Information Security Attachments in Kenya
Information Security attachments provide exposure to data protection, security policies, and information security management in Kenya's digital business environment. Typical duration: 6–12 weeks.
What You'll Do
Observe Security Operations
Watch how information security policies are implemented and monitored in business environments.
Assist with Security Tasks
Help with security documentation, policy reviews, and basic security monitoring tasks.
Document Security Procedures
Learn to document security policies, procedures, and compliance requirements.
Attend Security Meetings
Participate in security awareness sessions, policy reviews, and compliance discussions.
Learn Security Tools
Get familiar with security monitoring tools, access control systems, and compliance management platforms.
Shadow Security Professionals
Work alongside information security specialists to understand security best practices and compliance requirements.
Skills You'll Gain
Who Should Apply
Year of Study
2nd and 3rd year Computer Science, IT, or Business students with interest in security.
Prerequisites
Basic understanding of information systems, business processes, and security concepts.
Ideal Candidates
Students with strong attention to detail, analytical thinking, and interest in protecting information assets.
Academic Requirements
Minimum GPA of 2.5 and completion of information systems and business courses.
Typical Host Companies
Duration & Mode
Duration
6–12 weeks (flexible based on university requirements and company needs)
Schedule
Full-time during university breaks, part-time during semester (20-30 hours/week)
Mode
On-site or hybrid (mix of office and remote work)
Supervision
Direct supervision by information security professionals and regular check-ins with university coordinator
Related Career Pathways
Next Steps: Internships
Future: Graduate Roles
Frequently Asked Questions
What's the difference between Information Security and Cybersecurity?
Information Security focuses on protecting all forms of information (digital and physical), while Cybersecurity specifically focuses on protecting digital systems and networks from cyber threats.
Will I work with real security systems during the attachment?
Yes, you'll work with real information security systems under supervision. This may include policy documentation, compliance reviews, and security awareness activities.
Do I need technical skills for Information Security attachments?
Basic understanding of information systems is helpful, but the focus is more on policy development, compliance, and security governance rather than technical implementation.
What compliance knowledge should I have?
Basic understanding of data protection principles and business compliance requirements is valuable, but you'll learn specific compliance frameworks during your attachment.
Ready to Start Your Information Security Journey?
Download the Tayari app and discover Information Security attachment opportunities in Kenya.