduate Trainee Program 2025 | Application Guide
HOW TO WRITE A JOB APPLICATION COVER LETTER
A cover letter is a document that is attached to an application and aims to introduce the candidate more personally. It should supplement information from a CV or curriculum vitae, address skills and achievements, and highlight a selection of the most relevant accomplishments.
Do you see? This isn’t rocket science. It’s just a message supporting your application.
CLICK HERE FOR GUIDE ON HOW TO WRITE A COVER LETTER
CAREER GUIDE
As digital transformation changes traditional roles in the workplace and creates new jobs, there is an urgent need for employees to develop and deepen their technical skills to improve the quality of work, foster creativity and remain employable.
If you have a growth mindset, you can close the skills gap and create more exciting job opportunities for yourself. CLICK HERE FOR BEST CAREER ADVICE/GUIDE
Important Notes
- The above statements are intended to describe the general nature and level of work to be performed by those assigned to this function.
- It should not be construed as an exhaustive list of all responsibilities, tasks and skills required of persons so classified.
- All employees may be required to undertake other responsibilities in addition to those specified from time to time, as required.
- We do not charge any application, processing, training, interview, testing or any other fees in connection with the application or recruitment process. If you receive a fee request, please ignore it.
- Also, please note that logos, slogans, names and titles are easily copied and reproduced. Therefore, particular care should be taken when submitting personal information on the web.
- We are an equal opportunity employer that values inclusiveness and diversity. We do not discriminate on the basis of color, race, nationality, religion, age, ethnic origin, disability, gender, marital status or orientation gender in our employment practices
- Our employees are all equally talented in unique ways: we come from diverse traditions, personal experiences and perspectives. And we want to include your ideas, are you ready to inspire us with your ideas?
- We encourage all applicants to apply and do not discriminate in any recruitment process.
- Applications submitted after the deadline will not be considered.
- Due to the necessity of the position, we are entitled to appoint a candidate who matches the required profile before the above deadline
- Only qualified candidates will be invited for an interview
Publisher’s Note:
Deroundtable.com is a blog about jobs, vacancies, and job opportunities. We share daily updates of available jobs, vacancies, local and international scholarships, loans and grants from government/international organisations.
Dearoundtable.com is not an agent of this organization, and we cannot assist any candidate in obtaining a job, loan, grant or scholarship. We only share information for those interested in applying.
Dearoundtable admins will never contact any candidate requesting payment like me or requesting an OTP token.
Our services are completely free.
Beware of scammers