Work for the IMF. Work for the World.
The Information Technology Department (ITD) at the IMF is more than just a support function; it is a critical catalyst for change. We champion the seamless integration of cutting-edge technology solutions, ensuring the IMF’s mission is propelled by innovation and efficiency.
Within the IT department, the Information Security and Governance (ISG) division and other first-line cybersecurity teams stand as the guardians of integrity and a beacon of trust. We are not just about managing risks; we are about envisioning, enabling, and implementing a secure future for global economic stability. Our teams are dedicated to:
As we expand our efforts to serve the Fund’s staff and its members more effectively, we invite seasoned cybersecurity professionals to our elite cybersecurity teams. We are looking for individuals with the requisite skills and expertise to address the current and forthcoming cybersecurity and business challenges faced by the Fund.
Job Summary
The Information Technology Department (ITD) of the International Monetary Fund (IMF) is seeking to fill a Section Chief-Information Security (SOC and Threat Intelligence). Under the general supervision of the Chief Information Security Officer, this role will be responsible for leading, developing, maturing, and scaling capabilities in cybersecurity monitoring, detection and incident and breach response, digital forensics, e-Discovery, and cyber threat management. The incumbent will lead and develop a team of highly skilled cyber security analysts to develop and mature these capabilities.
A key objective of this role would be to lower the IMF’s information risk profile, by proactively preventing and responding to common and advanced cyber threats.
Major Duties and Responsibilities
1. Leads the execution of a robust security monitoring, detection and incident and breach response strategy and operating model. Works with relevant stakeholders to ensure that the process is mutually understood, agreed, and responsibilities are clear and accepted.
2. Develops and implements processes to investigate, analyze and profile the structure and dynamics of a particular sector or group within the adversary community of interest to the IMF. This includes analysis and determination of the intent, operational and technical capabilities, tradecraft, and modus operandi of threat actors. Creates and keeps up to date a unique threat profile map specific to the IMF.
3. Develops and implements processes to investigate within information security policy provisions, all infrastructure and application intrusions and data theft by internal and external threat actors and threat vectors. Leads the implementation of the incident response capability through intelligence backed decisions in a dynamic threat environment. Develops and delivers management summaries and briefs on intrusions and intrusion attempts.
4. Supports the preparedness of IMF departments to respond to information security incidents. Participates in regular exercises to simulate incident scenarios to ensure the currency of incident response plans and capability, and incorporates lessons learned from realized security incidents.
5. Develops, leads, and supports a cyber threat intelligence capability including the collection, analysis, production, and dissemination of timely and actionable cyber threat intelligence to operational and business teams and an executive audience.
6. Supports IMF’s cybersecurity threat and vulnerability management program focusing on infrastructure, applications and IoT, with a goal to continually reducing the risk exposure of the IMF’s on-premise and multi-cloud environment within acceptable risk tolerances.
7. Works closely with Enterprise Architecture, Information Security Architecture and Cybersecurity Platform functions to ensure the co-development and implementation of security reference architectures and patterns for security monitoring, detection, automation, and orchestration in multi-cloud environments.
8. In close coordination with the Cybersecurity Platforms team, develops and implements the cybersecurity operations service management capability, including change, incident, and problem management according to established processes and procedures. Optimizes the cybersecurity operations service delivery processes and demonstrates measurable value by identifying opportunities for automation, standardization, and elimination of process waste.
9. Establishes professional relationships at technical and management levels with security product vendors and managed security service providers to manage contracted security services, and drive product functionality, break-fix, training, and service delivery improvements. Ensures that the overall services are delivered as expressed in the contract Statement of Work and related exhibits, that the service levels for outsourced services/functions are maintained and continually improved, and that any problems with the day-to-day delivery of services provided by the Supplier are minimized.
9. Manages administrative activities of threat intelligence and security operations including oversight of cybersecurity staff and vendors, recruitment of qualified analysts, shift management, technical training, budget management, monitoring non-compliance to security operations policies and procedures, and secure management of privileged access by analysts.
10. Ensures security operations analysts are equipped with the latest security intelligence from subscribed feeds and through partnerships with other IOs, intelligence communities, and external law enforcement agencies.
11. Carries out other duties as assigned.
Minimum Qualifications
Advanced degree in information security, computer science, engineering, mathematics, or related field of study plus a minimum of 8 years of progressive information security work experience; or a bachelor’s degree in information security, computer science, engineering, mathematics, or related field of study and minimum of 14 years of progressive information security work experience.
Additionally, below qualifications are sought after:
Relationship Management Skills
Work Management Skills
This vacancy shall be filled by a 3-year Term appointment in accordance with the Fund’s new employment rules that took effect on May 1, 2015.
Department:
ITDSG Information Technology Department Information Security & Governance
Hiring For:
A13, A14
The IMF is committed to achieving a diverse staff, including age, creed, culture, disability, educational background, ethnicity, gender, gender expression, nationality, race, religion and beliefs, and sexual orientation. We welcome requests for reasonable accommodations for disabilities during the selection process.