Absa Bank Recruitment 2023 – Recruitment Portal

The Absa Bank Recruitment 2023/2024… | Absa Bank Recruitment Portal is now open for new recruitment. Absa Bank recruitment 2023 application form, Closing date, requirements, and guidelines are for free here.



Are you a Ghanaian who has been looking for an opportunity to get recruited in the upcoming Absa Bank Recruitment and yet you are still not sure on how to start? This Portal is Basically made for you. We will be of help by directing you to the process and method of application, All you need to do is to follow the guidelines.

They invited applications from a suitably qualified Ghanaian for the 2023/2024 Absa Bank recruitment exercise.  INTERESTED AND SUITABLY QUALIFIED members of the public can apply for any of the positions available at Absa Bank.


Therefore, all Interested and qualified applicants must be Ghanaian citizens by birth with no criminal record. Possess a first Degree, not below a Second Class Lower from an accredited university in a related field. … Age of 21 and not more than 35 years by 31st December 2023.

Absa Bank Recruitment 2023/2024

1. Job Title: IT Security Engineer

Job Description

Accountability: Policy Development and Enforcement (15%)

This multifaceted role encompasses not only the implementation of security measures but also the development, communication, and enforcement of security policies and standards. Your contributions will be instrumental in fostering a security-conscious environment, mitigating risks, and ensuring that the Bank’s IT systems, networks, and data remain secure and compliant with industry regulations and best practices.


Security Policy Development and Enforcement:

  • Develop, review, and update security policies, standards, and procedures in alignment with the Bank’s policies and industry regulations, best practices, and organizational objectives.
  • Ensure policies reflect the Bank’s risk appetite and are tailored to address specific security challenges.
  • Regularly evaluate the effectiveness of security policies through feedback, incident analysis, and industry benchmarking, and make iterative improvements.

Policy Compliance and Auditing:

  • Monitor and enforce adherence to security policies and standards across the organization.
  • Conduct regular audits and assessments to identify policy violations and recommend corrective actions.

Policy Gap Analysis:

  • Regularly conduct gap analysis to identify areas where security policies need adjustment or enhancement to address new risks or technologies.
  • Policy Advocacy and Communication:
  • Act as an advocate for security policies, educating stakeholders about their importance and relevance to the organization’s security posture.
  • Engage with legal, compliance, and other relevant departments to ensure security policies align with broader organizational objectives.

Security Awareness Campaigns:

  • Lead or contribute to security awareness campaigns, designing engaging content and activities to educate employees on policy changes and best practices.

Accountability: Stakeholder Management (15%)

  • Identify, analyse, and understand expectations from relevant stakeholders.
  • Effective management of stakeholders throughout the information security lifecycle.
  • Consultations with Accountable Executive / sponsor to report progress on IT security posture, escalate issues etc.
  • Communication with various businesses and other enablers to support IT security related activities when required.
  • Prepare and deliver presentations on security policies, incidents, and improvements to executive leadership.
  • Translate technical security concepts into business-friendly language for executives and non-technical stakeholders.
  • Facilitate change management processes when introducing new security policies or practices that impact established workflows.
  • Provide support to teams adapting to changes, addressing concerns, and ensuring smooth transitions.
  • Collaborate with external partners, vendors, industry groups, and regulatory bodies to align security practices and share insights on policy development and enforcement.
  • Tailor security policy communications and engagement strategies to cater to different audiences within the organization, ensuring effective understanding and adoption.
  • Address conflicts and disagreements related to security policies with a focus on finding common ground that balances security requirements and operational needs.
  • Seek feedback from stakeholders to improve security policies and address gaps that may arise from real-world application.
  • During security incidents or breaches, collaborate with communication teams to ensure accurate and transparent communication with stakeholders, maintaining trust and credibility.

Accountability on all of the below (60%)

Vulnerability Assessment:

  • Conduct regular vulnerability assessments using automated scanning tools, manual testing, and other techniques to identify security weaknesses across the organization’s technology landscape.
  • Analyse and interpret vulnerability scan results to prioritize and address the vulnerabilities identified.
  • Stay updated with the latest threat landscape, emerging vulnerabilities, and attack vectors.

Patch Management:

  • Collaborate with system administrators, developers, and other stakeholders to plan and execute patch management strategies.
  • Research and test patches for compatibility and impact before deployment to ensure minimal disruption to systems and services.
  • Develop and maintain a comprehensive patching schedule, ensuring timely deployment of security updates.

Remediation Planning and Execution:

  • Evaluate the risk associated with identified vulnerabilities and work with relevant teams to develop effective remediation plans.
  • Provide clear guidance and recommendations to system owners and administrators on patching and mitigation strategies.
  • Monitor and track the progress of vulnerability remediation efforts, escalating critical issues as needed.

Incident Response:

  • Participate in incident response efforts by identifying vulnerabilities that may have contributed to security incidents and breaches.
  • Contribute to the development of incident response plans and processes that involve vulnerability management.

Documentation and Reporting:

  • Maintain accurate and up-to-date records of vulnerabilities, patches applied, and their outcomes.
  • Generate regular and ad hoc reports on vulnerability assessment findings, patching status, and overall security posture for management and relevant stakeholders.

Continuous Improvement:

  • Continuously evaluate and enhance vulnerability assessment and patching processes to adapt to changing threat landscapes and technology environments.
  • Provide insights and recommendations for security enhancements based on analysis of vulnerabilities and their potential impact.

Threat Intelligence Integration:

  • Stay informed about the latest threat intelligence, vulnerabilities, and exploits through reputable sources.
  • Incorporate threat intelligence into vulnerability assessments to identify vulnerabilities that are actively being targeted by cybercriminals.

Testing and Validation:

  • Collaborate with the testing team to ensure that patches are thoroughly tested in a controlled environment before being applied to production systems.
  • Develop and execute testing scenarios to verify the effectiveness of patches in addressing identified vulnerabilities.

Coordination and Communication:

  • Serve as a liaison between different teams, including IT, development, and security, to ensure seamless coordination of patching efforts.
  • Communicate effectively with stakeholders about the urgency of patch deployment, potential risks, and necessary downtime.

Research and Analysis:

  • Conduct in-depth analysis of zero-day vulnerabilities and emerging threats to assess potential impact on the organization.
  • Collaborate with security researchers and external vendors to gather insights into vulnerabilities and available patches.
  • Stay current with emerging security threats, trends, and technologies. Share knowledge and insights with the team and the organization.

Automation and Scripting:

  • Develop and maintain scripts and automation tools to streamline vulnerability scanning, patch testing, and deployment processes.
  • Identify opportunities to automate routine tasks to improve efficiency and accuracy.

Configuration Management:

  • Collaborate with configuration management teams to ensure that systems and applications are built and deployed with security in mind.
  • Provide guidance on secure configuration settings to reduce the attack surface.

Training and Awareness:

  • Conduct training sessions or workshops for technical teams to enhance their understanding of vulnerabilities and the importance of timely patching.
  • Raise awareness among non-technical stakeholders about the impact of vulnerabilities and the organization’s efforts to address them.

Third-Party Risk Management:

  • Assess vulnerabilities in third-party applications and services that are used by the organization.
  • Collaborate with procurement and vendor management teams to ensure that vendors adhere to security requirements and provide timely patches.

Metrics and Reporting:

  • Develop and maintain key performance indicators (KPIs) to measure the effectiveness of vulnerability management and patching processes.
  • Generate executive-level reports that provide insights into the organization’s security posture and improvements over time.

Regulatory Compliance:

  • Ensure that vulnerability and patch management processes align with relevant regulatory frameworks and standards.
  • Participate in audits and compliance assessments related to vulnerability management.

Security Architecture Design:

  • Collaborate with IT architects to develop and implement robust security architectures for new and existing systems and applications.
  • Design security solutions that align with business requirements and industry best practices, encompassing technologies such as firewalls, intrusion detection systems, encryption, and authentication mechanisms.

Education And Experience Required

  • Bachelor’s or master’s degree in computer science, Information Technology, or a related field.
  • Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+.
  • Strong knowledge of network protocols, firewalls, intrusion detection/prevention systems, and security technologies.
  • Familiarity with operating systems (Windows, Linux), network architecture, and cloud security.
  • Excellent problem-solving skills and the ability to respond quickly to security incidents.
  • Strong communication skills to effectively collaborate with team members and stakeholders.

Knowledge & Skills: (Minimum of 3)

  • Experience of employing IT security management best practices and disciplines
  • Awareness of the Bank including systems, products, and services
  • Experience of managing activity across the whole of IT security lifecycle, using current technology, structured methods, and a quality process
  • Exposure to governance, control, and risk management
  • Proven ability to effectively work within teams at all levels.
  • Strong understanding of common security vulnerabilities, attack vectors, and mitigation strategies.
  • Proficiency in vulnerability scanning and assessment tools.
  • Experience with patch management processes and tools.
  • Solid understanding of network protocols, operating systems, and application architectures.
  • Strong analytical and problem-solving skills.
  • Effective communication skills to collaborate with technical and non-technical stakeholders.
  • Ability to work independently and as part of a team.
  • Knowledge of regulatory requirements and security standards (e.g., GDPR, ISO 27001, PCIDSS) is a plus.

Competencies: (Minimum of 3 competencies)

  • Management and leadership
  • Exceptional service and results orientation.
  • Superior analytical, evaluative, and problem-solving abilities.
  • Ability to work under pressure and time constraints.
  • Excellent self-organization and self-direction in performance of tasks, including time management skills.
  • Ability to set and manage priorities.
  • Maintaining up-to-date knowledge of technological advances is crucial.


Higher Diplomas: Physical, Mathematical, Computer and Life Sciences (Required)

How to Apply

Submit your CV and Application on Company Website : Click Here

Closing Date : 15th September, 2023


2. Job Title: Debt Analyst

Job Description

Key Accountabilities

Transaction Management: – 25%

  • Structure and execute transactions whilst demonstrating key business competencies.
  • Develop simple models and stress scenarios to determine debt capacity for debt transactions prior to NBC
  • Contribute to the maintenance and development of client relationships through the origination of value-added, creative ideas and solutions.
  • Preparing pitch books and presentations after analysing opportunities and financials for clients on the target clients list
  • Support transaction structuring and execution; focus on revenue-generating opportunities

Business Management – 25%

  • Maintain and update the Debt pipeline (weekly)
  • Contribute to the development of business unit strategy
  • Environmental scanning for new debt opportunities
  • Research and share information to ensure up to date knowledge of market place, business development activity / initiatives and competitors
  • Assist RMs in originating and executing debt transactions across all teams.
  • Collaborate with specialist product partners (Trade, Cash, and Treasury) to offer clients a comprehensive and competitive package to meet their requirements.

Risk Management and Control – 20%

  • Be fully aware and compliant with all governance issues affecting Debt Finance and address these issues accordingly.
  • Understand and adhere to governance and compliance policies and procedures. Demonstrate sound judgment and act in accordance with compliant risk measures.
  • Escalate identified issues in a timely manner to management. Where applicable, demonstrate awareness and understanding of the relevant control principles and committed to applying them to working practices as required.
  • Ensure that processes, control requirements and risk management frameworks that impact the area are implemented
  • Ensure that all activities and duties are carried out in full compliance with regulatory requirements, Enterprise Wide Risk Management Framework and internal Abas Policies and Policy Standards. Understand and manage risks and risk events (incidents) relevant to the role.”

Stake Holder Management – 20%

  • Cultivate relationships with clients.
  • Proactively develop relationships with key stakeholders internal and external eg: compliance, legal, and key clients identified.
  • Build and develop relationships across the firm with various stakeholders with the intention of breaking down silos to maximise business growth
  • Act with integrity in all dealings with internal and external stakeholders. Build sustainable relationships with clients based on transparency and honesty.
  • Build and develop relationships across the firm with various stakeholders with the intention of breaking down silos to maximise business growth.

People Development and Management – 10%

  • Supporting RMS in country in understanding Debt products more comprehensively.
  • Be responsible for self-development
  • Build collaborative network with Absa Africa Debt (SA) Corporate Credit , RM’s, CCMs
  • Ensure compliance with all relevant Absa’s policies.
  • Establish and embed the values (RISES), behaviours and risk appetite that will under underpin the achievement of business objectives.

Role / Person Specification

Education And Experience Required

  • Bachelor’s degree in Commerce, Banking, Economics or similar. Post Graduate degree or MBA preferable
  • 3 – 5 years Sales and Banking experience
  • Requires a good understanding of corporate client management and solutioning
  • Excellent working knowledge of client accounting and treasury
  • Management operating systems and how our services interface with them.
  • Sound banking knowledge.
  • Loan Product Knowledge
  • Matured and results-orientated
  • Knowledge of the debt market and our competition
  • Visible excellent communication (written and verbal) and negotiation skills

Technical Skills/ Competencies

  • Managing Relationships
  • ‘Selling’, negotiating and influencing skills
  • Business awareness & business development
  • Strong credit risk analysis skills
  • Good teamwork skills
  • Strong performance management skills
  • Good at decision making
  • Strong formal presentation skills
  • Deciding and initiating action
  • Learning and researching
  • Relating and networking
  • Adapting and responding to change
  • Persuading and influencing
  • Creating and innovating


Bachelor`s Degrees and Advanced Diplomas: Business, Commerce and Management Studies (Required)

How to Apply

Submit your CV and Application on Company Website : Click Here

Closing Date : 18th September, 2023



  • Absa Bank DO NOT demand or accept gifts or gratification to offer employment.
  • Do not offer money to anyone before, during or after the recruitment exercise. Any candidate found doing either of these would be summarily disqualified and prosecuted.

CAUTION: Candidates who wants to Apply for this Recruitment should be very sensitive and careful, We advise that Candidates should visit the Recruitment PORTAL or WEBSITE and follow the Steps outlined for Application. DO NOT GIVE MONEY to any agent proving to get you Recruited Please take Note.

For more questions and further information pertaining to this recruitment, get in touch with us at the Comment Space Below.

Few things to know before applying for Absa Bank Recruitment 2023

To apply for the Absa Bank Recruitment 2023. Below is what you need to know:

  • Make sure you confirm the deadline of any advertised position before submitting an application.
  • Make sure you meet all minimum Absa Bank Recruitment Recruitment requirements and possess any required documents before submitting an application.
  • Follow the details on each individual position to apply.

Leave a Reply