OCIO-0033 Enterprise Cybersecurity Incident Manager (NS) - TUE 20 Feb
Mons, Wallonia, Belgium
Deadline Date: Tuesday 20 February 2024
Requirement: Enterprise Cybersecurity Incident Manager
Full time on-site: Yes
Time On-Site: 100%
Total Scope of the request (hours): 1764
Required Start Date: 1 April 2024
End Contract Date: 31 December 2024
Required Security Clearance: NATO SECRET
Note: For all Level-of-Effort and Completion-Type requests processed outside of the IWC Value Stream, and for which the contractor will not be reimbursed directly by OCIO for travel expenses, additional travel funding shall be allocated on a Not-to-exceed basis when the yearly Option is exercised
Annex A – Special Terms and Conditions
The contractor will be responsible for complying with the respective national requirements for working permits, visas, taxes, social security etc. whilst working on site at NATO HQ Brussels, Belgium.
No special status is either conferred or implied by the host organisation, NATO HQ Brussels, Belgium to the contractor whilst working on site.
The contractor will be responsible for complying with all the respective National Health COVID-19 regulations in Belgium before taking up the position.
The incumbent will work on the coordination of response to cybersecurity incidents involving Enterprise CIS and services, performed by the Office of the Chief Information Officer (OCIO). The incumbent will execute the follow-on activities through engagement with several NATO stakeholders, such as the NATO technical authorities, risk management authorities, and other relevant NATO entities across the Enterprise, including NATO risk managers, CIS Providers (CISPs), the NATO Cyber Threat Assessment Branch (CTAB) and the NATO Cyberspace Operations Centre (CyOC). The incumbent will also be responsible for further development, maintenance and update of the Enterprise Cyber Incident Management framework and supporting processes.
The contracted individual must be able to perform effectively and efficiently with minimal supervision the following tasks:
- Support Enterprise cyber incident management and response efforts, in particular ensuring appropriate coordination across Enterprise stakeholders;
- Support, oversight and lead Cyber Incident Task Force (CITF) lines of effort;
- Support the preparation and conduct of cyber Incident Coordination and Decision Making Group (ICDMG) discussions and meetings;
- Prepare weekly SITREPs for OCIO leadership awareness on relevant activities, also for informing the Allies as necessary;
- Perform and supervise secretarial duties for cyber incident response related meetings;
- Identify, develop and coordinate mitigation and remediation actions, in order to ensure a coherent response, Enterprise-wide, to identified cyber events and incidents;
- Develop, maintain and update an Enterprise-wide incident management framework to support the role of the CIO as Single Point of Authority for cybersecurity, in coordination with relevant NATO stakeholders, such as NATO Communications and Information Agency (NCIA) and CyOC;
- Support the annual update of the Cyber Incident Response Plan (CIRP) and its supporting annexes;
- Support the preparation, conduct and evaluation of the annual OCIO-led Exercise Enterprise Pathfinder (ENPAF), a key exercise for the Enterprise to ensure readiness to handle cyber security incidents;
- Support that the lessons identified of previous ENPAF iterations and CITFs become learned in the Enterprise cyber incident management process;
- Liaise with NCIA for monitoring and coordination of technical activities in relation to cybersecurity incidents;
- Liaise with the NATO Cyber Threat Assessment Branch for monitoring and assessment of cyber threats.
5. LOCATION OF DUTY
The work will be executed primarily on site at the NATO HQ offices in Brussels, Belgium.
Frequent travels or short deployments to NATO Command Structure bodies would be required.
Due to the nature of the work, minimal teleworking can be foreseen.
The services of the contractor are required for the period starting not later than 01 April 2024 until 31st December 2024.
A contract extension is possible for the calendar year 2025. Future contract extensions are subject to performance of the contractor and related NATO regulations.
7. SPECIFIC WORKING CONDITIONS
Secure environment with standard working hours. Occasional non-standard hours may be required in support of the NATO Chief Information Officer urgent tasks.
Occasional business travel may be required. Travel expenses will be reimbursed to the individual directly (in addition to the hourly rate) under NATO rules.
9. SECURITY AND NON-DISCLOSURE AGREEMENT
The contractor must be in possession or capable of possessing a security clearance of NATO SECRET.
A signed Non-Disclosure Agreement will be required.
- The contractor must be in possession or capable of possessing a security clearance of NATO SECRET.
The candidate must possess:
- A degree from a university or establishment of similar standing;
- At least 3 years of experience in cybersecurity incident management, preferably in a large organization;
- Experience in the planning of multi-year programs related to cyber security incident management;
- Experience in cyber incident management exercise planning processes and scenarios;
- Experience in the development of processes and cybersecurity incident response plans, preferably in a large organization;
- Experience in the provision of cybersecurity advice and guidance following incidents happening in and through cyberspace;
- Knowledge and experience coordinating with multiple stakeholders during the response activities to cybersecurity related incidents in large, geographically sparse organizations;
- An excellent knowledge and experience with cybersecurity incident response best practices;
- A good knowledge of the principles, policy and procedures governing cybersecurity, preferably in military and/or defence organizations;
- The ability to draft clear and concise reports, produce and maintain cybersecurity incident reports, security and risks logs and systems in support of cybersecurity incident response activities;
The following would be considered an advantage:
- Cyber security certifications such as CISSP, CISM or equivalent post-graduate degree in cybersecurity;
- Experience within NATO in leading cyber incident response activities;
- Experience in leading staff work on large and complex projects and to coordinate multiple stakeholders in different and separate locations;
- Experience in incident management tools;
- Knowledge of the NATO organization, its security policy and supporting directives.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Perks/benefits: Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Penetration Tester jobs
- Open Senior Security Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Analyst jobs
- Open Security Operations Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open IT Security Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Specialist jobs
- Open Chief Information Security Officer jobs
- Open Senior Security Architect jobs
- Open Senior Cyber Security Engineer jobs
- Open Security Specialist jobs
- Open Ingénieur DevSecops H/F jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Information System Security Officer (ISSO) jobs
- Open Agile-related jobs
- Open C-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open CISM-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Analytics-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open CISA-related jobs
- Open SaaS-related jobs
- Open DevOps-related jobs
- Open Threat intelligence-related jobs
- Open Security Clearance-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open Splunk-related jobs
- Open APIs-related jobs
- Open DevSecOps-related jobs
- Open IDS-related jobs