Historique

Instructions to Applicants: Click on the "Apply now" button. Input your information in the appropriate Sections: personal information, language proficiency, education, resume and motivation. Upon completion of the first page, please hit "submit application" tab at the end of the page. Please ensure that CV or P11 and the Cover letter are combined in one file.

The following documents shall be required from the applicants:

Personal CV or P11, indicating all past positions held and their main underlying functions, their durations (month/year), the qualifications, as well as the contact details (email and telephone number) of the Candidate, and at least three (3) the most recent professional references of previous supervisors. References may also include peers.

A cover letter (maximum length: 1 page) indicating why the candidate considers him-/herself to be suitable for the position.

Managers may ask (ad hoc) for any other materials relevant to pre-assessing the relevance of their experience, such as reports, presentations, publications, campaigns or other materials.

 

Office/Unit/Project Description

The United Nations Development Programme is the global development agency of the United Nations system that operates in 177 countries. To support the UNDP Digital Strategy 2022-2025 and enable the digital transformation of the organization, the Information and Technology management (ITM) office is tasked with developing and operating the enabling corporate technology platforms and providing related services that power the digital transformation including: (1) advice, administration and operation to promote delivery of maximum business value of each platform; (2) a global service desk operation; (3) and outreach services and capacity building activities to promote knowledge sharing and effective, agile planning and governance of technology development and utilization.

Within the Office of Information and Technology Management (ITM), The Cyber Security office is responsible for managing the information security risks for UNDP. As organizations face increasingly sophisticated?cyberattacks, the office works to strengthen UNDP's cybersecurity protection, both in terms of human resources and systems.?This involves scanning systems for potential risks, adopting innovative solutions to advance our IT infrastructure as well as training employees to adopt safe cybersecurity practices.

 

Institutional Arrangement

The Information Security Specialist will report to the Deputy Chief Information Security Officer.

Devoirs et responsabilités

Scope of Work

Under the Supervision of the Deputy Chief Information Security Officer, the Information Security Specialist is responsible for comprehensive incident handling in accordance with policy and guidelines which includes how incidents are defined, reported, verified, tracked, contained, and recovered.  Specifically the incumbent will be involved with:

·       Developing solutions to automate cybersecurity tasks using Python 

·       Maintaining a variety of cloud-native security solutions, including but not limited to: Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), Develop automation pipelines and custom scripts to reduce manual labor and minimize human error. 

·       Monitoring and evaluating events, alerts, and notifications from the cyber security infrastructure for indications of suspicious/unauthorized activity.

·       Responding to detected or reported cyber security incidents.  

·       Monitoring vendor and industry alerts, warnings, and security advisories, and follow up with appropriate system and service owners within the organization to ensure that corresponding risks are mitigated. 

·       Promoting security best practices and plan security awareness trainings.

Preparing and presenting other related in-house trainings on cybersecurity topics for broad range of audiences.  

Compétences

Core

Achieve Results:

LEVEL 3: Set and align challenging, achievable objectives for multiple projects, have lasting impact

Think Innovatively:

LEVEL 3: Proactively mitigate potential risks, develop new ideas to solve complex problems

Learn Continuously:

LEVEL 3: Create and act on opportunities to expand horizons, diversify experiences

Adapt with Agility:

LEVEL 3: Proactively initiate and champion change, manage multiple competing demands

Act with Determination:

LEVEL 3: Think beyond immediate task/barriers and take action to achieve greater results

Engage and Partner:

LEVEL 3: Political savvy, navigate complex landscape, champion inter-agency collaboration

Enable Diversity and Inclusion:

LEVEL 3: Appreciate benefits of diverse workforce and champion inclusivity

 

Cross-Functional & Technical competencies

Thematic Area

Name

Definition

Information Management & Technology

IT Security Management

Knowledge of Cyber Security technologies, processes, techniques and tools. Apply practical innovations to solve cybersecurity problems. Capability to keep UNDP systems and data safe. Knowledge of ISO 27001, ISO 27701 and ISO 22301 principles. CSSIP, CISM, CISA or equivalent certification desirable.

Digital & Innovation

Data governance

Knowledge of data science, skills to develop data management tools, organize and maintain databases and operate data visualization technologies

Digital & Innovation

Digital identity & wellbeing

Knowledge of issues around digital identity and digital wellbeing and the ability to advise safe/healthy practices in regards to these areas.

Information Management & Technology

IT Customer Support

Ability to support customers on IT related issues and generate and contribute to continuous improvement processes to deliver a great user experience. Knowledge of ISO 9001 desirable. ITIL of ISO 20000 certification or similar is desirable.

Qualifications et expériences requises

Min. Academic Education

  • Master’s Degree in Information Technology, Computer Science or Engineering, or related discipline with 5 years of relevant experience
  • or Bachelor’s degree with 7 years of experience can be considered

Min. years of relevant Work experience

  • With Master`s degree 5 years of relevant work experience preferably in the areas of data management, computer science, DevOps, or related activities at national or international level.
  • With Bachelor`s degree 7 years of relevant work experience preferably in the areas of data management, computer science, DevOps, or related activities at national or international level.

Required  skills and competencies

  • Strong knowledge of cybersecurity fundamentals and experience in operating cybersecurity threat detection systems is required;
  • Ability to develop and formally present security related information and new cybersecurity policies to management and IT managers to  facilitate comprehension and decision-making is required;
  • Strong analytical skills and familiarity with the analysis of competing hypotheses is required.

Desired additional skills and competencies

  • Experience in the field of Cyber Threat Intelligence is desired; 
  • Operational experience working with threat detection and incident response systems is desired;
  • Knowledge of international standards and best practices in cybersecurity, risk, and service management (ISO 27001:2022, 9001:2015, 20000:2011, 22301:2012, 27701:2020) is desired;
  • Experience in providing security related training to users in the form of webinars is desired;
  • Actively works towards continuing personal learning and development and application of newly acquired skills is desired;
  • UN work experience is desired

Required Language(s) (at working level)

  • Fluency in English is required;
  • Working knowledge of other UN language is desired

Professional Certificates

  • n/a