#NC25CSG181030 - NATO Restricted (NR) Business Network (REACH) Accreditation - Closed
Deadline: July 27, 2025
Requester: NATO
Location: Mons, Belgium
Start date: September, 2025
Security clearance: NATO SECRET
SCOPE OF WORK / DUTIES / ROLES
- Support Communication Information Systems (CIS) Security assurance of all REACH services;
- Contribute to the enforcement of NATO Policy, Agency Directives and Standard Operating Procedures (SOPs);
- Liaise with all stakeholders to provide operational CIS security support to all REACH services;
- Provide subject matter expert knowledge to assist REACH accreditation process;
- Support information security processes for REACH CIS within the Agency, both for internal operations and for Agency’s customer-funded networks;
- Contribute to the resolution of security requirement conflicts and collaborate with Project Managers (PM), Service Delivery Managers (SDM) and engineers to appropriately convert customer requirements into secure services;
- Coordinate with systems administrators in support of security architecture requirements;
- Identify cyber security-related Key Performance Indicators (KPI) and generate reports to ensure full visibility of all REACH CIS;
- In coordination with NCSC Accreditation Support Office, support all phases of security accreditation processes required to maintain operation status;
- Communicate security risks and issues to business managers and others;
- Perform basic risk assessments for large scale enterprise information systems;
- Contribute to the identification of risks that arise from potential technical solution architectures;
- Suggest alternate solutions or countermeasures to mitigate risks;
- Support investigation of suspected attacks and security breaches.
REQUIRED SKILLS, KNOWLEDGE AND EXPERIENCE
- A minimum requirement of a bachelor’s degree at a nationally recognised/certified University in a related discipline and 2 years post-related experience;
- Or exceptionally, the lack of a university degree may be compensated by the demonstration of a candidate’s particular abilities or experience that is/are of interest to NCIA, that is, at least 6 years extensive and progressive expertise in duties related to the function of the post;
- Several years of experience (at least two years) with system security, security architecture, network security engineering, and security governance including policy alignment, risk management, performance management and value delivery;
- Minimum 5 years proven experience in CIS Security;
- Minimum 5 years proven experience in modern CIS secure deployment and configuration troubleshooting;
- Minimum 2 years of extensive experience in the contextual interpretation of Vulnerability Assessments results;
- Comprehensive understanding of the principles of computer and communications security, networking, and the vulnerabilities of modern operating systems and applications acquired through a blend of academic or professional training coupled with practical professional experience;
- Proven minimum 5 years professional experience and knowledge in at least three of the following:
- Implementation and integration of Information Assurance protective measures;
- Security mechanisms and administration of LAN and WAN in the large enterprise environment;
- Private and public cloud security;
- Enterprise system administration experience of Windows Active Directory concepts and architecture;
- Enterprise system administration experience of VMWare vSphere environment and architecture, with emphasis on security concepts design and implementation.
- Proficiency in automation to create workflows and automate repetitive processes with minimum 2 year experience;
- Ability to identify and implement automation opportunities to enhance efficiency.
This position is now closed.
We regularly add new positions. We suggest exploring other available opportunities and staying updated by following our LinkedIn page.
If you don’t find any suitable opportunities, you can send us your CV, as an open application. However, we will not submit you to any vacancies without your written consent.
