Information Systems Officer (Cyber Security Officer)

GENEVAP-4Information and Telecommunication TechnologyInformation and Telecommunication Technology




Core Value

Integrity, Professionalism, Respect for Diversity

General Information

Staff members are subject to the authority of the Secretary-General and to assignment by him or her. In this context, all staff are expected to move periodically to new functions in their careers in accordance with established rules and procedures. Extension of the appointment is subject to Extension of the mandate and/or the availability of the funds.

The United Nations Secretariat is committed to achieving 50/50 gender balance in its staff. Female candidates are strongly encouraged to apply for this position.


This position is located within the Information Systems Management Section (ISMS) of the International, Impartial and Independent Mechanism to Assist in the Investigation and Prosecution of Persons Responsible for the Most Serious Crimes under International Law Committed in the Syrian Arab Republic since March 2011 (IIIM) located in Geneva, Switzerland. The Cyber Security Officer is responsible for protecting and defending the information systems of the IIIM, developing and implementing an Information Governance Plan in conjunction with key stakeholders, and participating in other technical and strategic activities. The Cyber Security Officer will be under the direct supervision of the Chief of the ISMS.


Within delegated authority, the Cyber Security Officer will be responsible for the following duties:

1) Actively defend the information systems of the IIIM by:
•Documenting and advising all staff of known, likely, and potential security threats with particular responsibility for cyber threats, including directly advising the Head;
•Making critical, timely decisions regarding practices, tools, policies, and other areas to protect and defend the IIIM's information systems;
•Providing metrics and reports regarding the performance and value of all information security tools;
•Conducting the investigation, communication, documentation, and resolution of information security incidents and assessing and correcting those incidents, performing driving root cause analysis to prevent future occurrences;
•Ensuring audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements;
•Adopting appropriate standards regarding information security issues arising from the use, development and implementation of information and communications systems, software applications and IT infrastructure;
•Responding in real-time to attacks, breaches, vulnerabilities, and threats;
•Working with software and hardware vendors to ensure prompt updating of products with appropriate patches, fixes, and upgrades, as needed;
•Developing and ensuring compliance with policies for information security;
•Coordinating with external security auditors and penetration testers to verify security of the Mechanism’s information systems and to identify and remedy vulnerabilities.

2) Collaborate with other key stakeholders to develop a comprehensive Information Governance Plan by:
•Designing a security architecture for the software, database, and information systems required by the IIIM;
•Developing a data protection policy and ensuring compliance with applicable data protection regulations;
•Implementing and enforcing the Information Governance Plan and related policies.

3) Participate in other technical and strategic activities by:
•Participating in selecting, recruiting, and hiring IIIM technical staff;
•Designing and directing a Cyber Security Operations Center, including developing and implementing hiring plan;
•Participating in procurement process, including making recommendations to Information Systems Manager and Head about software, hardware, and technology.


PROFESSIONALISM: Knowledge of systems design, and development, management, implementation and maintenance of complex information systems. Leadership ability and expertise in cyber security at an enterprise level. Understanding of current threat modeling and risk assessment techniques. In-depth knowledge of state actor attack capabilities, hacking tools, and monitoring capabilities. Knowledge of information technology security architecture across a variety of platforms, including: firewalls, intrusion prevention systems, SSL certificates, proxy and content filtering technologies, databases, and third party storage providers (“cloud services”). Knowledge of tools and techniques used for threat and risk assessment (e.g., CRAM or COBRA). Knowledge of IT-governance best practices, such as ITIL. Excellent analytical capacity. Shows pride in work and in achievements; demonstrates professional competence and mastery of subject matter; is conscientious and efficient in meeting commitments, observing deadlines and achieving results; is motivated by professional rather than personal concerns; shows persistence when faced with difficult problems or challenges; remains calm in stressful situations. Takes responsibility for incorporating gender perspectives and ensuring the equal participation of women and men in all areas of work.

TEAMWORK: Works collaboratively with colleagues to achieve organizational goals; solicits input by genuinely valuing others’ ideas and expertise; is willing to learn from others; places team agenda before personal agenda; supports and acts in accordance with final group decision, even when such decisions may not entirely reflect own position; shares credit for team accomplishments and accepts joint responsibility for team shortcomings.

PLANNING & ORGANIZING: Develops clear goals that are consistent with agreed strategies; identifies priority activities and assignments; adjusts priorities as required; allocates appropriate amount of time and resources for completing work; foresees risks and allows for contingencies when planning; monitors and adjusts plans and actions as necessary; uses time efficiently.

TECHNOLOGICAL AWARENESS: Keeps abreast of available technology; understands applicability and limitation of technology to the work of the office; actively seeks to apply technology to appropriate tasks; shows willingness to learn new technology.


A minimum of seven years of progressively responsible work experience in cyber security with a minimum of two years in cyber security management, planning, or system design is required. Experience in enterprise-level cyber security under extreme threat models, and experience in applied security techniques such as defense against potential and actual cyber-attacks; as well as experience detecting network incursions, are required. Experience designing cyber security policies at an enterprise level and experience deploying technology and policies to defend against risks, both in advance and in real time, are required. Experience designing, maintaining, and enforcing data protection policies, including compliance with the GDPR is desirable. Experience selecting and procuring software in an enterprise-level organization is an asset.


Advanced university degree (Master’s or equivalent degree), in computer science, information security, network administration, or related area. A first level university degree in combination with two additional years of qualifying experience may be accepted in lieu of the advanced university degree. Certification from a recognized professional body or authority in cyber security (Certifications such as CISSP, CISM, or CISM-equivalent) and on-the-job training in cyber security is desirable. Certification in Penetration Testing, such as the Global Information Assurance Certified Penetration Tester (GPEN; GIAC) is an asset.


English and French are the working languages of the United Nations Secretariat. For the position advertised, fluency in English is required. Knowledge of Arabic is desirable.


Evaluation of qualified candidates may include an assessment exercise which will be followed by competency-based interview.