This job listing has expired and may no longer be relevant!
4 Sep 2023

Networks & Security Officer at Kimisitu Sacco

Recruit candidates with Ease. 100% recruitment control with Employer Dashboard.
We have the largest Job seeker visits by alexa rankings. Post a Job

Resubmit your Resume Today. Click Here to Start

We have started building our professional LinkedIn page. Follow


Job Description

Kimisitu Sacco was formed in March 1985 by a group of Staff from ICRAF. The society was formed mainly to promote thrift among its members by affording them an opportunity for accumulating their savings; and to thereby create a source of funds from which loans can be made to them exclusively for provident and productive purposes, at fair and reasonable rates of interest; thereby enabling them to use and control their money for their mutual benefit. The Sacco’s founder members were: Dennis Wambugu (Chairman), Jane Waweru (Secretary), Simon Kanani, James Wahome Charity Kanyeki and Fred Gitau. Initially, there was no dedicated office for KIMISITU, elected officials operated from their respective employment offices and later moved to city centre in a shared office. Later the office returned to ICRAF Complex when the management of the latter agreed to provide office space at ICRAF House for the then two staff – The Manager and Accounts Clerk. In order to achieve a solid base for growth, Kimisitu opened membership to other international organizations. Among the first organizations to be admitted included IDRC, Ford Foundation and the Rockefeller Foundation consecutively in the formative years. The society has enjoyed tremendous success such that as at 31st December 2015 it had over 400 member organizations and over 7,000 individual members.

Position Summary

  • You will be responsible for information security design, implementation, optimization and maintenance of the Sacco network and telecommunications components, server infrastructure, endpoint devices and related hardware in line with business requirements and strategic priorities.

Main Responsibilities

  • Carry out internal and external penetration tests on the Saccos’s platforms.
  • Innovate and model new red teaming techniques for the security team.
  • Carry out awareness campaigns to staff and stakeholders on cyber security matters.
  • Collaborate with the information security functions to maintain records of all data assets and exports.
  • Produce accurate, interactive, digestible information security reports with associated mapping and dashboards.
  • Provide research, incident analysis and evaluation, presentation, and report production on a weekly basis.
  • Be part of a 24-hour active monitoring and analysis of the Sacco networks for malicious activity through Security Incident and Event Management (SIEM) reporting. Including responding to and investigating alerts, assisting with developing new security monitoring use cases, and ensuring all investigative activity is properly documented and followed up with relevant support teams.
  • Conduct proactive cyber threat research and analysis. Monitoring open-source intelligence sources for potential threats against the Sacco, and ensure appropriate defensive actions are taken with respect to these.
  • Analyze a variety of network and host-based security appliance logs (Firewalls, IPS, NIDS,
  • HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
  • Independently follow procedures to report, contain, analyze, and remediate security incidents.
  • Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances.
  • Offer first level ICT user support and administration of various Sacco systems.
  • Perform any other duty assigned from time to time.

Requirements

Qualifications & Experience

  • Bachelor’s degree in information technology, computer science or its equivalent.
  • Show competence in Cyber Security through CTFs or learning platforms.
  • At least three (3) years’ experience in system security and administration.
  • CISSP CISA/CISM/CEH/Certified SOC analyst (CSA)/Security+/Network+/CCNA/SSCP or other related certifications.
  • Technical knowledge of database, network, and operating system security.
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
  • Knowledge and experience using one or more tools related to SIEM, intrusion detection and prevention systems, network security managers, firewalls, and end point logging.
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
  • Strong written communication skills in report writing for incident reporting.
  • Knowledge of specific tools and languages such as Wireshark, PowerShell, Python and
  • SQL knowledge highly desirable.

Personal Attributes required for this role:

  • Excellent communication and interpersonal skills
  • Decision making and problem-solving skills
  • Innovation and creativity
  • Project management skills
  • Understanding and willingness to work in a diverse team that supports the ICT function.
  • Analytical mindset and the ability to organize and present information in a coherent and understandable manner.
  • Highly motivated and able to work independently.

Key Relationships:
Direct Reports to this Role:

  • None

Internal Contacts:

  • All department

External Contacts:

  • Service providers
  • Regulators
  • Members


Method of Application

Fill Data Form : Click Here

and submit your CV, copies of relevant documents and Application to  [email protected]
Use the title of the position as the subject of the email

Closing Date : 15 September. 2023





Subscribe


Apply for this Job