Tayari Logo
Information Security Attachment

Information Security Attachments in Kenya

Information Security attachments provide exposure to data protection, security policies, and information security management in Kenya's digital business environment. Typical duration: 6–12 weeks.

What You'll Do

Observe Security Operations

Watch how information security policies are implemented and monitored in business environments.

Assist with Security Tasks

Help with security documentation, policy reviews, and basic security monitoring tasks.

Document Security Procedures

Learn to document security policies, procedures, and compliance requirements.

Attend Security Meetings

Participate in security awareness sessions, policy reviews, and compliance discussions.

Learn Security Tools

Get familiar with security monitoring tools, access control systems, and compliance management platforms.

Shadow Security Professionals

Work alongside information security specialists to understand security best practices and compliance requirements.

Skills You'll Gain

Security policy development
Risk assessment basics
Compliance management
Security awareness
Access control systems
Security documentation
Incident response
Security monitoring
Data protection
Security training
Audit procedures
Security governance

Who Should Apply

Year of Study

2nd and 3rd year Computer Science, IT, or Business students with interest in security.

Prerequisites

Basic understanding of information systems, business processes, and security concepts.

Ideal Candidates

Students with strong attention to detail, analytical thinking, and interest in protecting information assets.

Academic Requirements

Minimum GPA of 2.5 and completion of information systems and business courses.

Typical Host Companies

Financial Institutions
Government Agencies
Healthcare Organizations
Corporate IT Departments
Consulting Firms
Educational Institutions
Telecommunications
E-commerce Companies
Legal Firms

Duration & Mode

Duration

6–12 weeks (flexible based on university requirements and company needs)

Schedule

Full-time during university breaks, part-time during semester (20-30 hours/week)

Mode

On-site or hybrid (mix of office and remote work)

Supervision

Direct supervision by information security professionals and regular check-ins with university coordinator

Related Career Pathways

Next Steps: Internships

Information Security Analyst Internship
Compliance Officer Internship
Security Policy Internship
Risk Management Internship

Future: Graduate Roles

Information Security Officer
Compliance Officer
Security Policy Analyst
Risk Management Specialist

Frequently Asked Questions

What's the difference between Information Security and Cybersecurity?

Information Security focuses on protecting all forms of information (digital and physical), while Cybersecurity specifically focuses on protecting digital systems and networks from cyber threats.

Will I work with real security systems during the attachment?

Yes, you'll work with real information security systems under supervision. This may include policy documentation, compliance reviews, and security awareness activities.

Do I need technical skills for Information Security attachments?

Basic understanding of information systems is helpful, but the focus is more on policy development, compliance, and security governance rather than technical implementation.

What compliance knowledge should I have?

Basic understanding of data protection principles and business compliance requirements is valuable, but you'll learn specific compliance frameworks during your attachment.

Ready to Start Your Information Security Journey?

Download the Tayari app and discover Information Security attachment opportunities in Kenya.