OCIO-0033 Enterprise Cybersecurity Incident Manager (NS) - TUE 20 Feb

Mons, Wallonia, Belgium

Deadline Date:  Tuesday 20 February 2024

Requirement: Enterprise Cybersecurity Incident Manager

Location:Mons, BE 

Full time on-site: Yes

Time On-Site: 100%

Total Scope of the request (hours): 1764

Required Start Date: 1 April 2024

End Contract Date: 31 December 2024

Required Security Clearance: NATO SECRET

Note: For all Level-of-Effort and Completion-Type requests processed outside of the IWC Value Stream, and for which the contractor will not be reimbursed directly by OCIO for travel expenses, additional travel funding shall be allocated on a Not-to-exceed basis when the yearly Option is exercised


Annex A – Special Terms and Conditions

The contractor will be responsible for complying with the respective national requirements for working permits, visas, taxes, social security etc. whilst working on site at NATO HQ Brussels, Belgium.

No special status is either conferred or implied by the host organisation, NATO HQ Brussels, Belgium to the contractor whilst working on site.

The contractor will be responsible for complying with all the respective National Health COVID-19 regulations in Belgium before taking up the position.



The incumbent will work on the coordination of response to cybersecurity incidents involving Enterprise CIS and services, performed by the Office of the Chief Information Officer (OCIO). The incumbent will execute the follow-on activities through engagement with several NATO stakeholders, such as the NATO technical authorities, risk management authorities, and other relevant NATO entities across the Enterprise, including NATO risk managers, CIS Providers (CISPs), the NATO Cyber Threat Assessment Branch (CTAB) and the NATO Cyberspace Operations Centre (CyOC). The incumbent will also be responsible for further development, maintenance and update of the Enterprise Cyber Incident Management framework and supporting processes.


The contracted individual must be able to perform effectively and efficiently with minimal supervision the following tasks:

  • Support Enterprise cyber incident management and response efforts, in particular ensuring appropriate coordination across Enterprise stakeholders;
  • Support, oversight and lead Cyber Incident Task Force (CITF) lines of effort;
  • Support the preparation and conduct of cyber Incident Coordination and Decision Making Group (ICDMG) discussions and meetings;
  • Prepare weekly SITREPs for OCIO leadership awareness on relevant activities, also for informing the Allies as necessary;
  • Perform and supervise secretarial duties for cyber incident response related meetings;
  • Identify, develop and coordinate mitigation and remediation actions, in order to ensure a coherent response, Enterprise-wide, to identified cyber events and incidents;
  • Develop, maintain and update an Enterprise-wide incident management framework to support the role of the CIO as Single Point of Authority for cybersecurity, in coordination with relevant NATO stakeholders, such as NATO Communications and Information Agency (NCIA) and CyOC;
  • Support the annual update of the Cyber Incident Response Plan (CIRP) and its supporting annexes;
  • Support the preparation, conduct and evaluation of the annual OCIO-led Exercise Enterprise Pathfinder (ENPAF), a key exercise for the Enterprise to ensure readiness to handle cyber security incidents;
  • Support that the lessons identified of previous ENPAF iterations and CITFs become learned in the Enterprise cyber incident management process;
  • Liaise with NCIA for monitoring and coordination of technical activities in relation to cybersecurity incidents;
  • Liaise with the NATO Cyber Threat Assessment Branch for monitoring and assessment of cyber threats.


[See Requirements]


[See Requirements]


The work will be executed primarily on site at the NATO HQ offices in Brussels, Belgium.

Frequent travels or short deployments to NATO Command Structure bodies would be required.

Due to the nature of the work, minimal teleworking can be foreseen.


The services of the contractor are required for the period starting not later than 01 April 2024 until 31st December 2024.

A contract extension is possible for the calendar year 2025. Future contract extensions are subject to performance of the contractor and related NATO regulations.


Secure environment with standard working hours. Occasional non-standard hours may be required in support of the NATO Chief Information Officer urgent tasks.


Occasional business travel may be required. Travel expenses will be reimbursed to the individual directly (in addition to the hourly rate) under NATO rules.


The contractor must be in possession or capable of possessing a security clearance of NATO SECRET.

A signed Non-Disclosure Agreement will be required.


  • The contractor must be in possession or capable of possessing a security clearance of NATO SECRET.


The candidate must possess:

  • A degree from a university or establishment of similar standing;
  • At least 3 years of experience in cybersecurity incident management, preferably in a large organization;
  • Experience in the planning of multi-year programs related to cyber security incident management;
  • Experience in cyber incident management exercise planning processes and scenarios;
  • Experience in the development of processes and cybersecurity incident response plans, preferably in a large organization;
  • Experience in the provision of cybersecurity advice and guidance following incidents happening in and through cyberspace;
  • Knowledge and experience coordinating with multiple stakeholders during the response activities to cybersecurity related incidents in large, geographically sparse organizations;
  • An excellent knowledge and experience with cybersecurity incident response best practices;
  • A good knowledge of the principles, policy and procedures governing cybersecurity, preferably in military and/or defence organizations;
  • The ability to draft clear and concise reports, produce and maintain cybersecurity incident reports, security and risks logs and systems in support of cybersecurity incident response activities;


The following would be considered an advantage:

  • Cyber security certifications such as CISSP, CISM or equivalent post-graduate degree in cybersecurity;
  • Experience within NATO in leading cyber incident response activities;
  • Experience in leading staff work on large and complex projects and to coordinate multiple stakeholders in different and separate locations;
  • Experience in incident management tools;
  • Knowledge of the NATO organization, its security policy and supporting directives.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: CISM CISSP Clearance Incident response Monitoring NATO Risk management Security Clearance

Perks/benefits: Startup environment

Region: Europe
Country: Belgium
Job stats:  2  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.