Advertisement

Cyber Security Analyst, IT Monitoring

New Job Opportunity
We are actively hiring for a new role.
Apply Now
🏢 Career.zycto📍 Kitale (Trans-Nzoia County)💼 Full-Time💻 On-site🏭 Cybersecurity, Information Technology & Services💰 KES 80,000 - 120,000 per month

About Company

⚠ Job Safety Notice: We actively monitors listings to prevent scams, misleading, or unauthorized postings in line with PhishFort anti-phishing policies. If you spot a suspicious listing, submit a Job Takedown Request immediately for review and appropriate removal action.

Are you ready to fortify digital landscapes and thrive in a dynamic security environment? Career.zycto offers a unique opportunity for a dedicated Cyber Security Analyst to make a tangible impact. We are a forward-thinking organization committed to leveraging technology for growth, always prioritizing the integrity and confidentiality of our digital assets. Joining us means becoming part of a team that values innovation, continuous learning, and a proactive approach to cyber defense. This role is perfect for someone eager to apply their expertise in IT monitoring, contribute to critical infrastructure protection, and grow within a supportive, challenge-driven culture right here in Kitale.

Advertisement

Job Description

Career.zycto is actively seeking a highly motivated and skilled Cyber Security Analyst specializing in IT Monitoring to join our growing team in Kitale, Trans-Nzoia County. In today’s interconnected world, safeguarding our digital assets and ensuring the resilience of our IT infrastructure is paramount. As a Cyber Security Analyst, you will play a critical role in our defense strategy, working at the forefront of threat detection and incident response. This position requires a vigilant professional with a keen eye for detail, a strong understanding of security principles, and practical experience with monitoring tools and techniques.

You will be responsible for the continuous monitoring of our systems, networks, and applications to identify, analyze, and respond to potential security incidents. This involves utilizing various security information and event management (SIEM) platforms, intrusion detection systems (IDS), and other security tools to detect anomalies and suspicious activities. Your expertise will be crucial in dissecting complex security alerts, determining their legitimacy, and initiating appropriate containment and eradication measures. Beyond reactive tasks, you will also contribute to proactive security initiatives, including vulnerability assessments, threat intelligence analysis, and the development of robust security policies and procedures.

This is an exciting opportunity for an individual passionate about cyber security to contribute significantly to an organization’s security posture. You will work closely with our IT operations and infrastructure teams, fostering a culture of security awareness and best practices. The ideal candidate will be a problem-solver, capable of working independently and collaboratively, adapting to evolving threat landscapes, and committed to continuous learning in the dynamic field of cyber security. If you are ready to apply your analytical prowess and technical skills to protect vital systems and data, we encourage you to apply and become a key player in Career.zycto’s security framework.

Advertisement

Key Responsibilities

  • Perform continuous real-time monitoring of security systems, network traffic, and system logs for anomalies and indicators of compromise (IOCs).
  • Analyze security alerts, events, and incidents from various sources (SIEM, IDS/IPS, EDR) to determine their nature and potential impact.
  • Investigate security incidents thoroughly, document findings, and recommend appropriate remediation actions.
  • Participate in the incident response lifecycle, including detection, analysis, containment, eradication, recovery, and post-incident review.
  • Conduct vulnerability scanning and assessments, assisting in the prioritization and remediation of identified vulnerabilities.
  • Contribute to the development and maintenance of security policies, procedures, and best practices.
  • Collaborate with IT operations and development teams to implement security controls and ensure adherence to security standards.
  • Stay current with the latest cyber security threats, trends, and technologies, providing insights and recommendations for improving our security posture.
  • Assist in security awareness training for employees and promote a security-conscious culture within the organization.

Required Skills

  • Proficiency in Security Information and Event Management (SIEM) platforms (e.g., Splunk, ELK Stack, LogRhythm, Azure Sentinel).
  • Strong understanding of network protocols (TCP/IP, HTTP/S, DNS, SMTP) and network security concepts (firewalls, VPNs, IDS/IPS).
  • Demonstrable experience in incident response and security event analysis.
  • Familiarity with common attack vectors, techniques, and threat intelligence frameworks.
  • Experience with vulnerability assessment tools and methodologies.
  • Solid understanding of operating system security (Windows, Linux).
  • Ability to analyze logs and forensic data to identify security breaches.
  • Excellent problem-solving skills and attention to detail.
  • Strong written and verbal communication skills.

Preferred Qualifications

  • Bachelor's degree in Computer Science, Information Technology, Cyber Security, or a related field.
  • Industry certifications such as CompTIA Security+, CySA+, CEH, GSEC, or similar.
  • Experience with cloud security platforms (AWS, Azure, GCP).
  • Knowledge of scripting languages (e.g., Python, PowerShell) for automation and data analysis.
  • Familiarity with regulatory compliance frameworks (e.g., ISO 27001, GDPR, PCI DSS).
  • Experience with Endpoint Detection and Response (EDR) solutions.

Perks & Benefits

  • Competitive salary package commensurate with experience.
  • Comprehensive health and wellness benefits.
  • Opportunities for professional development and continuous learning through certifications and training programs.
  • A dynamic and collaborative work environment.
  • Generous paid time off and holidays.
  • Modern office facilities in a convenient Kitale location.
  • Contribution to a critical function safeguarding our digital future.

How to Apply

Interested candidates are invited to click on the application link below to submit their resume and a cover letter detailing their relevant experience and qualifications. Please highlight your experience with IT monitoring tools and your approach to incident response.

Job Application

×
Scroll to Top