KeNIC Hiring Cybersecurity and Applications Analyst

by Recal

The Kenya Network Information Centre (KeNIC) is inviting qualified professionals to apply for the position of Cybersecurity and Applications Analyst. This is a critical role that ensures the security, reliability, and performance of KeNIC’s digital systems, networks, and applications. As the organization continues to strengthen its technological infrastructure and expand its digital footprint, the Cybersecurity and Applications Analyst will serve as a key player in implementing cybersecurity strategies, optimizing applications, and aligning technology solutions with business objectives.

KeNIC, being at the forefront of managing and safeguarding Kenya’s online identity, values innovation, technical excellence, and a commitment to digital integrity. The successful candidate will be responsible for not only protecting the organization’s systems from cyber threats but also ensuring that all applications used within KeNIC operate efficiently, securely, and in harmony with its operational needs.

This position requires a combination of technical expertise, analytical ability, and strategic thinking. The incumbent will bridge the gap between technology and business processes, ensuring that cybersecurity and application management directly support KeNIC’s overall mission.


About the Role

The Cybersecurity and Applications Analyst is tasked with maintaining the security and functionality of KeNIC’s technology infrastructure. The role requires proactive monitoring of cyber threats, development and enforcement of cybersecurity policies, and optimization of application systems. The individual will be instrumental in developing secure technology environments that foster operational efficiency and digital trust.

This position may occasionally involve travel and weekend work, reflecting the organization’s need for a flexible and responsive approach to technology and security management.


Job Purpose

The primary purpose of this role is to protect KeNIC’s digital infrastructure against cyber risks while ensuring the optimal performance and integration of the organization’s software applications. The position requires an individual who can seamlessly combine cybersecurity oversight with practical application management to deliver secure, innovative, and efficient IT solutions.

The analyst will play a pivotal role in translating business needs into functional technology requirements, ensuring that digital systems are resilient, up-to-date, and aligned with the organization’s strategic direction.


Main Duties and Key Accountabilities

The Cybersecurity and Applications Analyst will be responsible for the following key duties and accountabilities:

1. Implementation and Maintenance of Security Controls

  • Develop, implement, and maintain cybersecurity controls and frameworks that safeguard KeNIC’s digital assets.
  • Enforce cybersecurity policies and standards to ensure a consistent and robust defense posture across all systems.
  • Regularly review and update these controls to address emerging threats and vulnerabilities.

2. Threat Monitoring and Incident Response

  • Continuously monitor networks, systems, and applications to detect potential security breaches or abnormal activities.
  • Investigate, respond to, and resolve cybersecurity incidents in a timely manner.
  • Conduct post-incident analysis to identify root causes and strengthen preventive measures.

3. Security and Compliance Assessments

  • Conduct periodic risk assessments, security audits, and penetration tests.
  • Evaluate systems and applications for compliance with internal policies, industry standards, and regulatory frameworks.
  • Prepare detailed reports and recommendations based on audit findings.

4. Application Optimization and Security

  • Oversee the performance and reliability of critical business applications.
  • Implement application updates, patches, and secure coding practices to prevent exploitation and downtime.
  • Collaborate with developers and IT teams to enhance functionality and align systems with security standards.

5. Promotion of Security Awareness and Collaboration

  • Lead initiatives to increase organizational awareness of cybersecurity best practices.
  • Conduct training sessions and provide guidance to staff on safe digital behaviors and data handling.
  • Foster collaboration between cybersecurity, IT operations, and application development teams.

6. Project Management and Delivery

  • Manage and deliver complex technology projects, ensuring they meet scope, time, and quality expectations.
  • Develop project plans, define deliverables, and allocate resources efficiently.
  • Identify potential risks and establish mitigation strategies for successful project execution.

7. Business–Technology Liaison

  • Act as the intermediary between business units and technical teams to ensure technology initiatives align with organizational goals.
  • Gather, document, and translate user requirements into actionable technical specifications.
  • Support business process automation and technological improvements that enhance service delivery.

8. Continuous Improvement of Application Controls and Architecture

  • Evaluate and recommend improvements to system architecture, application design, and security configurations.
  • Stay informed of new technologies, trends, and threats to enhance KeNIC’s cybersecurity and application environment.
  • Provide expert advice on system integration, scalability, and data protection.

Requirements

Education and Experience

  • Bachelor’s degree in Computer Science, Information Technology, Information Security, or a related field.
  • Minimum of three to five years of experience in cybersecurity, application analysis, software development, or IT systems management.
  • Proven experience in managing cross-functional technology projects within limited resources.
  • Background in bridging business and technology needs through effective communication and solution design.
  • Practical knowledge of security tools such as SIEM systems, firewalls, and vulnerability scanners (e.g., Nessus, Qualys).
  • Demonstrated ability to integrate systems and enforce secure coding practices.
  • Industry certifications such as CompTIA Security+, PMP, ITIL, eJPT, or equivalent are considered an advantage.
  • Flexibility to respond to incidents or system emergencies outside standard working hours when necessary.

Required Competencies

1. Application Management
A solid understanding of the entire application lifecycle — including deployment, monitoring, integration, troubleshooting, and performance optimization. The analyst should be capable of ensuring applications deliver maximum value while maintaining security and operational stability.

2. Automation and Innovation
A forward-thinking mindset that identifies opportunities for process automation, workflow efficiency, and the adoption of innovative technologies that enhance productivity and reduce manual workload.

3. Business Process Understanding
An ability to interpret organizational operations, workflows, and pain points, aligning cybersecurity and application management strategies with core business functions.

4. Technical Expertise
A strong technical foundation covering IT systems, networking, and programming languages such as Python, PHP, or Java, enabling the analyst to diagnose and resolve technical issues effectively.

5. Cybersecurity Knowledge
Comprehensive understanding of modern cybersecurity principles, including encryption, identity management, intrusion detection systems, and vulnerability assessment.

6. Project Management
Demonstrated skill in managing the entire project lifecycle—from scoping and planning to implementation and review—ensuring efficient use of resources, coordination with stakeholders, and delivery of measurable results.

7. Compliance and Standards
Knowledge of cybersecurity and data protection frameworks, such as ISO 27001, NIST, SOC 2, and CIS Controls, as well as understanding of how these standards apply to organizational environments.

8. Analytical and Problem-Solving Skills
Strong analytical ability to interpret technical data, assess security risks, and develop practical solutions that address both immediate and long-term organizational needs.

9. Communication and Presentation
Proficiency in communicating complex technical information in a clear and accessible manner. The analyst must be able to write reports, deliver presentations, and document system configurations and incident responses effectively.

10. Collaboration and Teamwork
Ability to work harmoniously with colleagues from different departments and backgrounds. Encouraging cooperation, knowledge sharing, and alignment across teams will be central to success in this role.

11. Adaptability and Agility
A readiness to adapt to new technologies, evolving security landscapes, and changing organizational priorities while maintaining efficiency and composure under pressure.

12. Commercial Awareness
Understanding the relationship between technology, security, and the organization’s overall performance. The analyst should be able to assess how cybersecurity and application initiatives support KeNIC’s sustainability and competitiveness.

13. Results Orientation
A commitment to achieving tangible outcomes that strengthen system performance, enhance security posture, and streamline operational processes.


Special Requirements

  • Moderate travel may be required to support operational or project activities.
  • Occasional weekend engagements may occur, particularly during system upgrades or cybersecurity response operations.

Closing Date

The application deadline for this position is 07 November 2025. Interested candidates are encouraged to apply before the closing date to ensure consideration.


How to Apply

Interested applicants who meet the above requirements should submit their applications as per the instructions provided by KeNIC.

Apply Now

You may also like

We DO NOT support recruitment agents/entities that demand money or any other favors from applicants to expedite hiring process. We shall not be liable to any money, favors and valuables lost during the process. Incase you see it on this site, report it to us via our Facebook page Pata Kazi so as to take the necessary action. Report the matter to the police asap.

 

More from Us: OYK-CVs | Internshub

 

© 2025 All Rights Reserved. Web Design by Clinet Online

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.