IT Security Officer

OFFRE D’EMPLOI N° 001/SB-RDC/KIN/2023

 

TITRE DU POSTE

: IT Security Officer

DEPARTEMENT

: Information Technology

LIEU D’AFFECTATION

: Kinshasa

TYPE DE CONTRAT

: CDI assorti d’une période d’essai de 3 mois

A PROPOS DE STANDARD BANK

Standard Bank RDC fait partie du plus grand groupe bancaire de l’Afrique en termes de capitalisation boursière dont le siège se situé à Johannesburg. Présente dans 38 pays dont 18 en Afrique, c’est depuis 1992 qu’elle opère au Congo à la suite de l’acquisition d’ANZ Grindlays Zaire qui existait dans le pays depuis 1973.

Standard Bank RDC offre une gamme variée de produits et services par le truchement de ses diverses branches à travers la RDC via un réseau des intermédiaires (banques correspondantes). Nous avons développé une expertise dans la prestation des services liés aux besoins des entreprises minières, multinationales, Nations-Unies et autres organisations internationales opérant en République Démocratique du Congo.

Nos équipes allient leur connaissance approfondie sur les conditions et déterminants du marché en RDC à l’expertise du Groupe Standard Bank opérant dans les marchés émergeants aux fins de développement des solutions sur mesure répondant aux besoins de la clientèle.

I. JOB DESCRIPTION

Links to structures

Job function*

Information Technology

Job family*

Technology Risk & IT Security Management

Job reports to*

Manager IT Security, Governance, Risk and Compliance

Career type*

Functional/Specialist

Contribution

Job purpose description*

 

 

To provide IT security services to the IT Department/Bank and in so doing ensure that all IT security policies and controls are in place for adequate logical and physical access as per Group guidelines. To review all user access requests in conjunction with Production/Application Teams prior to the granting thereof. To follow-up on all audit issues and provide guidance, supervision and assistance in BCM and DR operations/exercises.

Job criticality

Strategically Critical

Key responsibilities*

Output group 1*

Oversee IT security management for the Bank from a technological perspective

Outputs and measures*

  • Working within group standards, ensure that all IT security policies and controls are in place for both logical and physical access.
  • Monitor full adherence to Group security practices/protocols/standards/guidelines as well as industry practices and best practices.
  • Check that all local country IT security requirements are updated/incorporated into and aligned to Group IT security guidelines
  • Check all Patch deployment is up to date
  • Check that Bank’s IT equipment is properly maintained by overseeing the loading of patches, firmware upgrades etc. Ensure that intrusion prevention and detection systems are in place.
  • Report and track security breaches and ensure that any known and substantive security gaps are dealt with swiftly.
  • Analyze critical vulnerabilities and come up with plans/actions to address security issues in the short and long run as needed. Plan relevant penetration testing and other security initiatives throughout the year.
  • Engage and engagement and collaborate consistently with IT team, CIO and Group/Regional Security Officers to identify/mitigate risk and constantly increase on country’s security posture.
  • Review Security policy as directed by CIO.
  • Supervise the technical testing of new systems, applications and/or infrastructure from a security perspective. Make recommendations to the CIO on the security readiness as part of the go/no-go decision process
  • Review all user access requests in conjunction with Production/Application teams.
  • On a periodic basis, extract and review existing users access control lists from all systems
  • Perform IT Risk assessments for existing/new Hardware and software
  • Checkl Antivirus versions are up to date and that antivirus management and distribution servers are fully functional
  • Escalate any security failures or breaches immediately. Log the incident reports, participate in the investigations and work on the remedial actions to prevent recurrence.
  • Drive awareness campaign to sensitize staff on all security aspects relating to technology.
  • Participate in business discussions around all topics relating to IT security. 

 

Output group 2*

User access management

Outputs and measures*

  • Review all user access requests in conjunction with Production/Application teams.
  • On a periodic basis, extract and review existing users access control lists from all systems
  • Liaise with respective colleagues/departments for appropriate periodic review of all user access rights and manage any remediation thereof.

 

Output group 3*

Manage Disaster Recovery Planning

Outputs and measures*

  • Manage the IT Disaster Recovery Plan and update as necessary
  • Coordinate DR/BCM testing at least twice a year in conjunction with other units within IT / Bank
  • Regularly and proactively engage with other BCM manager/co-ordinators/alternates to ensure the IT services at DR site are adequate to enable the business to function in case of disaster.

 

Output group 4

Manage the resolution of audit findings

Outputs and measures

  • Track, review and manage the resolution of Audit findings in conjunction with CIO.

 

Output group 5

Key Performance measures

Outputs and measures

  • Monitor number of outstanding Audit issues
  • Update DRP/BCM to be completed twice a year
  • Testing of DRP/BCM to be done at least twice a year
  • Monitor number of IT security breaches
  • Comply with Group IT security guidelines

 

II. REQUIREMENTS

Qualifications

Formal minimum qualification 1*

Type of qualification: First Degree
Field of study: IT and Computer Sciences

Other qualifications, certifications or professional memberships

ITIL Foundation Certification

Experience

Experience required*

Job Function: Information Technology
Job Family: IT Security
Years: 3-4 Years
Experience Description: Experience in IT Security / Auditing in a multi-system environment.

Experience preferred 1

Job Function: Information Technology
Job Family: Business Partnering
Years: 1-2 Years
Experience Description: Experience engaging directly with a client-facing team on their technology requirements would be advantageous.

Behavioural Competencies

Behavioural competency 1*

Competency Label: Exploring Possibilities
Competency Description: Exploring possibilities is about individuals being effective at displaying behaviours associated with different situations or problems. Individuals are required to look at a problem and define it in an abstract manner. “Unpacking” a problem in terms of its underlying principles and basing the problem on sound theory typically allows for deeper insight into the true nature of the problem. This makes the nature of the problem more complete, more meaningful and therefore longer term sustainable solutions more likely.  

Behavioural competency 2*

Competency Label: Providing Insights
Competency Description: This dimension is about providing insight with regards to aspects that are likely to have an impact on the organisation. It is about making it clear to others what the implications of internal and external organisational environmental factors and processes are on the competitive position of the organisation. “Providing Insights” should be done with a focus on improving the situation.

Behavioural competency 3

Competency Label: Adopting Practical Approaches
Competency Description: Adopting practical solutions with an emphasis on learning by doing. This competency requires individuals to utilise common sense when required. Ultimately, this competency is important in order to ensure that organisations implement feasible solutions.

Behavioural competency 4

Competency Label: Examining Information
Competency Description: This competency serves to aid effective problem solving and requires being effective at probing and analysing situations efficiently and accurately. This competency is important because without sufficient analysis, effective solutions become less probable. In addition, poor analysis makes it more likely that individuals become confused and anxious, bored, error prone or overwhelmed by detail, which also impacts negatively on successful problem solving.

Behavioural competency 5

Competency Label: Interpreting Data
Competency Description: This competency is about interpreting data accurately with an emphasis on the processing and interpretation of numbers. This competency also includes the utilisation of technology.

Behavioural competency 6

Competency Label: Showing Composure
Competency Description: This is about the extent to which individuals can remain calm under pressure and maintain poise before and during important events. As such, the competency addressed in this document is concerned with the extent to which individuals show behaviours that lead to the effective handling of pressurised situations. 

Behavioural competency 7

Competency Label: Checking Details
Competency Description: This competency is concerned with the careful checking and confirmation of details in a task. Another behaviour associated with the “Checking Details” competency is being accurate. Being accurate requires individuals to have a strong quality orientation as well as to be thorough and detailed in their approach when completing tasks in order to avoid making mistakes.

Behavioural competency 8

Competency Label: Directing People
Competency Description: This competency emphasises the “leading” or “giving direction” part of leadership. The effective display of the “Leading People” competency is highly dependent on the effective display of a number of other competencies. Leading people is about taking control of as well as coordinating people and resources. While there are many different views on what leadership is, in this case, the concern is not focused on what leadership is, but is rather focused on the generic behaviour associated with leading people.

Technical Competencies

Technical competency 1*

 

 

Competency Label: Infrastructure/Platforms
Competency Description: Enterprise computing infrastructure support and maintenance provision.
Proficiency Level: SEASONED - Applies concepts without requiring supervision, able to provide technical guidance when required

Technical competency 2*

 

Competency Label: Business Continuity Management
Competency Description: Refers to the knowledge and experience required to ensure provision of service continuity planning and support.
Proficiency Level: SEASONED - Applies concepts without requiring supervision, able to provide technical guidance when required

Technical competency 3

 

 

Competency Label: Information Security
Competency Description: The management of, and provision of expert advice on, the selection, design, justification, implementation and operation of information security controls and management strategies to maintain the confidentiality, integrity, availability, accountability and relevant compliance of information systems.
Proficiency Level: ADVANCED - Mastered the concept, able to act independently, provides guidance and training to others

Technical competency 4

 

Competency Label: Knowledge of Banking & Financial Services business
Competency Description: Knowledge of business concepts, entities (definition, ownership, use, semantics and syntax) specific to Banking & Financial Services industry.
Proficiency Level: PROFICIENT - Clear knowledge and application of the concept

Leadership Competencies (for jobs in Levels of Work 3 to 7)

Leadership Competency 1

Competency Label: Purposeful Collaboration
Competency Description: Understands and leverages the dependencies across the organisation and the impact of own actions on the rest of the organisation to create organisation alignment for decision-making and delivery of quality outcomes.
Proficiency Level Description: 1 Identifies functions that need to be engaged; Knows which other functions will be affected by own plans. Includes the smallest effective number of people in the decision-making process.

Additional Job Dimensions

Business accountability: Impact on end result*

Shared - Jointly accountable with peers in our outside immediate department

Description or examples: Hardware/software upgrades, redundancy, IT infrastructure/security are developed in collaboration with group and vendor counterparts.

Internal relationships*

Business area: Business areas that use the PC’s, Servers and Networks in the supported portfolio
Job: Employees and line managers
Nature of relationship: Contribute to their service delivery
Sphere of influence: Limited to their department only
Description or examples: Engaging on hardware or network issues that could affect their ability to work or their clients.

Business area: Group technology teams
Job: Production support colleagues
Nature of relationship: Provide and receive a service
Sphere of influence: Impact the whole functional area
Description or examples: Collaborate on new developments, escalating issues on group connectivity or hardware issues.

External relationships*

Role type of external contact: Security Officers/Manager at Group level
Nature of relationship: Manage the relationship
Description or examples: Regular proactive engagement to ensure that the standard of service provision is as expected and to allow easy access to the right resources for IT security incident resolution.

Accountability for problem solving*

Degree of guidance received to solve problems:
Clearly Defined - Policies, principles, readily available direction
Description or examples: Group policies and standard operating procedures define the way the data centre, hardware, telephony and networks need to be maintained and governed, but the local installations are locally owned and the job holder will have to apply the policies in a local context.

Degree of original thought required to solve problems:

Variable - Differing situations within boundaries of experience

Description or examples: Issues and incidents will vary.

Accountability for planning of activities*

Integration of functions that are similar

Description or examples: The role holder is accountable for oversight of the end to end IT infrastructure support.

Discretion allowed for decision making*

Regulated - Closely defined procedures, manager review of progress and results

Description or examples:  Processes and policies are defined.

Work environment*

Working Conditions 1: Night work may be required
Working Conditions 2: Rest of Africa travel may be required
Physical Requirements: No specific physical requirements       

III. COMMENT POSTULER ?

Les personnes intéressées sont priées d’adresser leurs candidatures par e-mail à l’adresse électronique info@standardbank.cd en reprenant l’intitulé du poste en objet de leur e-mail au plus tard le 12 mai 2023 à 17h00’.

Les dossiers doivent comprendre uniquement une lettre de motivation ainsi qu’un Curriculum Vitae détaillé à jour (en Français et en Anglais) renseignant les numéros de téléphone et adresses e-mails d’au moins trois personnes de référence.

Seuls les candidats de nationalité congolaise remplissant les critères susmentionnés seront considérés pour la suite du processus. Les candidatures féminines sont vivement encouragées et la maîtrise de l’anglais oral et écrit sera un élément déterminant dans la sélection des profils.

 

La Direction des Ressources Humaines

Kinshasa
https://www.mediacongo.net/pics/mediacongo.png
2024-07-19
Recherche
  Home Actualités Petites annonces Offres d’emploi Appels d’offres Publireportages C'est vous qui le dites Medias & tendances Immobilier Recherche Contact



Infos congo - Actualités Congo - Premier-BET - 01 juillet
mediacongo
 
Retour à la liste

OFFRE D'EMPLOI


IT Security Officer

Publiée le 18/04/2023 | Réf. MCN : OEM35090
Ajouter aux favoris
Lieu

Kinshasa

Organisme

Standard Bank RDC

Description

OFFRE D’EMPLOI N° 001/SB-RDC/KIN/2023

 

TITRE DU POSTE

: IT Security Officer

DEPARTEMENT

: Information Technology

LIEU D’AFFECTATION

: Kinshasa

TYPE DE CONTRAT

: CDI assorti d’une période d’essai de 3 mois

A PROPOS DE STANDARD BANK

Standard Bank RDC fait partie du plus grand groupe bancaire de l’Afrique en termes de capitalisation boursière dont le siège se situé à Johannesburg. Présente dans 38 pays dont 18 en Afrique, c’est depuis 1992 qu’elle opère au Congo à la suite de l’acquisition d’ANZ Grindlays Zaire qui existait dans le pays depuis 1973.

Standard Bank RDC offre une gamme variée de produits et services par le truchement de ses diverses branches à travers la RDC via un réseau des intermédiaires (banques correspondantes). Nous avons développé une expertise dans la prestation des services liés aux besoins des entreprises minières, multinationales, Nations-Unies et autres organisations internationales opérant en République Démocratique du Congo.

Nos équipes allient leur connaissance approfondie sur les conditions et déterminants du marché en RDC à l’expertise du Groupe Standard Bank opérant dans les marchés émergeants aux fins de développement des solutions sur mesure répondant aux besoins de la clientèle.

I. JOB DESCRIPTION

Links to structures

Job function*

Information Technology

Job family*

Technology Risk & IT Security Management

Job reports to*

Manager IT Security, Governance, Risk and Compliance

Career type*

Functional/Specialist

Contribution

Job purpose description*

 

 

To provide IT security services to the IT Department/Bank and in so doing ensure that all IT security policies and controls are in place for adequate logical and physical access as per Group guidelines. To review all user access requests in conjunction with Production/Application Teams prior to the granting thereof. To follow-up on all audit issues and provide guidance, supervision and assistance in BCM and DR operations/exercises.

Job criticality

Strategically Critical

Key responsibilities*

Output group 1*

Oversee IT security management for the Bank from a technological perspective

Outputs and measures*

  • Working within group standards, ensure that all IT security policies and controls are in place for both logical and physical access.
  • Monitor full adherence to Group security practices/protocols/standards/guidelines as well as industry practices and best practices.
  • Check that all local country IT security requirements are updated/incorporated into and aligned to Group IT security guidelines
  • Check all Patch deployment is up to date
  • Check that Bank’s IT equipment is properly maintained by overseeing the loading of patches, firmware upgrades etc. Ensure that intrusion prevention and detection systems are in place.
  • Report and track security breaches and ensure that any known and substantive security gaps are dealt with swiftly.
  • Analyze critical vulnerabilities and come up with plans/actions to address security issues in the short and long run as needed. Plan relevant penetration testing and other security initiatives throughout the year.
  • Engage and engagement and collaborate consistently with IT team, CIO and Group/Regional Security Officers to identify/mitigate risk and constantly increase on country’s security posture.
  • Review Security policy as directed by CIO.
  • Supervise the technical testing of new systems, applications and/or infrastructure from a security perspective. Make recommendations to the CIO on the security readiness as part of the go/no-go decision process
  • Review all user access requests in conjunction with Production/Application teams.
  • On a periodic basis, extract and review existing users access control lists from all systems
  • Perform IT Risk assessments for existing/new Hardware and software
  • Checkl Antivirus versions are up to date and that antivirus management and distribution servers are fully functional
  • Escalate any security failures or breaches immediately. Log the incident reports, participate in the investigations and work on the remedial actions to prevent recurrence.
  • Drive awareness campaign to sensitize staff on all security aspects relating to technology.
  • Participate in business discussions around all topics relating to IT security. 

 

Output group 2*

User access management

Outputs and measures*

  • Review all user access requests in conjunction with Production/Application teams.
  • On a periodic basis, extract and review existing users access control lists from all systems
  • Liaise with respective colleagues/departments for appropriate periodic review of all user access rights and manage any remediation thereof.

 

Output group 3*

Manage Disaster Recovery Planning

Outputs and measures*

  • Manage the IT Disaster Recovery Plan and update as necessary
  • Coordinate DR/BCM testing at least twice a year in conjunction with other units within IT / Bank
  • Regularly and proactively engage with other BCM manager/co-ordinators/alternates to ensure the IT services at DR site are adequate to enable the business to function in case of disaster.

 

Output group 4

Manage the resolution of audit findings

Outputs and measures

  • Track, review and manage the resolution of Audit findings in conjunction with CIO.

 

Output group 5

Key Performance measures

Outputs and measures

  • Monitor number of outstanding Audit issues
  • Update DRP/BCM to be completed twice a year
  • Testing of DRP/BCM to be done at least twice a year
  • Monitor number of IT security breaches
  • Comply with Group IT security guidelines

 

II. REQUIREMENTS

Qualifications

Formal minimum qualification 1*

Type of qualification: First Degree
Field of study: IT and Computer Sciences

Other qualifications, certifications or professional memberships

ITIL Foundation Certification

Experience

Experience required*

Job Function: Information Technology
Job Family: IT Security
Years: 3-4 Years
Experience Description: Experience in IT Security / Auditing in a multi-system environment.

Experience preferred 1

Job Function: Information Technology
Job Family: Business Partnering
Years: 1-2 Years
Experience Description: Experience engaging directly with a client-facing team on their technology requirements would be advantageous.

Behavioural Competencies

Behavioural competency 1*

Competency Label: Exploring Possibilities
Competency Description: Exploring possibilities is about individuals being effective at displaying behaviours associated with different situations or problems. Individuals are required to look at a problem and define it in an abstract manner. “Unpacking” a problem in terms of its underlying principles and basing the problem on sound theory typically allows for deeper insight into the true nature of the problem. This makes the nature of the problem more complete, more meaningful and therefore longer term sustainable solutions more likely.  

Behavioural competency 2*

Competency Label: Providing Insights
Competency Description: This dimension is about providing insight with regards to aspects that are likely to have an impact on the organisation. It is about making it clear to others what the implications of internal and external organisational environmental factors and processes are on the competitive position of the organisation. “Providing Insights” should be done with a focus on improving the situation.

Behavioural competency 3

Competency Label: Adopting Practical Approaches
Competency Description: Adopting practical solutions with an emphasis on learning by doing. This competency requires individuals to utilise common sense when required. Ultimately, this competency is important in order to ensure that organisations implement feasible solutions.

Behavioural competency 4

Competency Label: Examining Information
Competency Description: This competency serves to aid effective problem solving and requires being effective at probing and analysing situations efficiently and accurately. This competency is important because without sufficient analysis, effective solutions become less probable. In addition, poor analysis makes it more likely that individuals become confused and anxious, bored, error prone or overwhelmed by detail, which also impacts negatively on successful problem solving.

Behavioural competency 5

Competency Label: Interpreting Data
Competency Description: This competency is about interpreting data accurately with an emphasis on the processing and interpretation of numbers. This competency also includes the utilisation of technology.

Behavioural competency 6

Competency Label: Showing Composure
Competency Description: This is about the extent to which individuals can remain calm under pressure and maintain poise before and during important events. As such, the competency addressed in this document is concerned with the extent to which individuals show behaviours that lead to the effective handling of pressurised situations. 

Behavioural competency 7

Competency Label: Checking Details
Competency Description: This competency is concerned with the careful checking and confirmation of details in a task. Another behaviour associated with the “Checking Details” competency is being accurate. Being accurate requires individuals to have a strong quality orientation as well as to be thorough and detailed in their approach when completing tasks in order to avoid making mistakes.

Behavioural competency 8

Competency Label: Directing People
Competency Description: This competency emphasises the “leading” or “giving direction” part of leadership. The effective display of the “Leading People” competency is highly dependent on the effective display of a number of other competencies. Leading people is about taking control of as well as coordinating people and resources. While there are many different views on what leadership is, in this case, the concern is not focused on what leadership is, but is rather focused on the generic behaviour associated with leading people.

Technical Competencies

Technical competency 1*

 

 

Competency Label: Infrastructure/Platforms
Competency Description: Enterprise computing infrastructure support and maintenance provision.
Proficiency Level: SEASONED - Applies concepts without requiring supervision, able to provide technical guidance when required

Technical competency 2*

 

Competency Label: Business Continuity Management
Competency Description: Refers to the knowledge and experience required to ensure provision of service continuity planning and support.
Proficiency Level: SEASONED - Applies concepts without requiring supervision, able to provide technical guidance when required

Technical competency 3

 

 

Competency Label: Information Security
Competency Description: The management of, and provision of expert advice on, the selection, design, justification, implementation and operation of information security controls and management strategies to maintain the confidentiality, integrity, availability, accountability and relevant compliance of information systems.
Proficiency Level: ADVANCED - Mastered the concept, able to act independently, provides guidance and training to others

Technical competency 4

 

Competency Label: Knowledge of Banking & Financial Services business
Competency Description: Knowledge of business concepts, entities (definition, ownership, use, semantics and syntax) specific to Banking & Financial Services industry.
Proficiency Level: PROFICIENT - Clear knowledge and application of the concept

Leadership Competencies (for jobs in Levels of Work 3 to 7)

Leadership Competency 1

Competency Label: Purposeful Collaboration
Competency Description: Understands and leverages the dependencies across the organisation and the impact of own actions on the rest of the organisation to create organisation alignment for decision-making and delivery of quality outcomes.
Proficiency Level Description: 1 Identifies functions that need to be engaged; Knows which other functions will be affected by own plans. Includes the smallest effective number of people in the decision-making process.

Additional Job Dimensions

Business accountability: Impact on end result*

Shared - Jointly accountable with peers in our outside immediate department

Description or examples: Hardware/software upgrades, redundancy, IT infrastructure/security are developed in collaboration with group and vendor counterparts.

Internal relationships*

Business area: Business areas that use the PC’s, Servers and Networks in the supported portfolio
Job: Employees and line managers
Nature of relationship: Contribute to their service delivery
Sphere of influence: Limited to their department only
Description or examples: Engaging on hardware or network issues that could affect their ability to work or their clients.

Business area: Group technology teams
Job: Production support colleagues
Nature of relationship: Provide and receive a service
Sphere of influence: Impact the whole functional area
Description or examples: Collaborate on new developments, escalating issues on group connectivity or hardware issues.

External relationships*

Role type of external contact: Security Officers/Manager at Group level
Nature of relationship: Manage the relationship
Description or examples: Regular proactive engagement to ensure that the standard of service provision is as expected and to allow easy access to the right resources for IT security incident resolution.

Accountability for problem solving*

Degree of guidance received to solve problems:
Clearly Defined - Policies, principles, readily available direction
Description or examples: Group policies and standard operating procedures define the way the data centre, hardware, telephony and networks need to be maintained and governed, but the local installations are locally owned and the job holder will have to apply the policies in a local context.

Degree of original thought required to solve problems:

Variable - Differing situations within boundaries of experience

Description or examples: Issues and incidents will vary.

Accountability for planning of activities*

Integration of functions that are similar

Description or examples: The role holder is accountable for oversight of the end to end IT infrastructure support.

Discretion allowed for decision making*

Regulated - Closely defined procedures, manager review of progress and results

Description or examples:  Processes and policies are defined.

Work environment*

Working Conditions 1: Night work may be required
Working Conditions 2: Rest of Africa travel may be required
Physical Requirements: No specific physical requirements       

III. COMMENT POSTULER ?

Les personnes intéressées sont priées d’adresser leurs candidatures par e-mail à l’adresse électronique info@standardbank.cd en reprenant l’intitulé du poste en objet de leur e-mail au plus tard le 12 mai 2023 à 17h00’.

Les dossiers doivent comprendre uniquement une lettre de motivation ainsi qu’un Curriculum Vitae détaillé à jour (en Français et en Anglais) renseignant les numéros de téléphone et adresses e-mails d’au moins trois personnes de référence.

Seuls les candidats de nationalité congolaise remplissant les critères susmentionnés seront considérés pour la suite du processus. Les candidatures féminines sont vivement encouragées et la maîtrise de l’anglais oral et écrit sera un élément déterminant dans la sélection des profils.

 

La Direction des Ressources Humaines

right
Emploi suivant Avocat
left
Emploi précédent Chauffeurs
Infos congo - Actualités Congo - RawBank_240113 - Inter Infos congo - Actualités Congo - ECOBANK 28 mai 2024 Infos congo - Actualités Congo - IMC Inter - GooglePlay - 280524 - 02 Infos congo - Actualités Congo - Katesha Inter - 28052024 Infos congo - Actualités Congo - Congo Biz-Up 28 mai 2024


Ils nous font confiance