Work for the IMF. Work for the World.
Organizational Background
The Information Technology Department (ITD) at the IMF is more than just a support function; it is a critical catalyst for change. We champion the seamless integration of cutting-edge technology solutions, ensuring the IMF's mission is propelled by innovation and efficiency.
Within the IT department, the Information Security and Governance (ISG) division and other first-line cybersecurity teams stand as guardians of integrity and a beacon of trust. We are not just about managing risks; we are about envisioning, enabling, and implementing a secure future for global economic stability. Our teams are dedicated to:
Crafting and executing a forward-thinking and resilient Cybersecurity Strategy.
Enacting inclusive governance that balances security needs with operational fluidity.
Developing policies and standards that stay ahead of the threat landscape.
Ensuring compliance, resilience, and agility in our cybersecurity posture.
Engaging in relentless evaluation, management, and tracking of cybersecurity and digital risks linked to the utilization of the IMF’s information assets, ensuring a secure operational framework.
Continuously enriching our annual information security culture, awareness, and education initiative, fostering a security-conscious environment across the organization.
Administering a compliance management program dedicated to maintaining firm adherence to the IMF's information security policies and standards.
Preserving a solid enterprise security reference architecture that acts as a safeguard for the IMF's information assets against pertinent threats.
Engineering, implementing, and sustaining secure and resilient technological solutions, spanning both on-premises and cloud infrastructures, to support the IMF's mission.
Overseeing cyber threat intelligence, incident management, digital forensics, and investigations, alongside championing innovation in cybersecurity practices to achieve operational excellence and deliver value promptly.
As we expand our efforts to serve the IMF's staff and its members more effectively, we invite seasoned cybersecurity professionals to our elite cybersecurity teams. We are looking for individuals with the requisite skills and expertise to address the current and forthcoming cybersecurity and business challenges faced by the IMF.
Job Summary
The Information Technology Department (ITD)’s Information Security and Governance (ISG) division of the International Monetary Fund (IMF) is seeking to fill 4 Security Analyst/Senior Security Analyst (Technical cyber risk management) positions.
Under the general supervision of an information security risk manager, the Security Analyst/Senior Security Analyst (Technical cyber risk management) will provide expertise with security risk management and assessment of:
Azure cloud services (including but not limited to capabilities for IAM, Network Security, Policy Management, Key Management, etc.)
IT Products, platforms, and services (cloud and non-cloud)
Solutions with complex hybrid architectures
Identity and Access Management Governance
The candidate will be required to work with project teams, service providers, and business units internal and external to the Fund’s IT function. The candidate is expected to bring pragmatic cloud security and risk management experience, allowing the Fund to meet its present and emergent business needs. The candidate is expected to advise and influence technology and business personnel regarding the value and methods of safeguarding information, applications, systems, infrastructure, and activities to help ensure that technologies function optimally; work practices are optimized so that the information risks are managed.
Minimum Qualifications
Education
Bachelor's degree in information security, computer science, engineering, mathematics, business, or related field of study plus a minimum of 10 years of relevant experience working as a technical information security risk manager or information security architect;
OR
Advanced degree in Information Security, computer science, engineering, mathematics, business, or related field of study plus a minimum of 4 years of relevant experience working as a technical information security risk manager or information security architect.
Certifications: (Minimum plus at least 2 preferred)
CISSP or CISM (minimum required)
CCSP (preferred)
Microsoft Certified: Cybersecurity Architect Expert (preferred)
Other Microsoft cloud security related certifications at the Expert level (preferred)
GIAC certifications (preferred)
Offensive security related certifications (preferred)
Experience must include:
Prior work in a technical cybersecurity risk management function at organizations with security related regulatory requirements.
Practical use of risk management concepts and principles - including assessment, prioritization, delivery of treatment plans, tracking and reporting, and metrics (accreditation and certification). Experience with NIST-SP800-30, ISO 27001/2, ISO 27005, COBIT.
Embedding security into processes such as SDLC, Project Lifecycle, ITIL, etc.
Demonstrated cybersecurity expertise with infrastructure, applications, and database system technologies.
Basic IT consultancy skills. Ability to consult and deliver on the security hardening of application and infrastructure components, including tools, and techniques to ensure the security of application, database, and infrastructure components.
Pragmatic security expert with an inherent ability to balance security demands with business reality. Ability to quickly grasp how new technologies work and how security controls should be applied to achieve business goals.
Familiarity with a broad range of security technologies supplemented by in-depth knowledge in specific areas of relevance.
Ability to quickly grasp how new technologies work and how they might be applied to achieve business goals.
Knowledge of security solutions, latest threats, and countermeasures.
Required Soft Skills
Analytical skills that enable synthesis of inputs from many sources and allow for strategic thinking and tactical implementation.
Spoken and written communications that are compelling, convincing, and reassuring, and skills to articulate complex technical ideas to non-technical stakeholders.
Ability to think laterally and to have input to / propose detailed, complex solutions to technical issues.
Interpersonal skills that create openness and trust among colleagues.
Ability to work well under pressure and to meet tight deadlines. Demonstrates a high level of motivation, confidence, integrity, and responsibility.
Ability to be organized, responsive and to be able to effectively multi-task with a focus on driving results.
Demonstrate excellent interpersonal and relationship management skills. This includes the ability to work independently, effectively in a team/task force as a team member or leader, and with senior staff and managers.
Ability to work well under pressure and to meet tight deadlines, whilst demonstrating a high level of motivation, confidence, integrity, and responsibility.
Excellent relationship management skills. Facilitation and conflict management skills that enable effective working relationships.
Major Duties and Responsibilities
Specific responsibilities include:
Senior individual contributor for information security risk management projects. Sample projects/programs could include but are not limited to:
Control design and assessment for high-demand technical areas such as ERP, IT Service Management, Identity and Access Management, IT Resiliency, Cloud, etc.
Compliance framework mapping and implementation,
Risk remediation management,
Information Security risk reporting and monitoring
Creation of road maps to mature or advance Information Security Strategies/Programs/Controls
Design and enablement of cyber controls functions and processes
Direct experience as a power user of Cybersecurity GRC/ solutions, tools, and technologies, specifically ServiceNow and Archer
Projects or roles requiring coordination across lines of defense working with technical, business, compliance, risk, and audit teams to deliver solutions.
Delivery of information security risk assessments for large-scale IT implementation projects including consulting with security architecture function for threat modeling, appropriate tiering of N tier products/platforms, design of infrastructure security controls to protect system components.
Practical use of risk management concepts and principles - including assessment, prioritization, delivery of treatment plans, tracking and reporting. Experience with NIST-SP800-30, ISO 27001/2, ISO 27005, COBIT.
Consult and review the implementation of authentication, authorization (fine grained and coarse grained), and cryptography (PKI, SSL, Kerberos, crypto algorithms) mechanisms within applications.
Consult with security assurance function on the delivery of technical security standards, configuration baselines and related procedures for the hardening of both cloud and non-cloud application and infrastructure components, tools, and techniques to ensure the security of application and infrastructure components such as LINUX/Windows servers, Web servers (IIS, Apache, tomcat), app servers, Databases (Oracle and MS SQL), endpoints (MAC, Windows, Apple IOS, etc.), and Web Application Firewalls.
Collaborate with other security functions e.g., security architecture, security assurance, offensive security team (red/purple team), application security penetration testing team, to review and apply appropriate risk levels to the output of the assessments performed by the functions.
Maintain impartiality around IT systems to produce unbiased reports on information security risk.
Works closely with IT project teams to develop implementation plans for new security-related products and services.
Conducts quality assurance reviews of security requirements for the implementation of identified solutions.
Define/enhance process and procedures for using external security service providers including scoping, management of services, remediation tracking, and exception management.
Effectively communicates requirements and trains staff and managers in IT divisions to identify and manage risks throughout the project lifecycle.
Where applicable, manages the engagement process of external risk assessment providers and acts as a liaison with internal IT project teams and business units.
As an advocate of information security, works closely and proactively with IT project team leaders, service providers, and business units to provide security-related technical solutions. Identifies opportunities to improve business practices or IT security-related processes.
Other ad hoc responsibilities may include:
Analyzes, recommends, and implements process improvements within the context of information security.
Support governance activities for Identity and Access Management, where requested.
This is a one-year contractual appointment. Contractual appointments at the IMF are renewable for up to four years of cumulative contractual service, pending incumbent's performance, budget availability, and continuous business need.
Department:
ITDSG Information Technology Department Information Security & GovernanceHiring For:
A11, A12The IMF is guided by the principle that the employment, classification, promotion, and assignment of staff shall be made without discrimination against any person. We welcome requests for reasonable accommodations for disabilities during the selection process. Information on how to request accommodations will be provided during the application process.