Summary
Software Security Professionals (KeSCO 2532) supports outcomes in the Information & Communication Technology sector by applying job-specific knowledge, standards, and tools to deliver quality services or outputs. Duties and complexity vary by employer, work setting, and seniority level, but the occupation generally requires reliability, competence, and continuous learning.
Minimum entry
Diploma or Bachelorβs degree
Future outlook
Future trends such as digital transformation, automation, climate resilience, and changing consumer needs are shaping most occupations. Workers who continuously upskill (digital literacy, quality standards, safety, customer service, and modern tools) are more resilient and competitive.
Sectors
Information & Communication TechnologyProfessional ServicesPublic SectorPrivate SectorNGO/DevelopmentSpecialised Practice
Description
Software Security Professionals (KeSCO 2532) supports outcomes in the Information & Communication Technology sector by applying job-specific knowledge, standards, and tools to deliver quality services or outputs. Duties and complexity vary by employer, work setting, and seniority level, but the occupation generally requires reliability, competence, and continuous learning.
Employment prospects
Prospects depend on national and county demand, sector investment, policy priorities, and supply of trained workers. Job seekers improve prospects by gaining practical experience, building a portfolio or track record, earning relevant certifications, and being flexible on location and sub-sector.
Tasks
- Gather and analyse user requirements and translate into specifications
- Design system components, data flows, and integrations
- Develop, test, and deploy software/features or configuration changes
- Maintain systems, troubleshoot issues, and resolve incidents
- Implement security controls and good practices (access, backups, patching)
- Monitor performance, reliability, and availability; optimise where needed
- Document technical work, user guides, and operational procedures
- Support users through training, helpdesk, and troubleshooting
- Collaborate using version control, code reviews, and agile workflows
- Ensure data protection, privacy, and compliance requirements
Skills
Communication (verbal and written) | Teamwork and collaboration | Problem-solving and critical thinking | Time management and prioritisation | Attention to detail and accuracy | Customer service orientation | Integrity and ethical conduct | Adaptability and continuous learning | Decision-making and judgement | Documentation and record-keeping | Digital literacy (basic) | Safety awareness and compliance mindset
Core skills
- Communication (verbal and written)
- Teamwork and collaboration
- Problem-solving and critical thinking
- Time management and prioritisation
- Attention to detail and accuracy
- Customer service orientation
- Integrity and ethical conduct
- Adaptability and continuous learning
- Decision-making and judgement
- Documentation and record-keeping
- Digital literacy (basic)
- Safety awareness and compliance mindset
Technical skills
- Computer applications and productivity tools
- Systems analysis and design
- Programming/software development fundamentals
- Database concepts (SQL/NoSQL basics)
- Networking fundamentals
- Cybersecurity basics (access control, safe coding, patching)
- Testing/QA and debugging
- Version control and collaboration workflows
- API/integration concepts
- Cloud fundamentals and deployment basics
- Data analysis fundamentals
- Documentation and technical writing
Transferable skills
- Leadership and supervision (as one progresses)
- Negotiation and stakeholder management
- Conflict resolution
- Presentation and public speaking
- Creativity and innovation
- Emotional intelligence
- Planning and organisation
- Resilience and stress management
- Service mindset and empathy
- Networking and relationship building
- Analytical thinking
- Professionalism and work discipline
Certifications
- Vendor-neutral cybersecurity/networking certifications (role dependent)
- Cloud platform fundamentals certifications (role dependent)
- Database certifications (role dependent)
- Software testing/QA certifications (optional)
- Secure coding and application security training (optional)
Education
Diploma or Degree in ICT/Computer Science/Software Engineering | Portfolio projects + internships/junior roles | Role-aligned certifications (networking/cloud/security) to specialise | Progression: junior β mid β senior β lead/architect/manager | Continuous learning to keep up with technology changes
Pathways
- Diploma or Degree in ICT/Computer Science/Software Engineering
- Portfolio projects + internships/junior roles
- Role-aligned certifications (networking/cloud/security) to specialise
- Progression: junior β mid β senior β lead/architect/manager
- Continuous learning to keep up with technology changes
Relevant courses
- Certificate/Diploma/Degree in Information Technology
- Computer Science / Software Engineering
- Information Systems
- Data Science / Statistics fundamentals
- Networking (CCNA-aligned content)
- Cybersecurity fundamentals
- Database Administration
- Cloud Computing fundamentals
- Systems Analysis and Design
- Web and Mobile Development
- DevOps fundamentals
- AI/ML fundamentals
- UI/UX Design fundamentals
Institutions
- Universities (accredited public and private universities offering relevant programmes)
- National Polytechnics and TVET institutions (diploma, certificate, artisan programmes)
- Technical Training Institutes and Vocational Centres
- Professional Colleges and Accredited Training Academies
- Sector Training Authorities and Recognised Centres of Excellence
- Employer-based Academies and Apprenticeship Programmes
- Online Learning Platforms (supplementary; verify recognition for regulated fields)
- Industry Associations and Professional Bodies (short courses/CPD)
Minimum requirements
- Minimum education: Diploma or Bachelorβs degree
- Basic literacy and numeracy (reading, writing, and basic calculations)
- Good conduct, reliability, and professional behaviour
- Ability to follow instructions, procedures, and workplace rules
- Basic digital literacy where the role uses computers/phones
- Physical/medical fitness where the role is physically demanding or safety-sensitive
- Regulatory registration/licensing where required (profession-dependent)
- Background checks/clearance for sensitive roles where applicable
Work context
Workplace policies | Team collaboration | Quality standards | Office/remote | Computer-based | Project delivery | Incident response | Documentation
Where they work
- ICT companies, public and private organisations, start-ups, innovation hubs and outsourcing firms.
Work setting
Not specified.
Schedule
Full-time commonDaytime hours commonDeadlines possible
Employment type
Formal employment possible
Earnings
Entry level
KES 50,000 β 120,000
Mid level
KES 120,000 β 250,000
Entry-level typical range (illustrative): KES 50,000 β 120,000 | Mid-level typical range (illustrative): KES 120,000 β 250,000 | Senior/experienced typical range (illustrative): KES 250,000+ | Earnings vary by employer (public/private), location, allowances, commissions, overtime, risk factors, and scarcity of skills
How to become one
Complete a degree or diploma in computer science or a related field, build a portfolio of software projects, undertake internships or junior roles, and keep updating skills with new technologies.
Career progression
- Entry/Intern β Junior Practitioner β Mid-level β Senior Specialist
- Senior Specialist β Team Lead/Principal β Manager/Head of Unit (where applicable)
- Some pathways include consultancy, research, training, or policy roles
Related occupations
- Other occupations within the same KeSCO major group
- Support roles in the same sector/industry
- Supervisory roles related to this occupationβs work area
- Specialist variants of the same occupation (where they exist)
Occupation titles
2532-12 β Applications Security Specialist
Application security specialists identify and mitigate security vulnerabilities in applications throughout the development lifecycle.
2532-15 β Chief Information Security Officer
Chief Information Security Officers define and oversee organisational information security strategy, governance, and risk management at executive level.
2532-11 β Cyber security Engineer
Cyber security engineers design and implement security solutions across systems and platforms, ensuring protection against evolving cyber threats.
2532-13 β Data Center Security Specialist
Data centre security specialists protect data centre environments from physical and cyber threats, ensuring system integrity and availability.
2532-16 β Data Protection Officer
Data Protection Officers oversee compliance with data protection laws, advise on privacy risks, and act as liaison with regulators.
2532-14 β Information Security Analyst
Information security analysts monitor security posture, analyse threats, support audits, and ensure compliance with security standards and regulations.