Consultant โ€“ Senior Cybersecurity engineer (International - HQA)

Tags: English language Environment
  • Added Date: Wednesday, 23 July 2025
  • Deadline Date: Wednesday, 06 August 2025
5 Steps to get a job in the United Nations

Result of ServiceThe consultant will support the development, implementation, and continuous improvement of cybersecurity operations and vulnerability management frameworks, ensuring alignment with international standards and organizational policies. Work LocationAmman - Jordan Expected durationup to 11 months Duties and ResponsibilitiesThe Consultant will be working with the Digital Risk team members, consultants and Field Information Security officers, to analyze and improve existing Cybersecurity operations capabilities. Specific Outputs/Tasks include but not limited to: Security Operations โ€ข Be responsible for management and improvement of the security technology and tools used. โ€ข Guide and coordinate with the Digital Risk team members, and Field Information Security officers, in the implementation of Cybersecurity Operations architecture โ€ข Coordinate and lead the triage, investigation, and resolution of security incidents in collaboration with other internal and external stakeholders. โ€ข Develop playbooks and runbooks to improve incident response workflows and ensure standardization. โ€ข Maintain up-to-date knowledge of current threat landscape and attack vectors relevant to UN operations. Vulnerability Management โ€ข Manage and improve vulnerability management processes and coordinate regular internal and external vulnerability assessments. โ€ข Collaborate with system owners and administrators to ensure timely remediation and verify the effectiveness of security patches and mitigations. โ€ข Develop dashboards and reporting tools to communicate risk posture to technical and non-technical stakeholders. Governance and Risk โ€ข Support the implementation of UN-wide information security policies, standards, and controls as they relate to operations and vulnerability management. โ€ข Contribute to risk assessments and audits by providing technical expertise and evidence of control effectiveness. Qualifications/special skillsThe Consultant will be working with the Digital Risk team members and will report to the Chief Digital Risk Officer consultants and Field Information Security officers, to analyze and improve existing Cybersecurity operations capabilities. Specific Outputs/Tasks include but not limited to: Security Operations โ€ข Be responsible for management and improvement of the security technology and tools used. โ€ข Guide and coordinate with the Digital Risk team members, and Field Information Security officers, in the implementation of Cybersecurity Operations architecture โ€ข Coordinate and lead the triage, investigation, and resolution of security incidents in collaboration with other internal and external stakeholders. โ€ข Develop playbooks and runbooks to improve incident response workflows and ensure standardization. โ€ข Maintain up-to-date knowledge of current threat landscape and attack vectors relevant to UN operations. Vulnerability Management โ€ข Manage and improve vulnerability management processes and coordinate regular internal and external vulnerability assessments. โ€ข Collaborate with system owners and administrators to ensure timely remediation and verify the effectiveness of security patches and mitigations. โ€ข Develop dashboards and reporting tools to communicate risk posture to technical and non-technical stakeholders. Governance and Risk โ€ข Support the implementation of UN-wide information security policies, standards, and controls as they relate to operations and vulnerability management. โ€ข Contribute to risk assessments and audits by providing technical expertise and evidence of control effectiveness. MINIMUM QUALIFICATIONS AND EXPERIENCE โ€ข A masterโ€™s degree, or equivalent in computer science, information security, information systems, engineering, or a related field. A first-level university degree in combination with two additional years of qualifying experience may be accepted in lieu of the advanced university degree. Excellent oral and written communications skill in English. Arabic language is an advantage. โ€ข A minimum of seven (7) years of progressively responsible experience in information security, including at least three (3) years in security operations or vulnerability management. โ€ข Unless currently serving as an international staff member in the UN Common System, candidates must have a minimum of two continuous years of relevant international experience gained outside UNRWA and outside the country(s) of citizenship. โ€ข Experience working in a complex international environment or multilateral organization is desirable. โ€ข Experience with industry-standard security tools (e.g., SIEM, vulnerability scanners, EDR) is required. โ€ข Experience with scripting or automation (e.g., Python, PowerShell, Bash) is an advantage. โ€ข Expert knowledge of implementing Microsoft Security technologies (Sentinel, Defender products). โ€ข Previous experience with implementing MITRE ATT&CK framework in the Security Operations and implementing Threat Intelligence programs. COMPETENCIES โ€ข Analytical Thinking โ€ข Technological Awareness โ€ข Results Driven/ Goal Oriented โ€ข Teamwork and Collaboration & Communication Skills โ€ข Continuous Learning โ€ข Creativity and innovation DELIVERABLES โ€ข Baseline assessment of cybersecurity tools and processes. Assessment of use case and playbooks in place. โ€ข Preparation of implementation of missing monitoring use cases. โ€ข Preparation and implementation of playbooks for automated incident response. โ€ข Building a framework for future SOC improvements and operations. โ€ข Expanding the vulnerability management process with third party and external monitoring. โ€ข Operationalization and documentation of all delivered services and improvements. CONDITIONS OF SERVICE โ€ข The selected candidate will be based in UNRWA HQA Amman - Jordan. โ€ข The duration of the Contract is up to 11 months, and the possibility of extension is subject to the availability of funds and continuing need and satisfactory performance. โ€ข The selected candidate will receive monthly fees equivalent to the UN international salary scale of P4 Step 1. โ€ข A minimum of seven (7) years of progressively responsible experience in information security, including at least three (3) years in security operations or vulnerability management. โ€ข Unless currently serving as an international staff member in the UN Common System, candidates must have a minimum of two continuous years of relevant international experience gained outside UNRWA and outside the country(s) of citizenship. โ€ข Experience working in a complex international environment or multilateral organization is desirable. โ€ข Experience with industry-standard security tools (e.g., SIEM, vulnerability scanners, EDR) is required. โ€ข Experience with scripting or automation (e.g., Python, PowerShell, Bash) is an advantage. โ€ข Expert knowledge of implementing Microsoft Security technologies (Sentinel, Defender products). โ€ข Previous experience with implementing MITRE ATT&CK framework in the Security Operations and implementing Threat Intelligence programs. Languagesโ— Fluent in spoken and written English. โ— Fluency in spoken and written Arabic is a plus. Additional InformationNot available. No FeeTHE UNITED NATIONS DOES NOT CHARGE A FEE AT ANY STAGE OF THE RECRUITMENT PROCESS (APPLICATION, INTERVIEW MEETING, PROCESSING, OR TRAINING). THE UNITED NATIONS DOES NOT CONCERN ITSELF WITH INFORMATION ON APPLICANTSโ€™ BANK ACCOUNTS.

๐Ÿ“š ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—š๐—ฒ๐˜ ๐—ฎ ๐—๐—ผ๐—ฏ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐—ถ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ! ๐ŸŒ๐Ÿค ๐—ฅ๐—ฒ๐—ฎ๐—ฑ ๐—ผ๐˜‚๐—ฟ ๐—ก๐—˜๐—ช ๐—ฅ๐—ฒ๐—ฐ๐—ฟ๐˜‚๐—ถ๐˜๐—บ๐—ฒ๐—ป๐˜ ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ฒ๐˜€๐˜ ๐˜€๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—จ๐—ก๐—›๐—–๐—ฅ, ๐—ช๐—™๐—ฃ, ๐—จ๐—ก๐—œ๐—–๐—˜๐—™, ๐—จ๐—ก๐——๐—ฆ๐—ฆ, ๐—จ๐—ก๐—™๐—ฃ๐—”, ๐—œ๐—ข๐—  ๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜๐—ต๐—ฒ๐—ฟ๐˜€! ๐ŸŒ

โš ๏ธ ๐‚๐ก๐š๐ง๐ ๐ž ๐˜๐จ๐ฎ๐ซ ๐‹๐ข๐Ÿ๐ž ๐๐จ๐ฐ: ๐๐จ๐ฐ๐ž๐ซ๐Ÿ๐ฎ๐ฅ ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ ๐ก๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐š ๐ฃ๐จ๐› ๐ข๐ง ๐ญ๐ก๐ž ๐”๐ง๐ข๐ญ๐ž๐ ๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐๐Ž๐–!

Recommended for you