Strategic Security Analyst

Size: px
Start display at page:

Download "Strategic Security Analyst"

Transcription

1 Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered* PURPOSE OF POSITION: The purpose of the Strategic Security Analyst is to manage and delivering complex political and operational risk analysis; manage the global information collection function; proactively keep up to date with international, regional and national security issues of interest/relevance to the Partnership; ensure the provision of consistent, high quality strategic risk analysis products and strategies to decision makers to influence organisational direction setting. This role also plays a key part in leading, shaping and influencing key areas of organisational strategic capability and provides an interface between the Office of Corporate Security (OCS) and the external humanitarian analysis community. KEY RESPONSIBILITY: Strategy: Manage the development and implementation of the global security information procedures and assist in the annual review of OCS global strategies. Ensure security information procedures are in alignment with WV Security policy and international best practice. Subject matter expert in the development and implementation of analytical processes within OCS and across the Partnership security apparatus to assist with security decision making at all levels. Technical Support:

2 Provide technical direction and advice to OCS Partnership Leader, Operations Director, Regional Security Directors and Global Security Advisors on emerging security issues and their likely impact on WVs strategies and programme operations. Provide oversight of the security component in the Integrated Incident Management system and manage the security technical support and interface for system improvements, designing reporting, and the incorporation of geospatial mapping functionality etc. Ensure the highest level of data integrity. Lead the production of security trend analysis and metrics to inform the development of context analysis and typologies of risk. Expand WVI OCS information collection and research methodologies and capabilities to international standards. Operational Support: Provide expert technical analytical support to field operations and lead analytic component during critical security incidents at regional and global level and as embedded analyst for executive crisis management team. Provide high level analytic oversight of the security country risk rating (CRR) process in coordination with Operations Director, RSDs, Regional Security Advisors & Global Security Advisors and assist in the development of mitigation strategies that are compliant with WVs Core Security Requirements (CSR). Provide field analytical service to GRRT, OCS and the Partnership for HEA operations or BAU programming activities as and when required to inform security decision making. Spearhead opens source data collection, context monitoring and social media for continuous strategic and situational threat awareness. Develop root cause analysis to support post-incident learning. Take on higher duties when required for threat and risk analysis and provide other support as needed to compliment the security risk management framework. Capacity Building: Contribute toward the review, development and implementation of global capacity building plans for security

3 information management based on Regional Security Risk Assessments and provide training. Engage with Regional Security Advisors and National Directors to raise the awareness of security information management as per WV Corporate Security policies. Identify, share / facilitate access to security analysis tools, resources and materials as well as learning and support opportunities for Regional & National Offices. These may include facilitating and conducting training, engagement of trainers, establishing institutional links, identifying opportunities for staff exchange or mentoring. Develop and implement a WV Analysis capability and upskill individuals across the Partnership who can undertake analytical duties. Knowledge Management: Lead applied learning with respect to incident analysis findings and develop strategic analytic capability to include predictive analysis using advanced techniques such as morphological analysis, probabilistic/quantitative risk analysis, systems modeling, simulation, scenario mapping etc. Contribute towards the process of continuous learning on international best practice in security information management and analysis and identify tools and processes that can be implemented into WV operations globally. Act as a subject matter expert in the field of information analysis (at an operational, tactical and strategic level); risk assessment and security risks management. Quality Assurance: Review minimum security incident reporting standards in WV operations that promote alignment with WVs Core Security Requirements. Support and advise Regional and National Offices in observing the appropriate security reporting and standards in

4 accordance with the country risk rating. Provide guidance and maintain security information document classification protocols across the Partnership. Internal Liaison & Co-ordination: Oversee development of analytic capability across the Partnership and coordinate the sharing of information and practice. Provide a strategic link for the collation, analysis & dissemination of security information connecting National Offices, Regional Offices, Support Offices and Global Centre. External Relations: Develop and maintain key external relationships with a wide range of stakeholders at all levels to facilitate information sharing with a particular focus on high risk contexts. Identify and develop strategic regional and global security networks to share information on security issues affecting humanitarian operations. Liaise with external security networks (UN, IOs, INGOs, Embassies, etc) and develop sources of information on specific security issues and their likely impact with regards to regional strategies and operations. General: Support activities that will enrich and develop World Visions Core Values. Perform any other tasks assigned by the Director Operations or the Global Security Threat & Risk Advisor. KNOWLEDGE, SKILLS & ABILITIES: Relevant bachelors degree in Security, Strategic, or International Studies, or related discipline.

5 Sound knowledge of the security information management (collection, collation analysis & dissemination). Understanding of the Security Risk Assessment process, security planning and crises management in the humanitarian context. At least 2 years work experience in the professional security / intelligence analysis arena in military, law enforcement or private sector as an analyst or intelligence officer. Effective in written and verbal communication in English. Skills in additional language(s) and advantage. Preferred: Masters in Security, Strategic, or International Studies, or related discipline preferred. Sound knowledge and experience in operational, tactical and strategic intelligence analysis techniques; including the intelligence cycle and ANACAPA intelligence techniques, including formal qualifications in analysis. Experience of delivering intelligence analysis processes to an global organisation. Experience of working independently and remotely. At least 4 years work experience in the professional security / intelligence analysis arena working at international level with International Agencies, INGOs, Governments, Military, Law Enforcement or private sector as an analyst or intelligence officer. A least 1 years experience of field based intelligence analysis work to support operational and tactical decision making with international Agencies, INGOs, Military, Law Enforcement or private sector as an analyst or intelligence officer. Experience of working in a team of analysts on operational, tactical and strategic analysis projects.

6 Powered by TCPDF ( Work Environment: The position requires ability and willingness to travel domestically and internationally up to 20% of the time.

Global Security Advisor

Global Security Advisor Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Regional Security Coordinator

Regional Security Coordinator Regional Security Coordinator Location: [Africa] [Kenya] Town/City: Karen Category: Security Job Type: Fixed term, Full-time *National position based in the candidates home country in the East Africa Region

More information

Security and Fleet Manager

Security and Fleet Manager Security and Fleet Manager Location: [Europe & the Middle East] [Jordan] Town/City: Amman Category: Security Job Type: Open-ended, Full-time Position Title: Security and Fleet Manager PURPOSE OF POSITION:

More information

Response Security Coordinator - Arua

Response Security Coordinator - Arua Response Security Coordinator - Arua Location: [Africa] [Uganda] Town/City: Arua Category: Security Job Type: Fixed term, Full-time Position: Response Security Coordinator Report to: Response Director

More information

Child Protection Manager - Pacific Timor-Leste (PTL)

Child Protection Manager - Pacific Timor-Leste (PTL) Child Protection Manager - Pacific Timor-Leste (PTL) Location: [Asia & Pacific] [Papua New Guinea] Category: Child Development PURPOSE OF POSITION: The Pacific Timor Leste (PTL) Child Protection Manager

More information

National Coordinator - DRR & Disaster Management

National Coordinator - DRR & Disaster Management National Coordinator - DRR & Disaster Management Location: [Africa] [Kenya] [Nairobi] Category: Food Security & Livelihood Purpose of the Position: This position is responsible for coordinating and managing

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

TURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN

TURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN DISASTER MANAGEMENT BUREAU STRATEGIC PLAN 2005-2006 PREFACE Historical statistics would suggest that Bangladesh is one of the most disaster prone countries in the world with the greatest negative consequences

More information

keeping executives safe

keeping executives safe keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations

More information

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Role Type Pay Band Location Duration Reports to: To manage, enhance and embed the British Council Nigeria Security Risk Management function.

Role Type Pay Band Location Duration Reports to: To manage, enhance and embed the British Council Nigeria Security Risk Management function. Role Title Head of Security Nigeria Role Information Role Type Pay Band Location Duration Reports to: Advisory, policy and expertise 8 Lagos or Abuja Indefinite Director Operations Nigeria Role purpose

More information

Organization/Office: Secretariat of the United Nations System Chief Executives Board for Coordination (CEB)

Organization/Office: Secretariat of the United Nations System Chief Executives Board for Coordination (CEB) United Nations Associate Experts Programme TERMS OF REFERENCE Associate Expert (JPO) INT-021-14-P014-01-V I. General Information Title: Associate Expert in Interagency Coordination / Special to the Director

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator Request for Expression of Interest Consultant - Project Coordinator Project: I-CARE Global Imperative Indicator Unidentified Victims Portrayed on Child Abuse Images Organisational Background ECPAT International

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

Resilience in London

Resilience in London Resilience in London A Resilient City The ability of London to detect, prevent and if necessary to withstand, handle and recover from disruptive challenges Objectives London- complexity and risk London

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Overseas Security Advisory Council U.S. Department of State Diplomatic Security

Overseas Security Advisory Council U.S. Department of State Diplomatic Security Overseas Security Advisory Council U.S. Department of State Diplomatic Security Overview Part I: OSAC Background History and Structure Part II: Services RISC Staff New Initiatives Part III: Website Part

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science

More information

J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships

J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships Background ESCAP, jointly with the ECLAC, the ECA, the ECE, and the

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015 VERSION 1.0 JANUARY 31, 2015 2015-2018 STRATEGIC PLAN NATIONAL ALLIANCE FOR PUBLIC SAFETY GIS FOUNDATION 1250 24TH STREET NW SUITE 300 WASHINGTON, DC 20037 2015-2018 STRATEGIC PLAN VISION A Nation of emergency

More information

Cyber Security Beyond 2020

Cyber Security Beyond 2020 Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.

More information

LABOR CATEGORIES, EDUCATION AND YEARS OF EXPERIENCE Years No. Labor Categories Education Experience

LABOR CATEGORIES, EDUCATION AND YEARS OF EXPERIENCE Years No. Labor Categories Education Experience SIN 132-51 - Labor Category Requirements and Descriptions LABOR CATEGORIES, EDUCATION AND YEARS OF EXPERIENCE Years No. Labor Categories Education Experience ANT-001 Technical Expert Level 5 BA/BS 6 ANT-002

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

Job Descriptions and Person Specifications for Information and Communication Technology (ICT) Officers and Communication Officers

Job Descriptions and Person Specifications for Information and Communication Technology (ICT) Officers and Communication Officers Republic of Uganda Ministry of Public Service Job Descriptions and Person Specifications for Information and Communication Technology (ICT) Officers and Communication Officers Prepared by; Directorate

More information

Evaluation of technologies that will improve the UEL IT infrastructure, recommending and advising on strategic improvements

Evaluation of technologies that will improve the UEL IT infrastructure, recommending and advising on strategic improvements JOB DESCRIPTION Job Title: Grade: School/Service: Campus: Responsible to: Responsible for whom: Liaison with: Infrastructure Solutions Architect H IT Services Docklands Head of Infrastructure All Schools

More information

SUPREME HEADQUARTERS ALLIED POWERS EUROPE. TALEO Job Number: Vacancy Number: A2017. Post Number: OSC YCX 0040

SUPREME HEADQUARTERS ALLIED POWERS EUROPE. TALEO Job Number: Vacancy Number: A2017. Post Number: OSC YCX 0040 SUPREME HEADQUARTERS ALLIED POWERS EUROPE TALEO Job Number: 170634 Vacancy Number: A2017 Post Number: OSC YCX 0040 Job Title: Principal Analyst (Strategic Information Sharing) NATO Grade: A-4 Basic Monthly

More information

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure Fighting Hunger Worldwide WFP Field Security Keeping you safe & secure April 2016 Safety and security: a top priority In the field, our security risk management personnel provide specific knowledge of

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Marine Institute Job Description

Marine Institute Job Description Marine Institute Job Description Position Contract Service Group Location Temporary Scientific and Technical Officer (STO) - IT Systems Administrator Temporary specified purpose contract for a duration

More information

Commercial Catalog & Pricelist. Effective Date: January 1, 2019

Commercial Catalog & Pricelist. Effective Date: January 1, 2019 Commercial Catalog & Pricelist Effective Date: January 1, 2019 TABLE OF CONTENTS Table of Contents... 2 Introduction to Edaptive Computing, Inc.,... 3 Corporate History & Purpose... 3 Principal Officers

More information

IT Expert (Enterprise Network and Infrastructure Architect)

IT Expert (Enterprise Network and Infrastructure Architect) IT Expert (Enterprise Network and Infrastructure Architect) Reference 2015-221-EXT Type of contract Who can apply Salary Working time Place of work Closing date for applications Fixed-term contract which

More information

Annex 3: Some International Organisations and Agencies Involved in Disaster Management in Pakistan

Annex 3: Some International Organisations and Agencies Involved in Disaster Management in Pakistan Annex 3: Some International Organisations and Agencies Involved in Disaster Management in Pakistan Some of the principal international donor agencies engaged in disaster management in Pakistan are listed

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Cyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017

Cyber Threat Intelligence: Integrating the Intelligence Cycle. Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 Cyber Threat Intelligence: Integrating the Intelligence Cycle Elias Fox and Michael Norkus, Cyber Threat Intelligence Analysts January 2017 CLASSIFICATION MARKS The Global Domain Network Domain The internet

More information

National Business Crime Partnership Association

National Business Crime Partnership Association National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

Global Statement of Business Continuity

Global Statement of Business Continuity Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Security. The total budget is CHF 0.8m (USD 0.8m and EUR 0.5m) (Click here to go directly to the summary budget of the plan).

Security. The total budget is CHF 0.8m (USD 0.8m and EUR 0.5m) (Click here to go directly to the summary budget of the plan). Executive summary The unit will continue to focus on developing a security culture within the International Federation and our RC/RC Societies through security training and education, security assessments,

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat ASEAN COOPERATION ON DISASTER MANAGEMENT Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat AADMER - FOR A MORE UNITED AND COORDINATED RESPONSE TOWARD DISASTERS WITHIN THE REGION

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

Todmorden High School Job Description

Todmorden High School Job Description Todmorden High School Job Description Post Title: ICT Manager. Salary: SO2 ( 28,485-30,153) Hours: 37 hours, Full time Annual Leave: 30 days plus standard bank holidays. Holidays must be taken during school

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

General Dynamics Information Technology, Inc.

General Dynamics Information Technology, Inc. General Dynamics Information Technology, Inc. GS-35F-080CA SIN 132-45 A,B,C,D Highly Adaptive Cybersecurity Services (HACS) Labor Category Requirements and Descriptions LABOR CATEGORIES, EDUCATION AND

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

NSPCC JOB DESCRIPTION

NSPCC JOB DESCRIPTION NSPCC JOB DESCRIPTION JOB TITLE: DIVISION: DEPARTMENT: LOCATION: Senior Information Specialist National Services Knowledge and Information London DATE APPROVED: January 2016 Context and Background The

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

3. LABOR CATEGORY DESCRIPTIONS

3. LABOR CATEGORY DESCRIPTIONS 3. LABOR CATEGORY DESCRIPTIONS 001 - Consulting Systems Advisor Fifteen or more (15+) years of experience within the industry. The Consulting System Advisor develops and applies advanced methods, theories,

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Infrastructure Engineer POSITION DESCRIPTION Unit/Branch, Directorate: Location: Reporting to: Direct reports: Infrastructure, Intelligence Directorate Wellington, Auckland Infrastructure Lead Nil Salary

More information

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...

More information

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Strategic threat advisory services

Strategic threat advisory services Strategic threat advisory services Preparing you to be secure Physical security threats most often come without warning. Today, every growing organisation needs to be ready to combat such risks to stay

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism

Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism Intelligence-Led Policing, Community Policing and the Prevention of Violent Extremism and Radicalization that lead to Terrorism ECAD 24 th Mayors Conference Kaunas, 12 June 2017 OSCE and Transnational

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications

More information

People Assets Reputation

People Assets Reputation Welcome to Spearpoint International LLC The risks faced by global business are greater now than ever, the increasing danger from terrorism and the ever present threat from organized and opportunistic crime

More information

National Preparedness System. Update for EMForum June 11, 2014

National Preparedness System. Update for EMForum June 11, 2014 National Preparedness System Update for EMForum June 11, 2014 Approach to National Preparedness Whole community integration Risk-driven Capability-based DRAFT 2 Presidential Policy Directive 8 (PPD) 8

More information

Center for Audit Excellence Capability Statement

Center for Audit Excellence Capability Statement Center for Audit Excellence Capability Statement On October 1, 2015, the U.S. Government Accountability Office launched the Center for Audit Excellence. The Center s mission is to promote good governance

More information

A Strategy for the Implementation of IPv6 in Australian Government Agencies

A Strategy for the Implementation of IPv6 in Australian Government Agencies A Strategy for the Implementation of IPv6 in Australian Government Agencies July 2009 Version 2 For General Distribution AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE (AGIMO) A Strategy for the

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved. The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems,

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information