Cytonn Technologies (CT) – Cyber Security Engineer

Job Type:   Full Time

Job Category:   IT
Closing Date:   April 28th, 2017
Location:   Nairobi

Cytonn Technologies (CT) is the Technology affiliate of Cytonn Investments, an alternative investments management firm with offices in Nairobi – Kenya and the D.C. Metro Area in the US. Cytonn Technologies is a respected technology solutions provider that offers innovative, differentiated and efficient technology products and support, web-based solutions and integrated business solutions.

To manage our growing Technology needs, the firm is inviting applications from talented Cyber Security Engineers to join its competitive team of engineers in Cytonn Technologies.

The successful candidate will have an opportunity to participate in our share ownership plan.

Responsibilities

  1. Cyber Threat Engineer will work on all systems and/or projects within the organization responsible for providing Cyber Security Threat detection utilizing network and host based Computer Security tools, appliances and end point products
  2. Perform static code analysis (SCA) on applications to identify vulnerabilities and report to software engineers for fixing
  3. Set up and monitor applications for intrusion detection and protect applications against common vulnerabilities
  4. Secure application infrastructure (servers and databases) against intrusion, ensuring they’re regularly patched against known vulnerabilities
  5. Manage vulnerability reporting in all applications and systems, including open source software that the applications run on
  6. Perform analysis of all security systems log files, review and keep track of triggered events, research current and future cyber threats, reconcile correlated cyber security events, develop and modify new and current cyber security correlation rule sets, and operate security equipment and technology
  7. Document security incidents as identified in the incident response rules and escalate to management as required
  8. Monitor key security infrastructure elements, identify security events, perform analysis, and initiate response activities
  9. Perform packet analysis by identifying malformed packets and the payload of the packet
  10. Integrate security products, including designs for all organizational networks as well as designing, engineering, planning, integrating, configuring, testing and deploying
  11. Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined by the program management
  12. Provide documentation and interaction with other analysts and Operations and Maintenance personnel to ensure a complete and functioning system that meets requirements
  13. Perform software testing (patches, other updates)
  14. Troubleshoot OSI layer and TCP/IP related problems
  15. Develop automation scripts to handle and track incidents.
  16. Any other duties as may be assigned from time to time

Requirements

  1. Bachelor’s degree in Computer Science, Information Systems or specialized training/certification. Or equivalent work experience.
  2. Typically requires 1 or more year of related technical experience.
  3. Experience in application security, preferably a software security role
  4. Expertise with browser security controls (CSP, XFO, HSTS), web application security topics such as OWASP Top 10, and authentication infrastructure (SAML, OAUTH)
  5. Knowledgeable with back end security topics such as secret management and service authentication
  6. Experience building tools and processes to reliably identify security issues such as SQL injection, XSS, CSRF, and business logic flaws across large code bases
  7. Experience supporting a major system.
  8. Good understanding of IT and Risk Management Framework a plus. Certified Information Systems Security Professional (CISSP)
  9. Expert skills in data analysis and data mining.
  10. Must be well versed in Cyber Security Tools, network topologies, intrusion detection, PKI, and secured networks
  11. Experience leading teams
  12. Should be good in intrusion prevention and detection systems and configuring them in firewalls.
  13. Should be good in network design and development and network hardening to avert security

Apply Here


Get a free review of your resume send it to careragency@gmail.com with REVIEW in caps as the subject line.

We can also assist you with this job application. Request job application assistance when getting your review.

Like our Carer Agency Facebook page so you never miss our daily job updates.

JOIN OUR TELEGRAM GROUP FOR MORE JOBS

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s