Gendered firewalls: Intersectional barriers to women’s cybersecurity Careers in East Africa


DOI:
https://doi.org/10.71350/30624533114Keywords:
Cybersecurity skills gap, gender equity, East Africa, intersectionality, workforce diversityAbstract
East Africa faces a critical paradox: despite nearly equal STEM graduation rates, women hold only 9-14% of cybersecurity positions, drastically diminishing the region's digital defensive capabilities. Current research ignores the unique, field-specific combination of institutional gatekeeping and sociocultural barriers that prevent women from entering and progressing in this high-stakes arena. This groundbreaking mixed-methods study investigates these impediments directly through a comprehensive analysis that includes a quantitative survey of 457 women in technology from Kenya, Uganda, Tanzania, and Rwanda, in-depth life-history interviews with 38 female cybersecurity professionals, and rigorous HR policy audits of 42 companies. Our findings suggest widespread entry hurdles, with 68% of respondents facing gendered assumptions that questioned their technical abilities. A serious mid-career retention dilemma exists, with 52% leaving owing to unfriendly work cultures, such as exclusion from critical debates and sexualized commentary during incident response. Critically, 89% of businesses lack gender-responsive incident response processes, disproportionately burdening working mothers who face rigid on-call schedules. Theoretically, this work integrates feminist organizational sociology into cybersecurity in a novel way, presenting it as a masculinized institution with interlocking biases. Urgent legislative imperatives include the implementation of gender-aware incident response structures with flexible rotations and explicit harassment reporting, as well as strategic retention quotas. This study, which focuses on women lived experiences, provides an effective blueprint for reforming cybersecurity cultures in East Africa, turning gendered firewalls into gateways for inclusive digital resilience and leadership.
Downloads
References
Acker, J. (1990). Hierarchies, jobs, bodies: A theory of gendered organizations. Gender & Society, 4(2), 139–158. https://doi.org/10.1177/089124390004002002
Acker, J. (2006). Inequality regimes: Gender, class, and race in organizations. Gender & Society, 20(4), 441–464. https://doi.org/10.1177/0891243206289499
African Union Commission. (2020). Digital Transformation Strategy for Africa (2020-2030). African Union. https://au.int/en/documents/20200518/digital-transformation-strategy-africa-2020-2030
Bourdieu, P. (1986). The forms of capital. In J. G. Richardson (Ed.), Handbook of theory and research for the sociology of education (pp. 241–258). Greenwood.
Brown, T., Miller, L., & Garcia, S. (2021). Certification bodies and diversity initiatives in tech. Journal of Professional Development in Technology, 15(2), 112-128.
Capodilupo, C. M., Nadal, K. L., Corman, L., Hamit, S., Lyons, O. B., & Weinberg, A. (2010). The manifestation of gender microaggressions. In D. W. Sue (Ed.), Microaggressions and marginality: Manifestation, dynamics, and impact (pp. 193-216). Wiley.
Cheryan, S., Ziegler, S. A., Montoya, A. K., & Jiang, L. (2017). Why are some STEM fields more gender balanced than others? Psychological Bulletin, 143(1), 1–35. https://doi.org/10.1037/bul0000052
Cohn, C. (2013). Women and wars: Towards a conceptual framework. In C. Cohn (Ed.), Women and wars (pp. 1-35). Polity Press.
Collins, P. H. (2015). Intersectionality's definitional dilemmas. Annual Review of Sociology, 41, 1–20. https://doi.org/10.1146/annurev-soc-073014-112142
Connell, R. W. (2005). Masculinities (2nd ed.). University of California Press.
Corbett, J., & Weber, A. (2016). What do I get? The everyday benefits of diversity in cybersecurity teams. Journal of Cybersecurity, 2(2), 121–132. https://doi.org/10.1093/cybsec/tyw007
Crenshaw, K. (1989). Demarginalizing the intersection of race and sex: A black feminist critique of antidiscrimination doctrine, feminist theory and antiracist politics. University of Chicago Legal Forum, 1989(1), Article 8. https://chicagounbound.uchicago.edu/uclf/vol1989/iss1/8
Cybersecurity Authority of Kenya (CAK). (2024). Annual Threat Landscape Report 2023. Government of Kenya.
Davis, E., & Lee, J. (2024). The male ally in male-dominated fields: A cybersecurity perspective. Sociological Studies of Work and Occupation, 40(1), 45-60.
Enloe, C. (2000). Maneuvers: The international politics of militarizing women's lives. University of California Press.
Faulkner, W. (2009). Doing gender in engineering workplace cultures. II. Gender in/authenticity and the in/visibility paradox. Engineering Studies, 1(3), 169–189. https://doi.org/10.1080/19378620903225059
Flanagan, J. C. (1954). The critical incident technique. Psychological Bulletin, 51(4), 327–358. https://doi.org/10.1037/h0061470
Global Information Security Workforce Study (GISWS). (2023). Women in Cybersecurity. (ISC)². https://www.isc2.org/Research/Workforce-Study
Kelan, E. K. (2009). Performing gender at work. Palgrave Macmillan.
Leicht, C., Rink, F., & Unger, T. (2023). Diversity in cybersecurity teams: A meta-analysis of performance effects. Computers & Security, 124, 102956. https://doi.org/10.1016/j.cose.2022.102956
Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340–363. https://doi.org/10.1086/226550
Nguyen, L., & Chen, K. (2023). Funding mechanisms and equity outcomes in STEM education. Policy Review Quarterly, 8(3), 201-215.
Owen, J., & Shakow, M. (2021). Intersectional barriers in African tech ecosystems: Gender, class, and geography. Information Technologies & International Development, 17, 1–15. https://itidjournal.org/index.php/itid/article/view/2113
Perlow, L. A. (1998). Boundary control: The social ordering of work and family time in a high-tech corporation. Administrative Science Quarterly, 43(2), 328–357. https://doi.org/10.2307/2393855
Regional IT Council. (2023). East African Digital Talent Report 2023. Unpublished industry consortium data.
Rottinghaus, P. J., Day, S. X., & Borgen, F. H. (2005). The Career Futures Inventory: A measure of career-related adaptability and optimism. Journal of Career Assessment, 13(1), 3–24. https://doi.org/10.1177/1069072704270271
Safaricom. (2023). Diversity in cybersecurity: Annual workforce report. https://www.safaricom.co.ke/sustainability
Serianu Ltd. (2023). Women in Cybersecurity: Kenya Retention Audit Report. Nairobi.
Settles, I. H., Buchanan, N. T., & Dotson, K. (2021). Scrutinized but not recognized: (In)visibility and hypervisibility experiences of faculty of color. Journal of Vocational Behavior, 126, 103492. https://doi.org/10.1016/j.jvb.2020.103492
Williams, J. C., Berdahl, J. L., & Vandello, J. A. (2014). Beyond work-life "integration". Annual Review of Psychology, 67, 515–539. https://doi.org/10.1146/annurev-psych-122414-033710
World Bank. (2022). Digital inclusion in Eastern Africa: Barriers and accelerators. World Bank Group. https://doi.org/10.1596/978-1-4648-1894-3
World Bank. (2024). Women, Business and the Law 2024. World Bank Group. https://wbl.worldbank.org
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Frontiers in Research

This work is licensed under a Creative Commons Attribution 4.0 International License.