Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Software Project Manager At Pesapal

Role DescriptionThis is a full-time on-site role for a Software Project Manager based in Nairobi County, Kenya. The Software Project Manager will be responsi...


From Pesapal - Nairobi Area

Published a month ago

Network Administrator At Safaricom Kenya

JOB DESCRIPTIONReporting to theManager – IT Networksthe position holder will Provide technical expertise, design and support to Safaricom in the field of Cal...


From Safaricom Kenya - Nairobi Area

Published a month ago

Devops Engineer At Tezza Business Solutions Ltd

Responsibilities/ AccountabilitiesDefining and setting up development, test, release, update, and support processes for DevOps operations.Designing and imple...


From Tezza Business Solutions Ltd - Nairobi Area

Published a month ago

Program Technology And Infrastructure Manager At African Agricultural Technology Foundation

The Program Technology and Infrastructure Lead/ Manager will establish strategy and manage the organisation's IT infrastructure, with a focus on system admin...


From Ion - Nairobi Area

Published a month ago

Officer - It Security Operations & Incidence Response (Ict)

Officer - It Security Operations & Incidence Response (Ict)
Company:

Kenya Revenue Authority (Kra)


Details of the offer

The jobholder is responsible for:
Ensuring IT infrastructure security by carrying out vulnerability assessments, identify security gaps, ensure that the network, databases, business systems and services comply with the approved policy, best practice, security requirements and set minimum baseline standards.

Monitoring the IT infrastructure and supporting investigation of security breaches and incidence response, and perform security impact analysis in the change process.

Configuring security policies and rules on the security tools such as Firewalls, SIEM, PAM, SOAR etc

Academic Qualifications
Bachelor’s degree in Computer Science, Management Information Systems, Information Technology, Electrical / Electronic Engineering, Telecommunications or any other related field.

Professional Qualifications
Certification in any of the following or equivalent:

CEH, CHIF, CISSP or equivalent

Web Applications Security, Network security or equivalent

Boot camp (CEH, Ninja Ethical Hacking) with experience

Certificates in CCNA, Developer, DBA/System/Network Administration

Cyber Security: Digital forensic, malware analysis

Certificates in Penetration Testing, Vulnerability Assessment

Relevant Work Experience Required
At least one (1) year’ security experience in a medium to large organization.

Experience in cyber security monitoring

Experience in vulnerability Assessment and penetration testing

Experience in the configuration of any of the following security tools; firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management

Experience security incidents response

Good command of SQL language

Good command of Unix/Linux/Windows

Broad-based IT experience with technical knowledge of Networks, virtualization, Hardware, Storage, Operating systems, and Applications, Business Impact Analysis, RTO/RPO

Up-to-date understanding of emerging trends in information security and apply new techniques and trends, in-line with overall information security objectives and risk tolerance.

Skills Required:
Knowledge in IT risk management

Basic Computer forensics and investigation skills

Security requirements analysis skills

A sound understanding of network, applications and data security

Key Competencies/ Personal Attributes:
Analytical skills

Keen attention to details

analytical and problem-solving abilities

Team player

Highly self-motivated and directed

Responsibilities

Carry out vulnerability assessments on network, databases, business systems and services using various tools and personal knowledge.

Ensure compliance with the approved policy, best practice, security requirements and set minimum baseline standards

Develop system security requirements for the various systems at acquisition/development and carry out security tests on the systems before deployments

Identify and recommend and configure suitable tools to enhance Information systems security.

Monitor systems and applications for security issues, vulnerabilities and recommend remediation including patching and upgrades, rules updates

Configure security policies and rules on firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management solutions

Investigate security breaches and other cyber security incidents.

Perform security Impact analysis in the change process.

Document and research security breaches and assess any damage caused

Perform malware analysis and digital forensic

Job Requirements
Required education
: Bachelor's degree

Required relevant work experience
: 12 months

Required languages:
English (Spoken: fluent | Written: fluent)
Want to see how you rank against other applicants?
Get detailed analysis on Fuzu Instant Feedback
YouVS
Sign up to learn more


Source: Fuzu

Requirements


Knowledges:
Officer - It Security Operations & Incidence Response (Ict)
Company:

Kenya Revenue Authority (Kra)


Built at: 2024-05-05T18:40:27.951Z