Gendered firewalls: Intersectional barriers to women’s cybersecurity Careers in East Africa


Abstract views: 41 / PDF downloads: 18

Authors

DOI:

https://doi.org/10.71350/30624533114

Keywords:

Cybersecurity skills gap, gender equity, East Africa, intersectionality, workforce diversity

Abstract

East Africa faces a critical paradox: despite nearly equal STEM graduation rates, women hold only 9-14% of cybersecurity positions, drastically diminishing the region's digital defensive capabilities. Current research ignores the unique, field-specific combination of institutional gatekeeping and sociocultural barriers that prevent women from entering and progressing in this high-stakes arena. This groundbreaking mixed-methods study investigates these impediments directly through a comprehensive analysis that includes a quantitative survey of 457 women in technology from Kenya, Uganda, Tanzania, and Rwanda, in-depth life-history interviews with 38 female cybersecurity professionals, and rigorous HR policy audits of 42 companies. Our findings suggest widespread entry hurdles, with 68% of respondents facing gendered assumptions that questioned their technical abilities. A serious mid-career retention dilemma exists, with 52% leaving owing to unfriendly work cultures, such as exclusion from critical debates and sexualized commentary during incident response. Critically, 89% of businesses lack gender-responsive incident response processes, disproportionately burdening working mothers who face rigid on-call schedules. Theoretically, this work integrates feminist organizational sociology into cybersecurity in a novel way, presenting it as a masculinized institution with interlocking biases. Urgent legislative imperatives include the implementation of gender-aware incident response structures with flexible rotations and explicit harassment reporting, as well as strategic retention quotas. This study, which focuses on women lived experiences, provides an effective blueprint for reforming cybersecurity cultures in East Africa, turning gendered firewalls into gateways for inclusive digital resilience and leadership.

Downloads

Download data is not yet available.

References

Acker, J. (1990). Hierarchies, jobs, bodies: A theory of gendered organizations. Gender & Society, 4(2), 139–158. https://doi.org/10.1177/089124390004002002

Acker, J. (2006). Inequality regimes: Gender, class, and race in organizations. Gender & Society, 20(4), 441–464. https://doi.org/10.1177/0891243206289499

African Union Commission. (2020). Digital Transformation Strategy for Africa (2020-2030). African Union. https://au.int/en/documents/20200518/digital-transformation-strategy-africa-2020-2030

Bourdieu, P. (1986). The forms of capital. In J. G. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Greenwood.

Brown, T., Miller, L., & Garcia, S. (2021). Certification bodies and diversity initiatives in tech. Journal of Professional Development in Technology, 15(2), 112-128.

Capodilupo, C. M., Nadal, K. L., Corman, L., Hamit, S., Lyons, O. B., & Weinberg, A. (2010). The manifestation of gender microaggressions. In D. W. Sue (Ed.), Microaggressions and marginality: Manifestation, dynamics, and impact (pp. 193-216). Wiley.

Cheryan, S., Ziegler, S. A., Montoya, A. K., & Jiang, L. (2017). Why are some STEM fields more gender balanced than others? Psychological Bulletin, 143(1), 1–35. https://doi.org/10.1037/bul0000052

Cohn, C. (2013). Women and wars: Towards a conceptual framework. In C. Cohn (Ed.), Women and wars (pp. 1-35). Polity Press.

Collins, P. H. (2015). Intersectionality's definitional dilemmas. Annual Review of Sociology, 41, 1–20. https://doi.org/10.1146/annurev-soc-073014-112142

Connell, R. W. (2005). Masculinities (2nd ed.). University of California Press.

Corbett, J., & Weber, A. (2016). What do I get? The everyday benefits of diversity in cybersecurity teams. Journal of Cybersecurity, 2(2), 121–132. https://doi.org/10.1093/cybsec/tyw007

Crenshaw, K. (1989). Demarginalizing the intersection of race and sex: A black feminist critique of antidiscrimination doctrine, feminist theory and antiracist politics. University of Chicago Legal Forum, 1989(1), Article 8. https://chicagounbound.uchicago.edu/uclf/vol1989/iss1/8

Cybersecurity Authority of Kenya (CAK). (2024). Annual Threat Landscape Report 2023. Government of Kenya.

Davis, E., & Lee, J. (2024). The male ally in male-dominated fields: A cybersecurity perspective. Sociological Studies of Work and Occupation, 40(1), 45-60.

Enloe, C. (2000). Maneuvers: The international politics of militarizing women's lives. University of California Press.

Faulkner, W. (2009). Doing gender in engineering workplace cultures. II. Gender in/authenticity and the in/visibility paradox. Engineering Studies, 1(3), 169–189. https://doi.org/10.1080/19378620903225059

Flanagan, J. C. (1954). The critical incident technique. Psychological Bulletin, 51(4), 327–358. https://doi.org/10.1037/h0061470

Global Information Security Workforce Study (GISWS). (2023). Women in Cybersecurity. (ISC)². https://www.isc2.org/Research/Workforce-Study

Kelan, E. K. (2009). Performing gender at work. Palgrave Macmillan.

Leicht, C., Rink, F., & Unger, T. (2023). Diversity in cybersecurity teams: A meta-analysis of performance effects. Computers & Security, 124, 102956. https://doi.org/10.1016/j.cose.2022.102956

Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340–363. https://doi.org/10.1086/226550

Nguyen, L., & Chen, K. (2023). Funding mechanisms and equity outcomes in STEM education. Policy Review Quarterly, 8(3), 201-215.

Owen, J., & Shakow, M. (2021). Intersectional barriers in African tech ecosystems: Gender, class, and geography. Information Technologies & International Development, 17, 1–15. https://itidjournal.org/index.php/itid/article/view/2113

Perlow, L. A. (1998). Boundary control: The social ordering of work and family time in a high-tech corporation. Administrative Science Quarterly, 43(2), 328–357. https://doi.org/10.2307/2393855

Regional IT Council. (2023). East African Digital Talent Report 2023. Unpublished industry consortium data.

Rottinghaus, P. J., Day, S. X., & Borgen, F. H. (2005). The Career Futures Inventory: A measure of career-related adaptability and optimism. Journal of Career Assessment, 13(1), 3–24. https://doi.org/10.1177/1069072704270271

Safaricom. (2023). Diversity in cybersecurity: Annual workforce report. https://www.safaricom.co.ke/sustainability

Serianu Ltd. (2023). Women in Cybersecurity: Kenya Retention Audit Report. Nairobi.

Settles, I. H., Buchanan, N. T., & Dotson, K. (2021). Scrutinized but not recognized: (In)visibility and hypervisibility experiences of faculty of color. Journal of Vocational Behavior, 126, 103492. https://doi.org/10.1016/j.jvb.2020.103492

Williams, J. C., Berdahl, J. L., & Vandello, J. A. (2014). Beyond work-life "integration". Annual Review of Psychology, 67, 515–539. https://doi.org/10.1146/annurev-psych-122414-033710

World Bank. (2022). Digital inclusion in Eastern Africa: Barriers and accelerators. World Bank Group. https://doi.org/10.1596/978-1-4648-1894-3

World Bank. (2024). Women, Business and the Law 2024. World Bank Group. https://wbl.worldbank.org

Downloads

Published

2025-08-22

How to Cite

Dzreke, S. S., & Dzreke, S. E. (2025). Gendered firewalls: Intersectional barriers to women’s cybersecurity Careers in East Africa. Frontiers in Research, 3(1), 59–77. https://doi.org/10.71350/30624533114

Most read articles by the same author(s)