Lead Cybersecurity Threat Intelligence Analyst
Posted 9 days ago
Job Viewed
Job Description
Location: Mombasa, Mombasa, KE
Senior Cybersecurity Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Key Responsibilities:
- Conduct in-depth research and analysis of global cyber threat landscapes, identifying emerging threats, attack vectors, and threat actor methodologies relevant to our client's business operations.
- Develop and maintain strategic and tactical threat intelligence reports, briefings, and alerts for various audiences, including executive leadership, security operations teams, and incident response teams.
- Monitor and analyze threat intelligence feeds, open-source intelligence (OSINT), dark web activity, and other relevant data sources to detect potential security incidents and indicators of compromise (IOCs).
- Build and manage relationships with external intelligence sharing communities, government agencies, and industry peers to enhance intelligence collection and validation.
- Develop and refine threat hunting methodologies and proactively search for advanced persistent threats (APTs) and other sophisticated malicious activities within the client's network.
- Contribute to the development and improvement of the organization's threat intelligence platform, including tooling, processes, and data management.
- Provide expert consultation and support to incident response, security operations, and IT teams during security incidents.
- Develop and deliver training on threat intelligence best practices and emerging threats to internal security teams.
- Stay abreast of the latest cybersecurity trends, technologies, and geopolitical events that may impact the threat landscape.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; Master's degree preferred.
- Minimum of 7 years of experience in cybersecurity, with a strong focus on threat intelligence, incident response, or security operations.
- Proven expertise in threat actor profiling, malware analysis, network forensics, and forensic investigation techniques.
- Demonstrated ability to work independently and collaboratively in a remote environment, managing multiple priorities and deadlines.
- Expertise with threat intelligence platforms (TIPs), SIEM solutions, and endpoint detection and response (EDR) tools.
- Strong understanding of various operating systems, network protocols, and cloud security principles.
- Excellent written and verbal communication skills, with the ability to clearly articulate complex technical information to both technical and non-technical audiences.
- Relevant certifications such as CISSP, GIAC GCTI, GCFA, or similar are highly desirable.
- Experience with scripting languages (e.g., Python) for automation of intelligence gathering and analysis is a plus.
- Ability to maintain discretion and handle sensitive information confidentially.
Cybersecurity Analyst - Threat Intelligence
Posted 5 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and logs from various sources, including SIEM, IDS/IPS, and endpoint protection platforms.
- Analyze threat intelligence feeds and data to identify emerging threats and attack patterns.
- Research and investigate threat actors, their motivations, and TTPs.
- Develop and maintain threat intelligence reports, briefings, and advisories.
- Collaborate with incident response teams to provide context and support during security incidents.
- Develop and refine threat models and attack scenarios relevant to the organization.
- Identify vulnerabilities and recommend security enhancements.
- Participate in security awareness training initiatives.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Contribute to the continuous improvement of security monitoring and detection capabilities.
- Proven experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Strong understanding of networking protocols, operating systems, and common attack vectors.
- Experience with SIEM, IDS/IPS, EDR, and other security technologies.
- Familiarity with threat intelligence platforms and methodologies.
- Knowledge of scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to present technical information clearly.
- Relevant industry certifications (e.g., CompTIA Security+, CySA+, GCIH, CEH) are highly desirable.
- Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent work experience.
Lead Cybersecurity Analyst - Threat Intelligence
Posted 9 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst (Threat Intelligence)
Posted 11 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze threat intelligence feeds from diverse sources.
- Identify, track, and report on emerging cyber threats, vulnerabilities, and threat actors.
- Develop and maintain threat models and intelligence reports.
- Provide actionable intelligence to support incident response and security operations.
- Conduct in-depth analysis of malware and advanced persistent threats (APTs).
- Collaborate with global security teams to enhance defensive strategies.
- Contribute to the development and improvement of threat detection capabilities.
- Stay current with the latest cybersecurity trends, tools, and techniques.
- Develop and deliver presentations on threat landscapes and security risks.
- Participate in security awareness initiatives and knowledge sharing.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence.
- Proven experience in threat analysis, malware analysis, and incident response.
- Strong understanding of networking protocols, operating systems, and security technologies.
- Proficiency with SIEM, SOAR, and threat intelligence platforms.
- Excellent analytical, critical thinking, and problem-solving skills.
- Ability to work independently and manage time effectively in a remote setting.
- Strong written and verbal communication skills.
- Relevant certifications such as CISSP, GIAC, or OSCP are highly desirable.
- Experience with scripting languages (e.g., Python) is a plus.
Remote Senior Cybersecurity Analyst - Threat Intelligence
Posted 9 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze global threat intelligence feeds, security alerts, and incident reports to identify potential risks and attack vectors.
- Conduct in-depth research on emerging threats, malware, vulnerabilities, and attack techniques relevant to the organization's industry and infrastructure.
- Develop and refine threat hunting methodologies to proactively discover and neutralize advanced persistent threats (APTs).
- Analyze security incidents, including identifying the root cause, scope of impact, and recommend remediation actions.
- Create comprehensive threat intelligence reports and presentations for technical and executive leadership.
- Develop and implement security controls and recommendations based on threat intelligence findings.
- Collaborate with internal security teams, IT departments, and external partners to share threat information and coordinate response efforts.
- Maintain and enhance the organization's security monitoring tools and platforms, including SIEM, IDS/IPS, and EDR solutions.
- Participate in incident response activities, providing expert analysis and support during critical events.
- Develop and document security procedures, playbooks, and best practices related to threat intelligence and incident response.
- Stay current with the latest cybersecurity trends, technologies, and regulatory requirements.
- Mentor junior security analysts and contribute to the overall development of the cybersecurity team's capabilities.
- Automate threat intelligence collection, processing, and analysis tasks using scripting and programming languages.
- Conduct vulnerability assessments and penetration testing, analyzing results and recommending mitigation strategies.
Senior Cybersecurity Analyst - Threat Intelligence (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze the global threat landscape for emerging cyber threats and vulnerabilities.
- Research and investigate threat actor TTPs, motivations, and infrastructure.
- Develop and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Correlate data from various sources (OSINT, commercial feeds, internal logs) to identify threats.
- Produce actionable threat intelligence reports for technical and executive audiences.
- Collaborate with Security Operations Center (SOC) and Incident Response teams to integrate intelligence.
- Develop threat models and scenarios to assess organizational risk.
- Contribute to the development and refinement of threat hunting methodologies.
- Stay abreast of the latest cybersecurity trends, tools, and techniques.
- Participate in cybersecurity communities and information sharing groups.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong focus on threat intelligence or security analysis.
- In-depth knowledge of cyber threat actors, TTPs, and attack vectors.
- Experience with threat intelligence platforms (TIPs) and SIEM solutions (e.g., Splunk, QRadar).
- Proficiency in data analysis, malware analysis, and network forensics.
- Strong research and analytical skills with the ability to interpret complex data.
- Excellent written and verbal communication skills, with the ability to produce clear reports.
- Ability to work independently and manage priorities effectively in a remote setting.
- Relevant certifications such as CISSP, CEH, GIAC are a plus.
- Understanding of geopolitical factors influencing cyber threats is beneficial.
Be The First To Know
About the latest Senior cybersecurity threat intelligence analyst Jobs in Nairobi !
Data Protection Officer
Posted today
Job Viewed
Job Description
Job Description
Reporting to the Cluster General Manager, responsibilities and essential job functions include but are not limited to the following:
- Ensure compliance with Kenya's Data Protection Act (2019), GDPR (where applicable), and Accor Group Data Protection policies.
- Serve as the main point of contact between the hotel cluster and the Office of the Data Protection Commissioner (ODPC) and other relevant regulatory authorities.
- Monitor changes in data protection legislation and update policies accordingly.
- Develop, implement, and maintain internal data protection policies and procedures.
- Conduct regular audits and assessments of data processing activities across departments (Front Office, Reservations, IT, Finance, Sales & Marketing, etc.).
- Ensure all departments adhere to approved data handling and processing protocols.
- Develop and deliver ongoing training programs for employees on data privacy, confidentiality, and best practices.
- Promote a culture of data privacy and security across both properties.
- Evaluate and advise on the data protection impact assessments (DPIAs) for new projects or technologies involving personal data.
- Respond to and manage data breaches in accordance with internal protocols and regulatory requirements.
- Maintain a data breach register and report incidents to management within statutory timelines.
- Work closely with Front Office, Reservations, HR, IT, Marketing, and third-party vendors to ensure data processing activities comply with privacy regulations.
- Maintain a data processing inventory and ensure accurate recordkeeping of guest and employee data practices.
- Facilitate and manage all requests relating to the rights of data subjects (access, correction, erasure, restriction, etc.).
- Maintain records of all such requests and ensure timely and compliant responses.
- Liaise with Accor regional DPOs and Regional teams to ensure alignment with global policies.
- Prepare regular compliance reports for the Cluster General Manager.
- Collaborate with IT and Security teams to ensure technical safeguards are adequate and up to date.
Qualifications
- Bachelor's degree in Law or relevant degree in Information Security or Technology, Data Governance, or a related field.
- Certified Data Protection Officer (CDPO), CIPP/E, CIPM, or other relevant certification is an asset.
- Minimum 3 years of experience in IT Department /Data protection, compliance, legal, or risk management—preferably in hospitality or multinational settings.
- Strong knowledge of Kenyan Data Protection Act 2019, GDPR, and international data privacy frameworks.
- Experience conducting data audits, managing privacy impact assessments, and handling data breaches.
Additional Information
Physical Aspects of Position (include but are not limited to):
- Constant standing and walking throughout shift
- Frequent standing and walking throughout shift
- Occasional lifting and carrying up to 30 lbs
- Occasional kneeling, pushing, pulling, lifting
- Occasional ascending or descending ladders, stairs and ramps
Regional Security Officer
Posted today
Job Viewed
Job Description
Are you a security professional with a proven track record in law enforcement, intelligence gathering, and stakeholder engagement? Do you thrive in environments where vigilance, proactive risk management, and collaboration make all the difference? If so, this is your opportunity to play a critical role in protecting one of Kenya's most trusted financial institutions.
The
Co-operative Bank of Kenya
is a leading bank built on the principles of co-operation, shared success, and community impact. We are committed to safeguarding our people, assets, and reputation while delivering trusted financial solutions to millions of Kenyans. To strengthen this mission, we are seeking a dedicated and experienced Regional Security Officer.
The role holder will be responsible for managing and coordinating all security-related activities across the assigned region. This role plays a critical part in safeguarding the Bank against internal and external threats. From building strong relationships with law enforcement, to training staff on fraud prevention, to monitoring emerging risks, the Regional Security Officer ensures that the Bank remains secure, resilient, and trusted.
The role
The successful jobholder will be expected to:
- Build and maintain strong relationships with law enforcement, government offices and security regulators.
- Represent the Bank at regional forums, regulatory engagements and security-related events.
- Maintain a comprehensive stakeholder contact database to strengthen collaboration and visibility.
- Support branch managers in cultivating strong ties with local police leadership.
- Coordinate and train staff on fraud prevention, emergency procedures and incident response.
- Oversee physical security audits to ensure compliance with security SOPs.
- Monitor threats, reputational risks and criminal activities affecting the Bank.
- Partner with law enforcement and regulatory agencies to gather intelligence.
- Use digital tools and informer networks to identify and mitigate emerging risks.
- Audit outsourced security providers for effectiveness and professionalism.
- Oversee the functionality of security technologies.
- Conduct threat and vulnerability assessments and recommend improvements.
- Lead investigations into theft, fraud, threats or breaches of protocol.
- Collect evidence, prepare reports, and support legal or disciplinary action.
- Conduct physical and operational risk assessments of branches, ATMs and cash transit operations.
Qualifications, Skills & Attributes
The successful jobholder will be required to possess the following qualifications:
- Bachelor's degree.
- Must have served as an Inspector of Police or at a higher Level.
- Strong knowledge of law enforcement procedures, security risk analysis, and investigations.
- Proven experience in stakeholder management, crime prevention, and intelligence collection.
- Computer literacy
- Ability to work independently while managing a regional security portfolio.
- Those currently serving have an added advantage
Special Requirements
- Based in a Regional Office with frequent travel within the region.
- Flexibility to work outside normal hours when required.
Security Officer
Posted today
Job Viewed
Job Description
Org. Setting and Reporting
The United Nations Office at Nairobi (UNON) is the UN headquarters in Africa and the representative office of the Secretary-General. UNON supports programme implementation of the UN Environment Programme (UNEP) and the UN Human Settlements Programme (UNHABITAT) and the Resident Coordination System (RCS) globally, as well as other UN offices in Kenya, by providing administrative, security, conference and information services ). Those positions are located in the Office of Director-General, United Nations Office at Nairobi (UNON), Security and Safety Service. The United Nations Security and Safety Service (SSS) is responsible for providing security to delegates, staff, visiting dignitaries and other visitors. United Nations Security Officers function as agents of the Secretary-General and are authorized to preserve order and to protect persons on all United Nations premises, including temporary premises, and to protect the property of the United Nations. Under the overall command of the Chief of Service, the Security Officer is required to perform armed security functions and reports directly to the Security Sergeant or another assigned supervising officer. Security Officers are required to work on weekends and holidays, overtime, and on various shifts in uniform and/or civilian clothes. The duty stations will be Nairobi, but Security Officers may also be deployed to work at UN Offices elsewhere in Kenya.
Responsibilities
Competencies
Education
Job - Specific Qualification
Work Experience
Languages
Assessment
Special Notice
United Nations Considerations
No Fee
Apply Now