
Job Location: | Kabul |
---|---|
Nationality: | National |
Category: | Information Technology |
Employment Type: | Full Time |
Salary: | As per company salary scale |
Vacancy Number: | 009 |
No. Of Jobs: | 1 |
City: | Kabul |
---|---|
Organization: | Roshan (TDCA) |
Years of Experience: | 3 years |
Contract Duration: | Permanent |
Gender: | Male |
Education: | Bachelor's Degree |
Close date: | 2025-06-08 |
Roshan (Telecom Development Company Afghanistan Ltd) is Afghanistan’s leading telecommunications provider, with coverage in over 230 cities and towns and approximately 3.5 million active subscribers. Roshan directly employs more than 1,100 people and provides indirect employment to more than 25,000 people. Since its inception six years ago, Roshan has invested approximately $430 million in Afghanistan and is the country’s single largest investor and tax payer. Roshan is deeply committed to Afghanistan’s reconstruction and socio-economic development. The Aga Khan Fund for Economic Development (AKFED), part of the Aga Khan Development Network (AKDN), is a major shareholder of Roshan and promotes private initiatives and building economically sound enterprises in the developing world. Also owned in part by Monaco Telecom International (MTI) and TeliaSonera, Roshan brings international expertise to Afghanistan and is committed to the highest standards of network quality and coverage for the people of Afghanistan.
1.1. Assists supervisor in the implementation of a risk-based IS audit plan for the organization in compliance with IS audit standards, guidelines and best practices.
1.2. Assists supervisor with planning of specific audits to confirm coverage of key risks to IT infrastructure and business systems in audit scope.
1.3. Develops IS audit programs for review by supervisor by assessing the nature, scope, extent and timing of work to be carried out.
1.4. Conducts audits in accordance with IS audit standards, guidelines and best practices to meet planned audit objectives and compiling of evidence to support audit opinion and preparing audit file for review by supervisor.
1.5. Communicates emerging IT related issues, potential risks, and audit results to key stakeholders.
1.6. Provides independent advice on the implementation of IS risk management and control practices within the organization.
2.1. Assist supervisor with the evaluation of the effectiveness of IT governance structures to confirm adequate board control over the decisions, directions, and performance of IT so that it supports the organization’s strategies and objectives.
2.2. Evaluates and provides recommends on the organization’s IT policies, standards, and procedures; and the processes for their development, approval, implementation, and maintenance to confirm alignment with business strategy and compliance with applicable regulatory and legal requirements.
2.3. Evaluates and recommends on management practices to confirm compliance with the organization’s IT strategy, policies, standards and procedures.
2.4. Evaluates and recommends on IT contracting strategies and policies, and contract management practices to confirm that they support the organization’s strategies and objectives.
2.5. Evaluates and recommends on IT resource investment, use, and allocation practices to confirm alignment with the organization’s strategies and objectives.
2.6. Evaluates and recommends on risk management practices to confirm that the organization’s IT related risks are properly managed.
2.7. Evaluates and recommends on monitoring and assurance practices to confirm that the board and executive management receive sufficient and timely information about IT performance.
3.1. Evaluates the business case for the proposed system development/acquisition to confirm that it meets the organization’s business goals.
3.2. Evaluates the project management framework and project governance practices to confirm that business objectives are achieved in a cost-effective manner while managing risks to the organization.
3.3. Performs reviews to confirm that IT projects are progressing in accordance with project plans and confirm availability of documentation and accuracy of status reporting.
3.4. Evaluates proposed control mechanisms for systems and/or infrastructure during specification, development/acquisition, and testing to confirm that they will provide safeguards and comply with the organization’s policies and other requirements.
3.5. Evaluates the readiness of the system and/or infrastructure for implementation and migration into production.
3.6. Performs post-implementation review of systems and/or infrastructure to confirm that they meet the organization’s objectives and are subject to effective internal control.
3.7. Evaluates the process by which systems and/or infrastructure are maintained to confirm the continued support of the organization’s objectives and are subject to effective internal control.
3.8. Evaluates the process by which systems and/or infrastructure are disposed of to confirm that they comply with the organization’s policies and procedures.
4.1. Evaluates and recommends on Service Level Management practices to confirm that the level of service from internal and external service providers is defined and managed.
4.2. Evaluates and recommends on operations management to confirm that IT support functions effectively meet business needs.
4.3. Evaluates and recommends on data administration practices to confirm the integrity and optimization of databases.
4.4. Evaluates and recommends on change, configuration, and release management practices to confirm that changes made to the organization’s production environment are adequately controlled and documented.
5.1. Evaluates and recommends on the design, implementation, and monitoring of logical access controls to confirm the confidentiality, integrity, availability and authorized use of information assets.
5.2. Evaluates and recommends on network infrastructure security to confirm confidentiality, integrity, availability and authorized use of the network and the information transmitted.
5.3. Evaluates and recommends on the design, implementation, and monitoring of environmental controls to prevent or minimize loss.
5.4. Evaluates and recommends on the design, implementation, and monitoring of physical access controls to confirm that information assets are adequately safeguarded.
5.5. Evaluates and recommends on the processes and procedures used to store, retrieve, transport, and dispose of confidential information assets.
6.1. Performs follow-up reviews to confirm implementation of management action according to planned issue resolution dates. KEY
DECISIONS MADE
• Decides whether an anomaly noted is a reportable matter (i.e. whether it impacts revenue, business continuity, key risk areas, ability to meet objectives or contravenes policy and legislature).
• Decides on key technology risk areas in the business for consideration by the Supervisor during annual audit planning and review.
Interested candidates may send their CVs to the following email address: