Officer, IT Security Operations & Incidence Response

Other Jobs To Apply

No other job posts for this day.

<div class="blog-content"> <h2><strong>Job Summary:</strong></h2> <ul> <li>The job holder is responsible for ensuring IT infrastructure security by carrying out vulnerability assessments, identify security gaps, ensure that the network, databases, business systems and services comply with the approved policy, best practice, security requirements and set minimum baseline standards.</li> <li>Monitoring the IT infrastructure and supporting investigation of security breaches and incidence response and perform security Impact analysis in the change process. Configure security policies and rules on the security tools such as Firewalls, SIEM, PAM, SOAR etc</li> </ul> <h2><strong>Key Responsibilities: – IT Officer security operations</strong></h2> <h3><strong>Roles and responsibility</strong></h3> <ul> <li>Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms in order to identify and mitigate potential (or active) threats, intrusions, and/or compromises</li> <li>Provide timely detection, identification and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities</li> <li>Identify false-positives and false-negatives from the alerting</li> <li>Create and test new alerting opportunities based on analytical methods like anomaly detection, or to detect malicious techniques</li> <li>Correlate incident data to identify specific vulnerabilities and make recommendations to enable expeditious remediation</li> <li>Identification, analysis, containment, eradication and recovery of security incidents; perform deep-dive incident analysis by correlating data from various sources.</li> <li>Document event analysis and write comprehensive reports of incident investigations</li> <li>Escalates cyber security events according to the Authority’s Cyber Security Incident Response Plan</li> <li>Provide actionable strategic, technical, and tactical cyber information and intelligence to management through reports, briefings, and presentations</li> <li>Create, test and document new alerting opportunities based on analytical methods like anomaly detection, or detection of malicious techniques to ensure enhanced detection</li> <li>Participate in education and awareness within the organization</li> <li>Identify and monitor the Tactics, Techniques, and Procedures used by cyber threat actors by analyzing raw intelligence and data.</li> <li>Conduct various types of social media and background investigations; utilizing social media research, public record research and third party databases to build leads and assist with investigations.</li> <li>Monitor and gather threat intelligence from the deep web and dark web for potential threats and incidents, and analyze such threats and risks and recommend appropriate mitigating measures.</li> <li>Make analytical predictions about cyber criminals and their future activities based on what is already known about them</li> <li>Effectively recognize threats by performing relevant research and data analysis using both internal and external tools and resources</li> </ul> <h3><strong>Academic Qualifications</strong> – <strong>IT Officer security operations</strong></h3> <ul> <li>Bachelor’s degree in Computer Science or a related field.</li> <li>Post graduate qualification (diploma or MSc.) in related field is an added advantage.</li> </ul> <h4><strong>Professional Qualifications</strong></h4> <ul> <li>Certification in any of the following or equivalent:</li> <li>CEH,  CHIF, CISSP or equivalent</li> <li>Web Applications Security, Network security or equivalent</li> <li>Boot camp (CEH, Ninja Ethical hacking) with experience</li> <li>Certificates in CCNA, Developer, DBA/Server/ system/network Administration</li> <li>Boot camp (CEH, Ninja Ethical hacking) with experience</li> <li>Cyber Security: Digital forensic, malware analysis</li> <li>Certificates in Penetration testing, vulnerability Assessment</li> </ul> <h5><strong>Relevant Work Experience Required</strong></h5> <ul> <li>At least three (3) years’ security experience in a medium to large organization.</li> <li>Experience in cyber security monitoring</li> <li>Experience in vulnerability Assessment and penetration testing</li> <li>Experience in the configuration of any of the following security tools; firewall, SIEM , SOAR, PAM, anti-malware, IAM, Patch management</li> <li>Experience security Incidents response</li> <li>Good command of SQL language</li> <li>Good command of unix/linux/windows</li> <li>Broad-based IT experience with technical knowledge of Networks, virtualization, Hardware, Storage, Operating systems, and Applications, Business Impact Analysis, RTO/RPO</li> <li>Up-to-date understanding of emerging trends in information security and apply new techniques and trends, in-line with overall information security objectives and risk tolerance.</li> </ul> <h4><strong>Skills Required:   </strong></h4> <ul> <li>Knowledge in IT risk management</li> <li>Basic Computer forensics and investigation skills</li> <li>Security requirements analysis skills</li> <li>A sound understanding of network, applications and data security</li> <li>Excellent understanding of security processes and technologies including Security Monitoring, Malware Analysis, Vulnerability Assessment and Threat Intelligence.</li> <li>Broad understanding of security techniques and technologies including Intrusion Detection, Sandbox, Proxy & URL filtering, Threat Analysis & Intelligence Fusion</li> <li>Experience in Host and Network Intrusion Detection systems and knowledge of log analysis tools and techniques</li> <li>An understanding of the security mechanisms associated with Windows or Unix operating systems, switched networks, applications and databases</li> <li>Familiar with current malware trends and anti-malware solutions</li> </ul> <h5><strong>Key Competencies/ Personal Attributes – IT Officer security operations</strong></h5> <ul> <li>Ability to work concisely when under pressure and for long hours.</li> <li>Analytical skills</li> <li>Keen attention to details</li> <li>Analytical and problem-solving abilities</li> <li>Team player</li> <li>Highly self-motivated and directed</li> </ul> <h6><strong>Note:</strong></h6> <ol> <li>All applications from interested and qualified candidates must be submitted online via the process below.</li> <li>ONLY shortlisted candidates will be contacted.</li> <li>All applications should be submitted online by <strong>18th February 2021.</strong></li> <li>KRA is an equal opportunity employer committed to gender and disability mainstreaming. Persons with Disability are encouraged to apply.</li> <li>KRA does not charge for application, processing, interviewing or any other fee in connection with our recruitment process.</li> </ol> </div> <div class="item-page"> <div class="blog-content-wrapper"> <div class="blog-content"> <p class="font-weight-bold font-italic">If you experience any delay in receiving an email notification at the end of the e-recruitment registration process, please refresh your email. In case of any challenge, please send your query to isupporthr@kra.go.ke</p> <p class="font-weight-bold font-italic">Kenya Revenue Authority does not charge any fee at any stage of the recruitment process (application, shortlisting, interviewing, and/or offer)</p> </div> </div> </div> <p><a class="btn btn-style-2" href="" target="new" rel="noopener noreferrer">Apply Now</a></p> <p>The interview process does not have to be scary. <a href="">Here are some tips you can use to make sure that you make a good first impression.</a></p>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...