Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 19, 2020
    Deadline: Feb 29, 2020
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    The Kenya Revenue Authority (KRA) was established by an Act of Parliament, Chapter 469 of the laws of Kenya , which became effective on 1st July 1995 . The Authority is charged with the responsibility of collecting revenue on behalf of the Government of Kenya. A Board of Directors, consisting of both public and private sector experts, makes policy decisio...
    Read more about this company

     

    Officer - IT Security Operations & Incidence Response (ICT)

    Grade:                                     KRA ‘3’

    Department:                           Corporate Support Services

    Division:                                  Information and Communication Technology

    Supervisor:                             Supervisor – IT Security Operations

    Supervisee:                             None

    Job Summary:

    The jobholder is responsible for:

    • Ensuring IT infrastructure security by carrying out vulnerability assessments, identify security gaps, ensure that the network, databases, business systems and services comply with the approved policy, best practice, security requirements and set minimum baseline standards.  
    • Monitoring the IT infrastructure and supporting investigation of security breaches and incidence response, and perform security impact analysis in the change process.
    • Configuring security policies and rules on the security tools such as Firewalls, SIEM, PAM, SOAR etc

    Key Responsibilities: 

    Roles and responsibility

    1. Carry out vulnerability assessments on network, databases, business systems and services using various tools and personal knowledge.
    2. Ensure compliance with the approved policy, best practice, security requirements and set minimum baseline standards
    3. Develop system security requirements for the various systems at acquisition/development and carry out security tests on the systems before deployments
    4. Identify and recommend and configure suitable tools to enhance Information systems security.
    5. Monitor systems and applications for security issues, vulnerabilities and recommend remediation including patching and upgrades,  rules updates
    6. Configure  security policies and rules on  firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management solutions
    7. Investigate security breaches and other cyber security incidents.
    8.  Perform security Impact analysis in the change process.
    9. Document and research security breaches and assess any damage caused
    10. Perform malware analysis and digital forensic

    Academic Qualifications        

    • Bachelor’s degree in Computer Science, Management Information Systems, Information Technology, Electrical / Electronic Engineering, Telecommunications or any other related field.

    Professional Qualifications    

    • Certification in any of the following or equivalent:
    • CEH,  CHIF, CISSP or equivalent
    • Web Applications Security, Network security or equivalent
    • Boot camp (CEH, Ninja Ethical Hacking) with experience
    • Certificates in CCNA, Developer, DBA/System/Network Administration
    • Cyber Security: Digital forensic, malware analysis
    • Certificates in Penetration Testing, Vulnerability Assessment

    Relevant Work Experience Required

    1. At least one (1) year’ security experience in a medium to large organization.
    2. Experience in cyber security monitoring
    3. Experience in vulnerability Assessment and penetration testing
    4. Experience in the configuration of any of the following security tools; firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management
    5. Experience security incidents response
    6. Good command of SQL language
    7. Good command of Unix/Linux/Windows
    8. Broad-based IT experience with technical knowledge of Networks, virtualization, Hardware, Storage, Operating systems, and Applications, Business Impact Analysis, RTO/RPO
    9. Up-to-date understanding of emerging trends in information security and apply new techniques and trends, in-line with overall information security objectives and risk tolerance.

    Skills Required:          

    • Knowledge in IT risk management
    • Basic Computer forensics and investigation skills
    • Security requirements analysis skills
    • A sound understanding of network, applications and data security

    Key Competencies/ Personal Attributes:       

    • Analytical skills
    • Keen attention to details
    • analytical and problem-solving abilities
    • Team player
    • Highly self-motivated and directed

     

    Method of Application

    Find out what Kenya Revenue Authority (KRA) pays their workers, the gender composition of their workers and skills they possess

    Interested and qualified? Go to Kenya Revenue Authority (KRA) on www.kra.go.ke to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Kenya Revenue Authority (KRA) Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail