Latest Jobs at World Vision Kenya

Project Management jobs, Computer Science jobs, Information Systems jobs,

Environment and Climate Action Senior Advisor

Position purpose

  • The purpose of the role is to Provide highly Technical and Strategic support on Environment and Climate Change Action to FO;s to enhance environmental stewardship , lead necessary climate action initiatives within the East Africa region and collaborate with key stakeholders.
  • The senior advisor, through frequent field visit will provide technical support in the design and implementation of Environment, climate action program and associated projects in development work, emergency response and advocacy programs. Conduct quality assurance of implementation on sampling basis, assess capacity gaps in FO’s and carries out ToFs on core project models and approaches on environmental stewardship and climate action. Promote and support learning initiatives and manage the CoP, Lead and contribute to continuous innovative improvement integrated program/project interventions. Develop capability statements and contribute to design and resource mobilization efforts within the region and support FO’s. Coordinate with the Global partnership environment and climate change teams. Represent the Region in the various working groups and engagements on Environmental stewardship and climate action.

MAJOR RESPONSIBILITIES

40%

  • Support the roll out and application of the Environmental Stewardship Policy across EARO offices.
  • Support Field offices to set up and improve integrated programming in ESCA projects and build their capacity to do so.
  • Develop compelling materials to strengthen WV EARO FO’s commitment and passion for work on ESCA (e.g., capability statements, case studies of success, business cases, Return on Investment etc.)
  • Nurture a community of practice at field level to implement environmental programming with practical steps to
  • that reduce WV’s environmental footprint
  • Promote RO, and FO’s Carbon footprint and subsequent measures to reduce impact through initiatives with both internal and external stakeholders
  • Monitor and track FO implementation of ESCA initiatives and report against relevant Regional and Global KPIs
  • Advise  FO’s on ESCA related policy statements as requested.

25%

  • Work with Regional Office and Field Office’s to raise grant and other resources to fund environmental projects
  • Work with Priority Field Offices to design, develop and where necessary write grant applications to secure funding for ESCA projects
  • Advise WV EARO FO’s on strategies, approaches and positioning to secure funding for ESCA projects.
  • Work with Global Centre (Headquarters) ESCA and relevant funding offices and functions to build WV EAR Field Office capacity to meet sector and major grant donor requirements on ESCA (e.g. ECHO’s Minimum Operations Requirements )
  • Work with EAR GAM to identify, map and communicate ESCA funding opportunities to WV EAR Field Offices.

30%

  • External and Internal (WV Partnership) Engagement
  • Be a focal point for ESCA issues in cross and multisector programming, including commissioning and overseeing relevant field research/ positioning materials, establishment of external partnerships and help position EARO regional office in the WV Partnership on ESCA issues.
  • Strategically engage with Donors, their respective Funding Offices and other partners in a response, development or nexus context, to ensure that WV is positioned as a viable partner for ESCA programs.
  • Work with FOs to broker external partnerships that can forward ESCA work at field level.
  • Represent the region effectively in key organizational discussions, platforms and fora
  • Maintain partnerships with organizations, think tanks and agencies to fund and implement ESCA or integrated programs

5%

Nexus Approach

  • Will strengthen the implementation of the Nexus Approach by ensuring integration on humanitarian/development/peacebuilding initiatives. 
  • These efforts include stronger and more focused joint analysis, strategic planning and programming and more joint learning (field trips, evaluations etc.) between humanitarian, development, and peacebuilding actors. 
  • Focus on working in collaboration and complementarity between humanitarian and development actors and knowing that Field Offices will become more and more affected by the climate change, food insecurity, extreme poverty might lead to more conflicts over the scarce resources and the presence
  • Work with humanitarian, development and peace actors to find solutions, to if/when possible, prevent conflict, violence (and population movement) to happen.

Knowledge/Qualifications for the Role

Required Professional Experience

  • Detailed knowledge of NGO Environmental Stewardship and Climate Action programming and how to apply it. 
  • Proven track record of growing communities of practice and influencing senior field stakeholders (Eg. Operations Directors, Head of Mission etc) is vital.
  • Able to think and plan strategically and do practical field assessments, visits, proposal writing etc.
  • Knowledge of Livelihoods, international development, humanitarian response, project management or other relevant field is an added advantage. Experience with Bilateral and UN Donors is required.
  • Experience in development of projects, training materials, conducting training (face to face and online) and providing technical assistance.
  • Understanding of the sector, donor and UN landscape for ESCA.
  • Technical skills: Knowledge of ESCA Project models and approaches is desirable
  • A minimum of 5 working experience in climate change and environmental stewardship, program development, implementation, resource mobilization in both emergency, development and advocacy context.
  • The position requires ability and willingness to travel domestically and internationally up to 60% of the time, with possible extended periods of 4 to 6 weeks of field work.
  • Preferred candidates should be committed to travel to Field Offices for days/weeks and spend time with Field Office technical teams in the field. Hands on support is a critical part of this role.
  • Other: Clear communication skills, written and spoken high influencer, engager and an innovator, Techno survey, Trainer/coach, Research.
  • Strong relationship building/network capacity, spiritual maturity in Christian faith, ability to influence, innovative, and proactive personality. 
IMPORTANT: Write a Perfect Cover Letter in minutes and start getting interviews! Get expert advice as you write.) Use These Examples Proven to Work.

Required Education, training, license, registration, and certification

  • Master Degree in Environmental Sciences, Climate Change, degree in Program Management/International Development is an added advantage. Experience in advocacy, policy formation, guidance and implementation on ESCA project model.

Preferred Knowledge and Qualifications.

  • Highly developed external engagement and networking skills Strong project management skills, including experience with research and development of programming models
  • Excellent writing skills as shown through technical documents, thought pieces, and proposals
  • Demonstrated willingness to be flexible and versatile in a changing work environment while maintaining effectiveness and efficiency
  • Ability to motivate and develop staff Experience leading a task force or community of practice or learning
  • Understanding of climate change risks and challenges
  • Strong understanding of global strategies and frameworks on environmental stewardship and climate change.
  • Knowledge on legal international conventions related to climate change.
  • Strong negotiation, collaboration, networking, liaison, and donor engagement skills.
  • Demonstrated proficiency using Excel, Microsoft Suite of products, databases and statistical packages.
  • Consistently demonstrates high-level influence and strategic engagement skills and tactical savvy in delivery of technical assistance.
  • Ability to think broadly and look at the macro, strategic issues to inform strategy choices and management pro
  • Critical thinking skills to relate to work performed to broader business conte

Technical Director, Cybersecurity

PURPOSE OF POSITION:

  • Individuals working as a Technical Director, Cybersecurity oversee the planning, execution, and management of multi-faceted projects related to compliance, control assurance, risk management, security, and infrastructure/ information asset protection. They are responsible for developing and managing security across multiple IT functional areas (e.g., data, systems, network and/or Web) across the enterprise, developing and managing enterprise security services, and developing security solutions for critical and/or highly complex assignments to ensure the company’s infrastructure and information assets are protected. They work on multiple projects or programs as a team lead.
  • Individuals within the Cybersecurity job family plan, execute, and manage multi-faceted projects related to compliance management, risk assessment and mitigation, control assurance, business continuity and disaster recovery, and user awareness. They are focused on developing and driving security strategies, policies/standards, ensuring the effectiveness of solutions, and providing security-focused consultative services to the organization.
  • IT Security professionals develop, execute and manage data, system, network and internet security strategies and solutions within a business area and across the enterprise. They develop security policies and procedures such as user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines. To guide enforcement of security policies and procedures, they administer and monitor data security profiles on all platforms by reviewing security violation reports and investigating security exceptions. They update, maintain and document security controls and provide direct support to the business and internal IT groups. IT Security professionals evaluate and recommend security products, services and/or procedures. They also communicate and educate IT and the business about security policies and industry standards, and provide solutions for enterprise/business security issues.
  • IT Security professionals require strong technical, analytical, communication and consulting skills with knowledge of IT Security and related technologies. Security certifications (i.e., Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manage (CISM), Global Information Assurance Certification (GIAC) and/or other certifications) may be required.

MAJOR RESPONSIBILITIES:                                        

STRATEGY (5%)

  • Provides strategic and tactical direction and consultation on security and IT compliance.

POLICIES, PROCEDURES, & STANDARDS (5%)

  • Acts as primary support contact for the development of secure applications and processes.
  • Maintains an up-to-date understanding of industry best practices.
  • Develops, enhances and implements enterprise-wide security policies, procedures and standards across multiple platform and application environments. Monitors the legal and regulatory environment for developments.  Recommends manages implementation of required changes to IT policies and procedures.
  • Monitors compliance with security policies, standards, guidelines and procedures.
  • Ensures security compliance with legal and regulatory standards.

BUSINESS REQUIREMENTS (5%)

  • Engages directly with the business to gather a full understanding of project scope and business requirements.
  • Assesses business needs against security concerns and articulates issues and potential risks to management.
  • Consults with other business and technical staff on potential business impacts of proposed changes to the security environment.
  • Provides security-related guidance on business process.

SECURITY SOLUTIONS (5%)

  • Works closely with IT and development teams to design secure infrastructure solutions and applications, facilitating the implementation of protective and mitigating controls.

OPERATIONS SOLUTIONS (5%)

  • Defines security configuration and operations standards for security systems and applications, including policy assessment and compliance tools, network security appliances, and host-based security systems.
  • Defines and validates baseline security configurations for operating systems, applications, networking and telecommunications equipment.

RISK ASSESSMENTS (10%)

  • Works directly with the customers and other internal departments and organizations to facilitate IT risk analysis and risk management processes and to identify acceptable levels of residual risk.
  • Conducts business impact analysis to ensure resources are adequately protected with proper security measures.
  • Assesses potential items of risk and opportunities of vulnerability in the network and on information technology infrastructure and applications.
  • Reviews risk assessments, analyzes the effectiveness of IT control activities, and reports on them with actionable recommendations.
  • Evaluates security risks and identifies and defines compliance strategies in accordance with policies and standards.
  • Provides management with risk assessments and security briefings to advise them of critical issues that may affect customer, or corporate security objectives.
  • Communicates with multiple departments and levels of management in order to resolve technical and procedural IT security risks.
  • Develops remediation strategies to mitigate risks associated with the protection of infrastructure and information assets.

INFORMATION/DATA SECURITY (5%)

  • Defines, identifies and classifies information assets.
  • Assesses threats and vulnerabilities regarding information assets and recommends the appropriate security controls and measures.
  • Develops and manages security measures for information systems to prevent security breaches.
  • Consults with clients on the data classification of their resources.
  • Provides reports to leaders regarding the effectiveness of information security and makes recommendations for the adoption of new policies and procedures.
  • Develops and implements strategies to align information security with business objectives and goals, protecting the integrity, confidentiality and availability of data.

SECURITY AUDITS (10%)

  • Performs security audits.
  • Participates in security investigations and compliance reviews as requested by external auditors.
  • Consults with clients on security violations.
  • Acts as liaison between internal audit and IT to ensure commitments are met and controls are properly implemented.

INCIDENT MANAGEMENT (10%)

  • Assists security operations team in troubleshooting and resolving escalated security related issues.
  • Builds security incident response teams.
  • Authors incident response plans and support documentation and diagrams.

BUSINESS CONTINUITY/DISASTER RECOVERY (5%)

  • Develops impact analysis. 
  • Assists business partners with the determination of critical business processes and systems.
  • Identifies and coordinates resolution of recovery issues. 

SECURITY PERFORMANCE MANAGEMENT (5%)

  • Develops measures to evaluate the security programs and modifies strategies as appropriate.
  • Analyzes reports and makes recommendations for improvements.

COMMUNICATIONS/CONSULTING (5%)

  • Serves in an advisory role in application development projects to assess security requirements and controls and ensures that security controls are implemented as planned.
  • Collaborates on critical IT projects to ensure that security issues are addressed throughout the project life cycle.
  • Provides input for the development of the security architecture.
  • Informs stakeholders about compliance and security-related issues and activities affecting the assigned area or project.
  • Interfaces with business and IT leaders communicating security issues and responding to requests for assistance and information.​
  • Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance.

VENDOR MANAGEMENT (5%)

  • Works with third party vendors during problem resolutions. Interfaces with third party vendors to evaluate new security products or as part of a security assessment process.​
  • Coordinates with vendors to ensure managed services are implemented and maintained appropriately.

RESEARCH/EVALUATION (5%)

  • Leads and reviews application security risk assessments for new or updated internal or third-party applications.
  • Maintains contact with vendors regarding security system updates and technical support of security products.
  • Assists in cost-benefit and risk analysis.

TRAINING (5%)

  • Develops security awareness and compliance training programs. Provides communication and training as needed. Provides security briefings to advise on critical issues that may affect client.
  • Conducts knowledge transfer training sessions to security operations team upon technology implementation.

COACHING/MENTORING (10%)

  • Provides ongoing knowledge transfer to team members and clients on security products and standards.
  • Mentors less-experienced team members.

KNOWLEDGE/QUALIFICATIONS FOR THE ROLE:

Required Professional Experience

  • Requires 10 – 15 years cyber, privacy, compliance, or risk management function or a closely related role.
  • Over 10 years of experience as a senior manager or information security officer.
  • Over 5 years of experience managing cyber security incident response teams. Experience designing and implementing security solutions.
  • Requires in-depth knowledge of PCI-DSS, privacy laws, security standards, security best practices, and security regulations. A high proficiency level in threat management, risk management, vulnerability management, and compliance management is required.
  • Effective in written and verbal communication in English
  • Willingness and ability to travel domestically and internationally, as necessary.

Required Education, training, license, registration and certification

  • Bachelor’s degree in Computer Science, Information Systems or other related field, or equivalent work experience.
  • Requires Security Certification (i.e., Certified Information Systems Security Professional (CISSP), Certified Information Security Manage (CISM), or Global Information Assurance Certification (GIAC).

Preferred Knowledge and Qualifications

  • Fluent in English.
  • Have strong incident and investigation management skills.
  • Have strong communication skills.
  • Have good planning and organising skills.
  • Strategic thinker with strong influencing skills and exceptional professional credibility.
  • Outstanding stakeholder management skills combined with the ability to challenge and influence in a constructive manner.
  • Have proven ability to collaborate effectively and develop positive working relationships across all levels of an organisation.
  • Have strong analytical skills, with the ability to gather, analyse and evaluate information and to prepare concise written reports.
  • Have technical expertise on risk assessment tools and methods or the willingness to learn.
  • Good understanding of the different field contexts or experience working in at least 2 different contexts (e.g. development, transitioning, fragile, conflict, humanitarian, etc.)

APPLY HERE

UN Jobs Salary Scale | United Nations Salary Range

× Let's Chat on WhatsApp