National Consultant: ICT Systems Security Expert

Tags: Human Rights Law English
  • Added Date: Tuesday, 26 August 2025
  • Deadline Date: Sunday, 07 September 2025
5 Steps to get a job in the United Nations

Result of Serviceโ€ข Inception Meeting Conducted and Inception Report Finalized & Submitted to UNODC, incorporating scope, timelines, and methodology agreed with the Judiciary. โ€ข Capacity-Building Training Sessions Completed and Delivered for Developers/Database Administrators, covering secure development, database/application security, data center security, SDLC reviews, and data privacy compliance. โ€ข Cybersecurity Team Training Finalized and Delivered, including ethical hacking, system audits, SIEM/log correlation, digital forensics, and development of security policies, procedures, and incident response plans. โ€ข System Administrators Training Completed and Delivered, focusing on on-premise and cloud server security, hardening techniques, encryption practices, and container/Kubernetes security. โ€ข Network Administrators Training Successfully Conducted and Finalized, with delivery of sessions on network security architecture, firewalls, IDS/IPS, secure remote access, DDoS protection, and Zero Trust Architecture recommendations. Work LocationNairobi, Kenya Expected duration30 Working Days; 01 October - 30 November 2025 Duties and Responsibilities1. Background of the Assignment As the global guardian of the United Nations standards and norms in Crime Prevention and Criminal Justice, UNODC seeks to strengthen the rule of law through the prevention of crime and the promotion of fair, humane, and accountable criminal justice systems. To do this, UNODC provides Member States with expertise and advice to develop effective and responsible crime prevention strategies and policies and to build the capacity of their criminal justice systems to operate more effectively within the framework of the rule of law, while promoting human rights and protecting vulnerable groups. Within the framework of the Crime Prevention and Criminal Justice Programme, UNODCโ€™s project titled โ€œProgramme for Legal Empowerment and Aid Delivery (PLEAD) Phase II, and seeks to โ€œReinforce the rule of law, improve access to justice, increase efficiency and accountability in the justice system and use of technology as an enabler of justiceโ€ while addressing capacity needs and persistent bottlenecks affecting service delivery in the justice sector, advance digitalization to streamline the administration of justice and countering corruption to improve access to justice for all Kenyans, including those at risk of exclusion and marginalization. The PLEAD II component implemented by UNODC targets support to the following institutions in the justice chain (national partners): National Council on the Administration of Justice (NCAJ), Judiciary, Office of the Director of Public Prosecutions (ODPP), Probation and Aftercare Service (PACS), Witness Protection Agency (WPA), Directorate of Children Services (DCS), Ethics and Anti-Corruption Commission (EACC), Kenya Prisons Service (KPS) and National Police Service (NPS). On the other hand, the United Nations Development Programme (UNDP) will support Civil Society Organisations (CSOs) through its flagship Amkeni Wakenya facility. 2. Purpose of the Assignment Judiciary systems are high-value targets for cyberattacks due to the sensitive and confidential data they handle. Breaches could lead to loss of trust, delays in justice, and legal repercussions. Currently, there are gaps in structured training and incident response preparedness across the Judiciaryโ€™s ICT workforce. System developers, administrators, network engineers, and cybersecurity officers require specialised training to secure digital justice infrastructure effectively. 3. Specific Tasks to be performed by the consultant: The consultant will work under the overall supervision of the Head of the Crime Prevention and Criminal Justice Programme, UNODC ROEA, direct supervision of the Programme Manager in coordination with the Programme officers and work closely with the Judiciary in performing the following substantive duties and responsibilities. In this regard, the UNODC seeks to strengthen the Judiciary's ICT systems through enabling the development of a security by design capacity building model with the following objectives: a. Build capacity in secure system development and Security by Design b. Train system administrators on server and infrastructure hardening c. Equip network engineers with skills to protect the Judiciaryโ€™s network perimeter d. Confidence building & empowerment of cybersecurity staff to carry out audits, ethical hacking, and incident response. The consultant shall perform the following tasks: a. Inception Meeting and Report: Undertake an inception meeting with the relevant stakeholders at the Judiciary to review the scope, timelines and methodology of work. Draft and submit to UNODC the inception report. b. Capacity building in Security-by-Design and Cybersecurity will be separately undertaken for four different target beneficiaries as identified below: 1. Developers/ Database administrators on various components identified below: i. Application and Database Security by Design ๏ƒ˜ Secure development of web-based systems, including practical elements focused on preventing vulnerabilities such as Cross-Site Scripting (XSS), SQL injection (SQLi), and other common web attacks. ๏ƒ˜ Identity & Access Management (IAM), including: โ€ข Role-Based Access Control (RBAC), MFA, and least privilege enforcement. โ€ข Session management & credential storage best practices. ii. Data Center Security (Physical & Logical), including: โ€ข Review of access controls, surveillance, environmental controls, and redundancy. โ€ข Data encryption (at rest & in transit), backup security, and key management. iii. Secure Software Development Lifecycle Reviews, including: โ€ข Threat modelling for CTS, e-Filing, Jumuika ERP, and e-Payments. โ€ข Code review & SAST/DAST (Static & Dynamic Application Security Testing). โ€ข API security assessment (authentication, rate limiting, input validation). iv. Data Privacy & Compliance, including: โ€ข Alignment with Kenyaโ€™s Data Protection Act (2019) and GDPR and in collaboration with ODPC (if applicable). โ€ข Data classification, retention policies, and audit logging. 2. Cybersecurity team on various components identified below: i. Ethical hacking and system audits by training the cybersecurity team on: โ€ข Vulnerability scanning and penetration testing โ€ข SIEM systems and log correlation โ€ข Data loss prevention and secure auditing โ€ข Digital forensics and incident response planning ii. Security Policies & Procedures, including: โ€ข Development of Incident Response Plan (IRP), BCP, and DRP. โ€ข Security baselines & configuration management. iii. Practical workshops covering: โ€ข Secure coding training for Judiciary developers. โ€ข Phishing simulation & cybersecurity awareness for staff. 3. System Administrators Team on various components identified below: i. Train the on-Server Security (On-Prem & Cloud), including: โ€ข Hardening of physical and virtual servers (OS, middleware, databases). โ€ข Cloud security posture review (IAM, encryption, logging, CSPM). โ€ข Container & Kubernetes security (if applicable). 4. Network administrators on various components identified below: i. Train the Network Team in Network Security Architecture, including: โ€ข Review of network segmentation, firewalls, IDS/IPS, VPNs, and secure remote access. โ€ข Recommendations for Zero Trust Architecture (ZTA) implementation. โ€ข Assessment of DDoS protection, traffic monitoring, and secure DNS configurations. Qualifications/special skillsAn advanced university degree in Cybersecurity, Computer Science, Computer Engineering or a related field is required (Masterโ€™s or equivalent). A first level university degree is required in Civil Engineering or similar fields in combination with two additional years of qualifying experience may be accepted in lieu of the advanced university degree. a. A minimum of five years of progressively responsible professional experience in ICT Security/cybersecurity is required. b. Experience in penetration testing and vulnerability assessments, IDS/Firewalls/VPN Administration, content filers, Security scan tools, Network and Systems, servers etc is required c. Experience in enterprise security document creation is required. d. Experience in designing and delivering employee security awareness training is desirable. e. Experience in developing Business Continuity Plans and Disaster Recover is desirable. LanguagesEnglish and French are the working languages of the United Nations Secretariat. For this position, fluency in oral and written English is required. Knowledge of other United Nations Secretariat languages is an advantage. Additional InformationNot available. No FeeTHE UNITED NATIONS DOES NOT CHARGE A FEE AT ANY STAGE OF THE RECRUITMENT PROCESS (APPLICATION, INTERVIEW MEETING, PROCESSING, OR TRAINING). THE UNITED NATIONS DOES NOT CONCERN ITSELF WITH INFORMATION ON APPLICANTSโ€™ BANK ACCOUNTS.

๐Ÿ“š ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—š๐—ฒ๐˜ ๐—ฎ ๐—๐—ผ๐—ฏ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐—ถ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ! ๐ŸŒ๐Ÿค ๐—ฅ๐—ฒ๐—ฎ๐—ฑ ๐—ผ๐˜‚๐—ฟ ๐—ก๐—˜๐—ช ๐—ฅ๐—ฒ๐—ฐ๐—ฟ๐˜‚๐—ถ๐˜๐—บ๐—ฒ๐—ป๐˜ ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ฒ๐˜€๐˜ ๐˜€๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—จ๐—ก๐—›๐—–๐—ฅ, ๐—ช๐—™๐—ฃ, ๐—จ๐—ก๐—œ๐—–๐—˜๐—™, ๐—จ๐—ก๐——๐—ฆ๐—ฆ, ๐—จ๐—ก๐—™๐—ฃ๐—”, ๐—œ๐—ข๐—  ๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜๐—ต๐—ฒ๐—ฟ๐˜€! ๐ŸŒ

โš ๏ธ ๐‚๐ก๐š๐ง๐ ๐ž ๐˜๐จ๐ฎ๐ซ ๐‹๐ข๐Ÿ๐ž ๐๐จ๐ฐ: ๐๐จ๐ฐ๐ž๐ซ๐Ÿ๐ฎ๐ฅ ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ ๐ก๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐š ๐ฃ๐จ๐› ๐ข๐ง ๐ญ๐ก๐ž ๐”๐ง๐ข๐ญ๐ž๐ ๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐๐Ž๐–!

Recommended for you