By continuing to browse this site, you agree to our use of cookies. Read our privacy policy

Information Systems Officer (Cyber Security Officer)

Geneva

  • Organization: UN OHCHR - Office of the High Commissioner for Human Rights
  • Location: Geneva
  • Grade: Mid level - P-4, International Professional - Internationally recruited position
  • Occupational Groups:
    • Information Technology and Computer Science
    • Security and Safety
    • Information and Telecommunication TechnologyInformation and Telecommunication Technology
  • Closing Date: Closed

Special Notice

Staff members are subject to the authority of the Secretary-General and to assignment by him or her. In this context, all staff are expected to move periodically to new functions in their careers in accordance with established rules and procedures. Extension of the appointment is subject to Extension of the mandate and/or the availability of the funds.

The United Nations Secretariat is committed to achieving 50/50 gender balance in its staff. Female candidates are strongly encouraged to apply for this position.

Org. Setting and Reporting

This position is located within the Information Systems Management Section (ISMS) of the International, Impartial and Independent Mechanism to Assist in the Investigation and Prosecution of Persons Responsible for the Most Serious Crimes under International Law Committed in the Syrian Arab Republic since March 2011 (IIIM) located in Geneva, Switzerland. The Cyber Security Officer is responsible for protecting and defending the information systems of the IIIM, developing and implementing an Information Governance Plan in conjunction with key stakeholders, and participating in other technical and strategic activities. The Cyber Security Officer will be under the direct supervision of the Chief of the ISMS.

Responsibilities

Within delegated authority, the Cyber Security Officer will be responsible for the following duties:

1) Actively defend the information systems of the IIIM by:
•Documenting and advising all staff of known, likely, and potential security threats with particular responsibility for cyber threats, including directly advising the Head;
•Making critical, timely decisions regarding practices, tools, policies, and other areas to protect and defend the IIIM's information systems;
•Providing metrics and reports regarding the performance and value of all information security tools;
•Conducting the investigation, communication, documentation, and resolution of information security incidents and assessing and correcting those incidents, performing driving root cause analysis to prevent future occurrences;
•Ensuring audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements;
•Adopting appropriate standards regarding information security issues arising from the use, development and implementation of information and communications systems, software applications and IT infrastructure;
•Responding in real-time to attacks, breaches, vulnerabilities, and threats;
•Working with software and hardware vendors to ensure prompt updating of products with appropriate patches, fixes, and upgrades, as needed;
•Developing and ensuring compliance with policies for information security;
•Coordinating with external security auditors and penetration testers to verify security of the Mechanism’s information systems and to identify and remedy vulnerabilities.

2) Collaborate with other key stakeholders to develop a comprehensive Information Governance Plan by:
•Designing a security architecture for the software, database, and information systems required by the IIIM;
•Developing a data protection policy and ensuring compliance with applicable data protection regulations;
•Implementing and enforcing the Information Governance Plan and related policies.

3) Participate in other technical and strategic activities by:
•Participating in selecting, recruiting, and hiring IIIM technical staff;
•Designing and directing a Cyber Security Operations Center, including developing and implementing hiring plan;
•Participating in procurement process, including making recommendations to Information Systems Manager and Head about software, hardware, and technology.

Competencies

PROFESSIONALISM: Knowledge of systems design, and development, management, implementation and maintenance of complex information systems. Leadership ability and expertise in cyber security at an enterprise level. Understanding of current threat modeling and risk assessment techniques. In-depth knowledge of state actor attack capabilities, hacking tools, and monitoring capabilities. Knowledge of information technology security architecture across a variety of platforms, including: firewalls, intrusion prevention systems, SSL certificates, proxy and content filtering technologies, databases, and third party storage providers (“cloud services”). Knowledge of tools and techniques used for threat and risk assessment (e.g., CRAM or COBRA). Knowledge of IT-governance best practices, such as ITIL. Excellent analytical capacity. Shows pride in work and in achievements; demonstrates professional competence and mastery of subject matter; is conscientious and efficient in meeting commitments, observing deadlines and achieving results; is motivated by professional rather than personal concerns; shows persistence when faced with difficult problems or challenges; remains calm in stressful situations. Takes responsibility for incorporating gender perspectives and ensuring the equal participation of women and men in all areas of work.

TEAMWORK: Works collaboratively with colleagues to achieve organizational goals; solicits input by genuinely valuing others’ ideas and expertise; is willing to learn from others; places team agenda before personal agenda; supports and acts in accordance with final group decision, even when such decisions may not entirely reflect own position; shares credit for team accomplishments and accepts joint responsibility for team shortcomings.

PLANNING & ORGANIZING: Develops clear goals that are consistent with agreed strategies; identifies priority activities and assignments; adjusts priorities as required; allocates appropriate amount of time and resources for completing work; foresees risks and allows for contingencies when planning; monitors and adjusts plans and actions as necessary; uses time efficiently.

TECHNOLOGICAL AWARENESS: Keeps abreast of available technology; understands applicability and limitation of technology to the work of the office; actively seeks to apply technology to appropriate tasks; shows willingness to learn new technology.

Education

Advanced university degree (Master’s or equivalent degree), in computer science, information security, network administration, or related area. A first level university degree in combination with two additional years of qualifying experience may be accepted in lieu of the advanced university degree. Certification from a recognized professional body or authority in cyber security (Certifications such as CISSP, CISM, or CISM-equivalent) and on-the-job training in cyber security is desirable. Certification in Penetration Testing, such as the Global Information Assurance Certified Penetration Tester (GPEN; GIAC) is an asset.

Work Experience

A minimum of seven years of progressively responsible work experience in cyber security with a minimum of two years in cyber security management, planning, or system design is required. Experience in enterprise-level cyber security under extreme threat models, and experience in applied security techniques such as defense against potential and actual cyber-attacks; as well as experience detecting network incursions, are required. Experience designing cyber security policies at an enterprise level and experience deploying technology and policies to defend against risks, both in advance and in real time, are required. Experience designing, maintaining, and enforcing data protection policies, including compliance with the GDPR is desirable. Experience selecting and procuring software in an enterprise-level organization is an asset.

Languages

English and French are the working languages of the United Nations Secretariat. For the position advertised, fluency in English is required. Knowledge of Arabic is desirable.

Assessment

Evaluation of qualified candidates may include an assessment exercise which will be followed by competency-based interview.

United Nations Considerations

According to article 101, paragraph 3, of the Charter of the United Nations, the paramount consideration in the employment of the staff is the necessity of securing the highest standards of efficiency, competence, and integrity, including but not limited to, respect for international human rights and humanitarian law. Candidates may be subject to screening against these standards, including but not limited to, whether they have committed or are alleged to have committed criminal offences or violations of international human rights law and international humanitarian law.

Due regard will be paid to the importance of recruiting the staff on as wide a geographical basis as possible. The United Nations places no restrictions on the eligibility of men and women to participate in any capacity and under conditions of equality in its principal and subsidiary organs. The United Nations Secretariat is a non-smoking environment.

Applicants are urged to follow carefully all instructions available in the online recruitment platform, inspira. For more detailed guidance, applicants may refer to the At-a-Glance on "The Application Process" and the Instructional Manual for the Applicants, which can be accessed by clicking on “Manuals” hyper-link on the upper right side of the inspira account-holder homepage.

The screening and evaluation of applicants will be conducted on the basis of the information submitted in the application according to the evaluation criteria of the job opening and the applicable internal legislations of the United Nations including the Charter of the United Nations, resolutions of the General Assembly, the Staff Regulations and Rules, administrative issuances and guidelines. Applicants must provide complete and accurate information pertaining to their personal profile and qualifications, including but not limited to, their education, work experience, and language skills, according to the instructions provided on inspira. Applicants will be disqualified from consideration if they do not demonstrate in their application that they meet the evaluation criteria of the job opening and the applicable internal legislations of the United Nations. Applicants are solely responsible for providing complete and accurate information at the time of application: no amendment, addition, deletion, revision or modification shall be made to applications that have been submitted. Candidates under serious consideration for selection will be subject to a reference-checking process to verify the information provided in the application.

Job openings advertised on the Careers Portal will be removed at midnight (New York time) on the deadline date.

No Fee

THE UNITED NATIONS DOES NOT CHARGE A FEE AT ANY STAGE OF THE RECRUITMENT PROCESS (APPLICATION, INTERVIEW MEETING, PROCESSING, OR TRAINING). THE UNITED NATIONS DOES NOT CONCERN ITSELF WITH INFORMATION ON APPLICANTS’ BANK ACCOUNTS.

This vacancy is now closed.
However, we have found similar vacancies for you: