Cyber Security Officer (Temporary Job Opening), P-4 At United Nations

Job Expired

More Information

Org. Setting and Reporting

The United Nations Global Service Centre (UNGSC) provides critical Supply Chain, Geospatial, Information and Telecommunications Technologies services and Training to all Secretariat Entities, Peacekeeping and Special Political missions, Agencies, Funds and Programmes of the UN system worldwide. This position is located in the Digital Compliance and Assurance Unit (DCAU) within the Service and Information Security Management Section (SISMS) of the Service for Geospatial, Information Technology and Telecommunication (SGITT) at the UNGSC, Brindisi. Italy. The incumbent will report to the Chief SISMS or other designated officer. Specialty: Vulnerability Management – Introduction and Work Interactions Vulnerability Management is the process of proactively identifying and remediating known vulnerabilities in the Organization. The Cyber Security Vulnerability Management Specialist is responsible for identifying, analyzing, and mitigating vulnerabilities in an organization’s computer systems, networks, and applications. This involves performing regular scans and assessments of the organization’s infrastructure to identify potential vulnerabilities, prioritizing, and categorizing the risks, and developing and implementing plans to remediate or mitigate them. The Cyber Security Vulnerability Management Specialist establishes and maintains relationships with the cyber security team members and other relevant staff within the same entity, as well as with the office of Information and Communications Technology. The specialist reports on activities, get instructions, coordinates, exchanges information, collects data, and provides specific and thematic information. The Vulnerability Management Specialist also establishes and maintains external relations with counterparts in other UN system organizations and agencies to exchange relevant information.

Responsibilities

– Manage the entire lifecycle of vulnerabilities from discovery, triage, assessment, monitoring, remediation, and validation. – Develop procedures for the Organization on patch and vulnerability management, including automated patch deployment, assessment procedures, and procedures for remediation. – Perform comprehensive vulnerability assessments and continuous monitoring across the organization to identify weaknesses and determine the need for security updates and fixes and advise risk management leadership team. – Work with different units to effectively communicate the risks of identified vulnerabilities and make recommendations regarding the selection of cost-effective security controls to mitigate identified vulnerabilities. – Coordinate with appropriate teams to ensure prioritization of patching and mitigations to vulnerabilities. – Coordinate with external security auditors and penetration testers to verify security of information systems and to identify and remedy vulnerabilities. – Create and maintain inventory reports and alerts using inventory, vulnerability, and patch management systems – Perform cyber security self-assessments based on Organization standards in preparation for audits, security assessments, or penetration tests. – Work together with the Threat and Incident management team in case of purple teaming exercises e.g., simulate security breaches, test detection and response capabilities. – Keep abreast of the current and emerging security issues, risks, threats, vulnerabilities, and advancements in cyber security techniques and technologies. – Participate in the activities related to changes to the Organization, business processes, information processing facilities and systems to ensure that effective internal controls are in place. – Collects and analyzes data to identify trends or patterns and provides insights through graphs, charts, tables and reports using data visualization methods to enable data-driven planning, decision-making, presentation and reporting.

Competencies

Professionalism: Shows pride in work and in achievements. Demonstrates professional competence and mastery of subject matter. Is conscientious and efficient in meeting commitments, observing deadlines and achieving results. Is motivated by professional rather than personal concerns. Shows persistence when faced with difficult problems or challenges; remains calm in stressful situations. Gender: Takes responsibility for incorporating gender perspectives and ensuring the equal participation of women and men in all areas of work. Knowledge of Cyber Security industry standards, methodologies and frameworks and ability to adapt and integrate subsequent changes. Knowledge of and ability to apply cyber security and privacy principles and requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation; Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks. Knowledge of cyber threats, network and application security principles, common vulnerabilities, and exploits. Ethics. Working collaboratively. Ability to give constructive feedback. Ability to analyze and interpret data in support of decision-making and convey resulting information to management. Technological Awareness: Keeps abreast of available technology; understands applicability and limitation of technology to the work of the office; actively seeks to apply technology to appropriate tasks; shows willingness to learn new technology. Judgement/Decision Making: Identifies the key issues in a complex situation and comes to the heart of the problem quickly. Gathers relevant information before making a decision. Considers positive and negative impacts of decisions prior to making them. Takes decisions with an eye to the impact on others and on the Organization. Proposes a course of action or makes a recommendation based on all available information. Checks assumptions against facts. Determines that the actions proposed will satisfy the expressed and underlying needs for the decision. Makes tough decisions when necessary.

Education

An advanced university degree (Master’s degree or equivalent) in computer science, information systems, mathematics, statistics, information security, cyber security, or a related field is required. A first-level university degree (Bachelor’s degree or equivalent) in combination with additional two years of qualifying experience may be accepted in lieu of the advanced university degree. .

Job – Specific Qualification

An active certificate in Certified Information Systems Security Professional (CISSP) is required. Successful completion of both degree and non-degree programs in data analytics, business analytics or data science programs is desirable

Work Experience

Demonstrate a minimum of seven years of progressively responsible experience only for the knowledge, skills, and abilities below labelled with is required. Demonstrated ability to identify systemic security issues based on the analysis of vulnerability and configuration data is required. Demonstrated skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, etc.) and penetration testing tools and techniques is required. Experience in data analytics or related areas is desirable

Languages

English and French are the working languages of the United Nations Secretariat. For the position advertised, fluency in English is required.

Assessment

Evaluation of qualified candidates may include an assessment exercise which may be followed by competency-based interview.

Special Notice

United Nations Considerations

According to article 101, paragraph 3, of the Charter of the United Nations, the paramount consideration in the employment of the staff is the necessity of securing the highest standards of efficiency, competence, and integrity. Candidates will not be considered for employment with the United Nations if they have committed violations of international human rights law, violations of international humanitarian law, sexual exploitation, sexual abuse, or sexual harassment, or if there are reasonable grounds to believe that they have been involved in the commission of any of these acts. The term “sexual exploitation” means any actual or attempted abuse of a position of vulnerability, differential power, or trust, for sexual purposes, including, but not limited to, profiting monetarily, socially or politically from the sexual exploitation of another. The term “sexual abuse” means the actual or threatened physical intrusion of a sexual nature, whether by force or under unequal or coercive conditions. The term “sexual harassment” means any unwelcome conduct of a sexual nature that might reasonably be expected or be perceived to cause offence or humiliation, when such conduct interferes with work, is made a condition of employment or creates an intimidating, hostile or offensive work environment, and when the gravity of the conduct warrants the termination of the perpetrator’s working relationship. Candidates who have committed crimes other than minor traffic offences may not be considered for employment. Due regard will be paid to the importance of recruiting the staff on as wide a geographical basis as possible. The United Nations places no restrictions on the eligibility of men and women to participate in any capacity and under conditions of equality in its principal and subsidiary organs. The United Nations Secretariat is a non-smoking environment. Reasonable accommodation may be provided to applicants with disabilities upon request, to support their participation in the recruitment process. By accepting a letter of appointment, staff members are subject to the authority of the Secretary-General, who may assign them to any of the activities or offices of the United Nations in accordance with staff regulation 1.2 (c). Further, staff members in the Professional and higher category up to and including the D-2 level and the Field Service category are normally required to move periodically to discharge functions in different duty stations under conditions established in ST/AI/2023/3 on Mobility, as may be amended or revised. This condition of service applies to all position specific job openings and does not apply to temporary positions. Applicants are urged to carefully follow all instructions available in the online recruitment platform, inspira, and to refer to the Applicant Guide by clicking on “Manuals” in the “Help” tile of the inspira account-holder homepage. The evaluation of applicants will be conducted on the basis of the information submitted in the application according to the evaluation criteria of the job opening and the applicable internal legislations of the United Nations including the Charter of the United Nations, resolutions of the General Assembly, the Staff Regulations and Rules, administrative issuances and guidelines. Applicants must provide complete and accurate information pertaining to their personal profile and qualifications according to the instructions provided in inspira to be considered for the current job opening. No amendment, addition, deletion, revision or modification shall be made to applications that have been submitted. Candidates under serious consideration for selection will be subject to reference checks to verify the information provided in the application. Job openings advertised on the Careers Portal will be removed at 11:59 p.m. (New York time) on the deadline date.

No Fee

THE UNITED NATIONS DOES NOT CHARGE A FEE AT ANY STAGE OF THE RECRUITMENT PROCESS (APPLICATION, INTERVIEW MEETING, PROCESSING, OR TRAINING). THE UNITED NATIONS DOES NOT CONCERN ITSELF WITH INFORMATION ON APPLICANTS’ BANK ACCOUNTS.

How to apply

https://careers.un.org/jobSearchDescription/248159?language=en

  • This job has expired!
Share this job