Co-operative Bank of Kenya Latest Job Openings

Ongoing Recruitment UN Jobs 2023
Submit your CV now
details here

Software Engineering jobs, Computer Science jobs, Information Technology jobs, Business-related jobs,

IT Security Operations Centre Analyst (SOC)

The Role

Specifically, the successful jobholder will be required to:

  • Be part of a 24hr active monitoring and analysis of the Bank’s networks for malicious activity using Security Incident and Event Management (SIEM) toolsets. This will include responding to and investigating alerts, assisting with developing new security monitoring use cases, and ensuring all investigative activity is properly documented in the bank’s ticketing systems and followed up with relevant support teams.
  • Conduct proactive cyber threat and compromise research and analysis. Monitoring open-source intelligence sources for potential threats against the Bank, and ensure appropriate defensive actions are taken with respect to these.
  • Triage issues and escalate them to the ICT respective units and ensure that appropriate follow-up actions are taken to mitigate the exposure.
  • Document all activities during an incident and provide leadership with status updates during the life cycle of the incident.
  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the corrective or mitigation actions and escalation paths for each incident.
  • Independently follow procedures to contain, analyze, and eradicate malicious activity.
  • Be available, on-call, to rapidly troubleshoot any problems resulting from infrastructure changes, security breaches, or other unplanned/unforeseen circumstances.
  • Assist the ICT security team in developing and maintaining SoC documentation and processes.
  • Form part of the Bank’s security incident response team, assisting with whatever activities are deemed necessary by the incident leader.
  • Submit period and ad-hoc reports as required by HOD.

(NOTE: Win 100% Scholarship Get UN and NGO Jobs. 5 lucky winners. Join NOW for Free Get More Details Here.)

Skills, Competencies, and Experience

The successful candidate will be required to have the following skills and competencies:

  • Bachelor’s degree in Information technology, computer science, or any related field.
  • CISSP CISA/CISM/CEH or other related certifications.
  • 1+ years of experience as a security/network administrator or equivalent knowledge.
  • Technical knowledge of database, network, and operating systems security.
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
  • Knowledge of common internet protocols and applications and SQL knowledge is highly desirable.

Application & Infrastructure Security Officer

The Role

Specifically, the successful jobholder will be required to:

  • Develop and maintain a prioritized asset and applications register of all ICT assets in the bank.
  • Configure reviews across infrastructure devices, servers, and databases to ensure that a threat-aware approach to systems and infrastructure setup is adopted. 
  • Enforce policies, secure configurations, and rulesets that will enforce the protection of data and limit user access as appropriate. Ensure all bank systems are appropriately hardened to enforce the protection of data.
  • Enforce patch management across all enterprise systems. Ensure that all systems are regularly updated and report on discrepancies based on criticality.
  • Ensure firewalls, switches and other infrastructure are up to date and are running optimized security configurations and policies.
  • Conduct regular penetration testing exercises on the Bank’s infrastructure to ascertain the robustness of the security configurations and deployed tools in line with regulatory recommendations.
  • Certify all system configurations are secure and that adequate security controls are in place before any system goes live.  Act as the Change & Configuration Manager and work with technical teams, and service managers to ensure systems promoted to live are compliant to internal policy.
  • Coordinate and conduct red team tests with the SOC/risk team to assure on IOC (indicators of compromise) detection capabilities.
  • Communicate security risk through documentation, conversation, and presentations with the objective of driving awareness and informed decision-making for the ICT team.
     
IMPORTANT: Write a Perfect Cover Letter in minutes and start getting interviews! Get expert advice as you write.) Use These Examples Proven to Work.

Skills, Competencies and Experience

The successful candidate will be required to have the following skills and competencies:

  • An IT-related bachelor’s degree or business-related degree with relevant IT Security professional qualifications i.e. Cisco Certified Network Associate (CCNA)/ Certified Information Systems Auditor (CISA) certification/ Certified Information Systems Security Professional (CISSP) CCIE (Security), CEH, CHP or other relevant security certifications.
  • At least 3 years of experience in leading ICT Security Services Strong knowledge of security architectures and technologies including assessment, methodologies, compliance standards, etc.
  • Knowledge of security standards and compliance like PCI, HIPAA, Sarbanes Oxley, ISO 27001, NIST, CSF, COBIT, ITIL, SANS 20
  • Good understanding and knowledge of security assessment, vulnerability management, penetration testing methodologies, and toolsets
  • Working knowledge and experience in penetration testing and vulnerability assessments
  • Knowledge of common cybersecurity threats and sources of cybersecurity information
  • Good understanding and knowledge of risk assessment, risk procedures, security assessment, vulnerability management, penetration testing
  • Excellent business relationship, interpersonal communication, presentation, and stakeholder management skills.

Database Administrator

The Role

Specifically, the successful jobholder will be required to:

  • Monitor performance and manage parameters to provide fast query responses to front-end users ensuring the performance of production databases.
  • Monitor including systems logs, events, and event correlation and maintain performance statistics, and set baseline statistics.
  • Monitor and manage the high availability components including RAC, Data guard, RMAN, ASM, and the underlying infrastructure for mission-critical databases.
  • Develop, manage and test backup and recovery plans and ensure that storage, archiving, backup, and recovery procedures are functioning properly.
  • Take a lead role in the various I.T. audits in providing necessary information and enforcing the closure of audit, change management, and compliance issues.
  • Manage key I.T. risks for all database systems and ensure proper mitigation.
  • Take the lead role in BCP and disaster recovery preparedness through periodic testing as scheduled and updating of disaster recovery procedures and sharing the results with management.
  • Team up with applications support, development, and infrastructure team in the development, implementation, and management of applications, infrastructure, and monitoring system health in order to proactively identify weaknesses and address them. 
  • Perform database tasks such as schema design, capacity planning, maintenance, troubleshooting, and change control activities.
  • Consider both back-end organization of data and front-end accessibility for end-users and further refine the physical design to meet system storage requirements.
  • Install database management systems (RDBMS) using best practice; ensure compliance with RDBMS license agreements and maintain upgrades and critical patches 
  • Database setup, configuration, and administration of MYSQL, MSSQL 
  • Installation and Administration of SAP HANA databases
  • Create and maintain database documentation, including data standards, procedures, and definitions for the data dictionary (metadata) and maintain all technical documentation relating to database management.
  • Communicate regularly with technical, applications, and operational staff to ensure database integrity and security.
  • Perform under limited supervision, maintain reliability of data and databases, and assist in developing and implementing standards for database maintenance and configuration.

Skills, Competencies, and Experience

The successful candidate will be required to have the following skills and competencies:

  • Bachelor’s degree in Software Engineering, Computer Science, Information Technology, or related discipline, or equivalent. 
  • 3 – 5 years in database technology with experience deploying database and data warehousing technologies (e.g. high availability, real application clusters, ESBU backups, partitioning, Oracle data guard) in production environments.
  • Oracle RDBMS 11g/12c OCP certification as well as strong SQL and PLSQL skills including data warehouse objects such as partitioning and materialized views. 
  • Skills in Oracle RDBMS 19c
  • Skills in Oracle Engineered Systems e.g. Oracle SuperCluster, Exalytics, Exadata Storage, ZFS storage, and SmartScan.
  • Skills in data integration, data warehousing, business intelligence, OLAP, and data mining as well as familiarity with ICT standards such as ITIL, and COBIT.
  • Proficiency in various operating systems like AIX, Solaris, Linux & windows.
  • Thorough knowledge of data profiling, data modeling, and data validation and associated tools; Skills in database sizing, storage, performance, and security considerations.
  • Strong analytical skills; ability to analyze and correlate complex data and excellent knowledge of the Oracle technology stack as well as excellent knowledge of ICT system architectures, platforms, and infrastructure.  
  • Ability to effectively communicate complex technical issues and exhibit a wide degree of creativity and latitude coupled with the ability to lead and direct the work of others without the benefit of a direct reporting relationship as well as the ability to utilize independent judgment and to support senior managers on operational criticality
  • General awareness of the banking industry ICT operations and security procedures.

Method of Application

Use the link(s) below to apply on company website.

How To Apply For a Job By Email

  1. IT Security Operations Centre Analyst (SOC)
  2. Application & Infrastructure Security Officer
  3. Database Administrator