Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Intern At Koko Networks

Your Role:To lead customer service on behalf of KOKO Labs at the Connect Shop and support operations, logistics and warehousing in the test neighborhood and ...


From Koko Networks - Nairobi Area

Published a month ago

Insights, Data & Ai Lead At Kpmg

Leverage regional alliances with technology partners (e.g. Microsoft, Oracle, IBM, AWS, Google, etc.) to drive proactive leads generation, joint pitch, pipel...


From Kpmg - Nairobi Area

Published a month ago

Microsoft Dynamics 365 Solution Architect At Kpmg

Key roles and responsibilities:The main purpose of the role is to expand and build on KPMG's local capability to deliver end-to-end Microsoft D365 implementa...


From Kpmg - Nairobi Area

Published a month ago

Chauffeur At Classic Mouldings Limited

Key ResponsibilitiesFacilitating the movement of the CEOMaintaining professionalism, confidentiality of office, and discretion at all times.Running errands a...


From Classic Mouldings Limited - Nairobi Area

Published a month ago

Officer - It Security Operations & Incidence Response (Ict) At Kenya Revenue Authority (Kra)

Officer - It Security Operations & Incidence Response (Ict) At Kenya Revenue Authority (Kra)
Company:

Kenya Revenue Authority (Kra)


Details of the offer

Grade:KRA ‘3’
Department:Corporate Support Services
Division:Information and Communication Technology
Supervisor:Supervisor – IT Security Operations
Supervisee: None
Job Summary:
The jobholder is responsible for:
Ensuring IT infrastructure security by carrying out vulnerability assessments, identify security gaps, ensure that the network, databases, business systems and services comply with the approved policy, best practice, security requirements and set minimum baseline standards.
Monitoring the IT infrastructure and supporting investigation of security breaches and incidence response, and perform security impact analysis in the change process.
Configuring security policies and rules on the security tools such as Firewalls, SIEM, PAM, SOAR etc

Key Responsibilities:
Roles and responsibility
Carry out vulnerability assessments on network, databases, business systems and services using various tools and personal knowledge.
Ensure compliance with the approved policy, best practice, security requirements and set minimum baseline standards
Develop system security requirements for the various systems at acquisition/development and carry out security tests on the systems before deployments
Identify and recommend and configure suitable tools to enhance Information systems security.
Monitor systems and applications for security issues, vulnerabilities and recommend remediation including patching and upgrades, rules updates
Configure security policies and rules on firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management solutions
Investigate security breaches and other cyber security incidents.
Perform security Impact analysis in the change process.
Document and research security breaches and assess any damage caused
Perform malware analysis and digital forensic
Academic Qualifications
Bachelor’s degree in Computer Science, Management Information Systems, Information Technology, Electrical / Electronic Engineering, Telecommunications or any other related field.

Professional Qualifications
Certification in any of the following or equivalent:
CEH, CHIF, CISSP or equivalent
Web Applications Security, Network security or equivalent
Boot camp (CEH, Ninja Ethical Hacking) with experience
Certificates in CCNA, Developer, DBA/System/Network Administration
Cyber Security: Digital forensic, malware analysis
Certificates in Penetration Testing, Vulnerability Assessment

Relevant Work Experience Required
At least one (1) year’ security experience in a medium to large organization.
Experience in cyber security monitoring
Experience in vulnerability Assessment and penetration testing
Experience in the configuration of any of the following security tools; firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management
Experience security incidents response
Good command of SQL language
Good command of Unix/Linux/Windows
Broad-based IT experience with technical knowledge of Networks, virtualization, Hardware, Storage, Operating systems, and Applications, Business Impact Analysis, RTO/RPO
Up-to-date understanding of emerging trends in information security and apply new techniques and trends, in-line with overall information security objectives and risk tolerance.
Skills Required:
Knowledge in IT risk management
Basic Computer forensics and investigation skills
Security requirements analysis skills
A sound understanding of network, applications and data security

Key Competencies/ Personal Attributes:
Analytical skills
Keen attention to details
analytical and problem-solving abilities
Team player
Highly self-motivated and directed


Source: Myjobmag_Co

Requirements


Knowledges:
Officer - It Security Operations & Incidence Response (Ict) At Kenya Revenue Authority (Kra)
Company:

Kenya Revenue Authority (Kra)


Built at: 2024-04-26T08:12:38.270Z