Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

Oops! It seems this job from Kenya Revenue Authority (KRA) has expired
View current and similar jobs below
  • Posted: Feb 10, 2021
    Deadline: Feb 18, 2021
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Want to get a job fast? Signup and complete your profile on MyJobMag. Employers will find you 4x faster with a complete profile. You can download your completed profile anytime

    The Kenya Revenue Authority (KRA) was established by an Act of Parliament, Chapter 469 of the laws of Kenya , which became effective on 1st July 1995 . The Authority is charged with the responsibility of collecting revenue on behalf of the Government of Kenya. A Board of Directors, consisting of both public and private sector experts, makes policy decisio...
    Read more about this company

     

    Officer, IT Security Operations & Incidence Response

    Job Summary:

    • The job holder is responsible for ensuring IT infrastructure security by carrying out vulnerability assessments, identify security gaps, ensure that the network, databases, business systems and services comply with the approved policy, best practice, security requirements and set minimum baseline standards. 
    • Monitoring the IT infrastructure and supporting investigation of security breaches and incidence response and perform security Impact analysis in the change process. Configure security policies and rules on the security tools such as Firewalls, SIEM, PAM, SOAR etc

    Key Responsibilities: 

    Roles and responsibility

    • Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms in order to identify and mitigate potential (or active) threats, intrusions, and/or compromises
    • Provide timely detection, identification and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
    • Identify false-positives and false-negatives from the alerting
    • Create and test new alerting opportunities based on analytical methods like anomaly detection, or to detect malicious techniques
    • Correlate incident data to identify specific vulnerabilities and make recommendations to enable expeditious remediation
    • Identification, analysis, containment, eradication and recovery of security incidents; perform deep-dive incident analysis by correlating data from various sources.
    • Document event analysis and write comprehensive reports of incident investigations
    • Escalates cyber security events according to the Authority’s Cyber Security Incident Response Plan
    • Provide actionable strategic, technical, and tactical cyber information and intelligence to management through reports, briefings, and presentations
    • Create, test and document new alerting opportunities based on analytical methods like anomaly detection, or detection of malicious techniques to ensure enhanced detection
    • Participate in education and awareness within the organization
    • Identify and monitor the Tactics, Techniques, and Procedures used by cyber threat actors by analyzing raw intelligence and data.
    • Conduct various types of social media and background investigations; utilizing social media research, public record research and third party databases to build leads and assist with investigations.
    • Monitor and gather threat intelligence from the deep web and dark web for potential threats and incidents, and analyze such threats and risks and recommend appropriate mitigating measures.
    • Make analytical predictions about cyber criminals and their future activities based on what is already known about them
    • Effectively recognize threats by performing relevant research and data analysis using both internal and external tools and resources

    Academic Qualifications       

    • Bachelor’s degree in Computer Science or a related field.
    • Post graduate qualification (diploma or MSc.) in related field is an added advantage.

    Professional Qualifications    

    • Certification in any of the following or equivalent:
    • CEH,  CHIF, CISSP or equivalent
    • Web Applications Security, Network security or equivalent
    • Boot camp (CEH, Ninja Ethical hacking) with experience
    • Certificates in CCNA, Developer, DBA/Server/ system/network Administration
    • Boot camp (CEH, Ninja Ethical hacking) with experience
    • Cyber Security: Digital forensic, malware analysis
    • Certificates in Penetration testing, vulnerability Assessment

    Relevant Work Experience Required

    • At least three (3) years’ security experience in a medium to large organization.
    • Experience in cyber security monitoring
    • Experience in vulnerability Assessment and penetration testing
    • Experience in the configuration of any of the following security tools; firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management
    • Experience security Incidents response
    • Good command of SQL language
    • Good command of unix/linux/windows
    • Broad-based IT experience with technical knowledge of Networks, virtualization, Hardware, Storage, Operating systems, and Applications, Business Impact Analysis, RTO/RPO
    • Up-to-date understanding of emerging trends in information security and apply new techniques and trends, in-line with overall information security objectives and risk tolerance.

    Skills Required:          

    • Knowledge in IT risk management
    • Basic Computer forensics and investigation skills
    • Security requirements analysis skills
    • A sound understanding of network, applications and data security
    • Excellent understanding of security processes and technologies including Security Monitoring, Malware Analysis, Vulnerability Assessment and Threat Intelligence.
    • Broad understanding of security techniques and technologies including Intrusion Detection, Sandbox, Proxy & URL filtering, Threat Analysis & Intelligence Fusion
    • Experience in Host and Network Intrusion Detection systems and knowledge of log analysis tools and techniques
    • An understanding of the security mechanisms associated with Windows or Unix operating systems, switched networks, applications and databases
    • Familiar with current malware trends and anti-malware solutions

    Key Competencies/ Personal Attributes:       

    • Ability to work concisely when under pressure and for long hours.
    • Analytical skills
    • Keen attention to details
    • Analytical and problem-solving abilities
    • Team player
    • Highly self-motivated and directed

    Note:

    1. All applications from interested and qualified candidates must be submitted online via the process below.
    2. ONLY shortlisted candidates will be contacted.
    3. All applications should be submitted online by 18th February 2021.
    4. KRA is an equal opportunity employer committed to gender and disability mainstreaming. Persons with Disability are encouraged to apply.
    5. KRA does not charge for application, processing, interviewing or any other fee in connection with our recruitment process.

    Method of Application

    Interested and qualified? Go to Kenya Revenue Authority (KRA) on www.kra.go.ke to apply

    Learn how to get a job in any industry you want. Read 72 Hours to The Job You Love

  • Send your application

    Back To Home View All Vacancies at Kenya Revenue Authority (KRA)
Never miss a job with our real-time & personalized push notification
Subscribe Now
Average Salary at Kenya Revenue Authority (KRA)
KSh 71K from 35 employees
Mysalaryscale.com

Career Advice

View All Career Advice

Subscribe to Job Alert

 

Join our happy subscribers

This website uses cookies to improve your experience. By using this site you agree to the storing of cookies on your device to enhance navigation, analyze site usage, and assist in our marketing efforts. To learn more, see our Cookie Policy. Accept and Close
 
 
 
Send your application through

Yahoomail Gmail Hotmail