Networks and Security Officer
2026-03-03T11:00:22+00:00
Kimisitu DT Sacco
https://cdn.greatkenyanjobs.com/jsjobsdata/data/employer/comp_9567/logo/download%20(12).png
https://www.kimisitusacco.or.ke/
FULL_TIME
Nairobi
Nairobi
00100
Kenya
Finance
Computer & IT, Protective Services
2026-03-16T17:00:00+00:00
8
Job purpose:
Networks and Security Officer will be responsible for information security design, implementation, optimization and maintenance of the Sacco network and telecommunications components, server infrastructure, endpoint devices and related hardware in line with business requirements and strategic priorities.
Responsibilities or duties:
Key Duties & Responsibilities:
- Carry out internal and external penetration tests on Saccos’s platforms.
- Innovate and model new red teaming techniques for the security team.
- Carry out awareness campaigns to staff and stakeholders on cyber security matters.
- Collaborate with the information security functions to maintain records of all data assets and exports.
- Produce accurate, interactive, digestible information security reports with associated mapping and dashboards.
- Provide research, incident analysis and evaluation, presentation, and report production on a weekly basis.
- Be part of a 24-hour active monitoring and analysis of the Sacco networks for malicious activity through Security Incident and Event Management (SIEM) reporting. Including responding to and investigating alerts, assisting with developing new security monitoring use cases, and ensuring all investigative activity is properly documented and followed up with relevant support teams.
- Conduct proactive cyber threat research and analysis. Monitoring open-source intelligence sources for potential threats against Sacco, and ensure appropriate defensive actions are taken with respect to these.
- Analyze a variety of network and host-based security appliance logs (Firewalls, IPS, NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
- Independently follow procedures to report, contain, analyze, and remediate security incidents.
- Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances.
- Offer first level ICT user support and administration of various Sacco systems.
- Perform any other duty assigned from time to time.
Qualifications or requirements
Knowledge: Qualifications & Experience
- Bachelor’s degree in information technology, computer science or its equivalent.
- Show competence in Cyber Security through CTFs or learning platforms.
- CISSP CISA/CISM/CEH/Certified SOC analyst (CSA)/Security+/Network+/CCNA/SSCP or other related certifications.
- Technical knowledge of database, network, and operating system security.
- Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
- Knowledge and experience using one or more tools related to SIEM, intrusion detection and prevention systems, network security managers, firewalls, and end point logging.
- Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
- Strong written communication skills in report writing for incident reporting.
- Knowledge of specific tools and languages such as Wireshark, PowerShell, Python and SQL knowledge highly desirable.
Personal Attributes required for this role:
- Excellent communication and interpersonal skills
- Decision making and problem-solving skills
- Innovation and creativity
- Project management skills
- Understanding and willingness to work in a diverse team that supports the ICT function.
- Analytical mindset and the ability to organize and present information in a coherent and understandable manner.
- Highly motivated and able to work independently.
Experience needed:
At least three (3) years’ experience in system security and administration.
- Carry out internal and external penetration tests on Saccos’s platforms.
- Innovate and model new red teaming techniques for the security team.
- Carry out awareness campaigns to staff and stakeholders on cyber security matters.
- Collaborate with the information security functions to maintain records of all data assets and exports.
- Produce accurate, interactive, digestible information security reports with associated mapping and dashboards.
- Provide research, incident analysis and evaluation, presentation, and report production on a weekly basis.
- Be part of a 24-hour active monitoring and analysis of the Sacco networks for malicious activity through Security Incident and Event Management (SIEM) reporting. Including responding to and investigating alerts, assisting with developing new security monitoring use cases, and ensuring all investigative activity is properly documented and followed up with relevant support teams.
- Conduct proactive cyber threat research and analysis. Monitoring open-source intelligence sources for potential threats against Sacco, and ensure appropriate defensive actions are taken with respect to these.
- Analyze a variety of network and host-based security appliance logs (Firewalls, IPS, NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
- Independently follow procedures to report, contain, analyze, and remediate security incidents.
- Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances.
- Offer first level ICT user support and administration of various Sacco systems.
- Perform any other duty assigned from time to time.
- Excellent communication and interpersonal skills
- Decision making and problem-solving skills
- Innovation and creativity
- Project management skills
- Understanding and willingness to work in a diverse team that supports the ICT function.
- Analytical mindset and the ability to organize and present information in a coherent and understandable manner.
- Highly motivated and able to work independently.
- Technical knowledge of database, network, and operating system security.
- Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
- Knowledge and experience using one or more tools related to SIEM, intrusion detection and prevention systems, network security managers, firewalls, and end point logging.
- Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
- Strong written communication skills in report writing for incident reporting.
- Knowledge of specific tools and languages such as Wireshark, PowerShell, Python and SQL knowledge highly desirable.
- Bachelor’s degree in information technology, computer science or its equivalent.
- Show competence in Cyber Security through CTFs or learning platforms.
- CISSP CISA/CISM/CEH/Certified SOC analyst (CSA)/Security+/Network+/CCNA/SSCP or other related certifications.
JOB-69a6bf46548bd
Vacancy title:
Networks and Security Officer
[Type: FULL_TIME, Industry: Finance, Category: Computer & IT, Protective Services]
Jobs at:
Kimisitu DT Sacco
Deadline of this Job:
Monday, March 16 2026
Duty Station:
Nairobi | Nairobi
Summary
Date Posted: Tuesday, March 3 2026, Base Salary: Not Disclosed
Similar Jobs in Kenya
Learn more about Kimisitu DT Sacco
Kimisitu DT Sacco jobs in Kenya
JOB DETAILS:
Job purpose:
Networks and Security Officer will be responsible for information security design, implementation, optimization and maintenance of the Sacco network and telecommunications components, server infrastructure, endpoint devices and related hardware in line with business requirements and strategic priorities.
Responsibilities or duties:
Key Duties & Responsibilities:
- Carry out internal and external penetration tests on Saccos’s platforms.
- Innovate and model new red teaming techniques for the security team.
- Carry out awareness campaigns to staff and stakeholders on cyber security matters.
- Collaborate with the information security functions to maintain records of all data assets and exports.
- Produce accurate, interactive, digestible information security reports with associated mapping and dashboards.
- Provide research, incident analysis and evaluation, presentation, and report production on a weekly basis.
- Be part of a 24-hour active monitoring and analysis of the Sacco networks for malicious activity through Security Incident and Event Management (SIEM) reporting. Including responding to and investigating alerts, assisting with developing new security monitoring use cases, and ensuring all investigative activity is properly documented and followed up with relevant support teams.
- Conduct proactive cyber threat research and analysis. Monitoring open-source intelligence sources for potential threats against Sacco, and ensure appropriate defensive actions are taken with respect to these.
- Analyze a variety of network and host-based security appliance logs (Firewalls, IPS, NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
- Independently follow procedures to report, contain, analyze, and remediate security incidents.
- Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances.
- Offer first level ICT user support and administration of various Sacco systems.
- Perform any other duty assigned from time to time.
Qualifications or requirements
Knowledge: Qualifications & Experience
- Bachelor’s degree in information technology, computer science or its equivalent.
- Show competence in Cyber Security through CTFs or learning platforms.
- CISSP CISA/CISM/CEH/Certified SOC analyst (CSA)/Security+/Network+/CCNA/SSCP or other related certifications.
- Technical knowledge of database, network, and operating system security.
- Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
- Knowledge and experience using one or more tools related to SIEM, intrusion detection and prevention systems, network security managers, firewalls, and end point logging.
- Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
- Strong written communication skills in report writing for incident reporting.
- Knowledge of specific tools and languages such as Wireshark, PowerShell, Python and SQL knowledge highly desirable.
Personal Attributes required for this role:
- Excellent communication and interpersonal skills
- Decision making and problem-solving skills
- Innovation and creativity
- Project management skills
- Understanding and willingness to work in a diverse team that supports the ICT function.
- Analytical mindset and the ability to organize and present information in a coherent and understandable manner.
- Highly motivated and able to work independently.
Experience needed:
At least three (3) years’ experience in system security and administration.
Work Hours: 8
Experience in Months: 36
Level of Education: bachelor degree
Job application procedure
Interested in applying for this job? Click here to submit your application now.
The data form must be fully filled out. Incomplete forms will be disqualified. In addition, the applicants should send an application letter with a detailed CV by COB on Monday, 16th March 2026, bearing the subjectline “Debt Recovery Officer.” People with disabilities are encouraged to apply.
All Jobs | QUICK ALERT SUBSCRIPTION