IT Analyst, Security, Risk and Compliance

Tags: Law
  • Added Date: Wednesday, 10 September 2025
  • Deadline Date: Thursday, 25 September 2025
5 Steps to get a job in the United Nations

IT Analyst, Security, Risk and Compliance Job #: req34310 Organization: World Bank Sector: Information Technology Grade: GE Term Duration:ย 3 years 0 months Recruitment Type: Local Recruitment Location: Chennai,India Required Language(s): Preferred Language(s): Closing Date: 9/24/2025 (MM/DD/YYYY) at 11:59pm UTC

Description

Do you want to build a career that is truly worthwhile? Working at the World Bank Group provides a unique opportunity for you to help our clients solve their greatest development challenges. The World Bank Group is one of the largest sources of funding and knowledge for developing countries; a unique global partnership of five institutions dedicated to ending extreme poverty, increasing shared prosperity and promoting sustainable development. With 189 member countries and more than 120 offices worldwide, we work with public and private sector partners, investing in groundbreaking projects and using data, research, and technology to develop solutions to the most urgent global challenges. For more information, visit www.worldbank.org

Vice Presidency Context:

Information and Technology Solutions (ITS) enables the WBG to achieve its mission of ending extreme poverty by 2030 and boosting shared prosperity in a sustainable manner by delivering transformative information and technologies to its staff working in over 130 client countries.
ITS services range from: establishing the infrastructure to reach and connect staff and development stakeholders; providing the devices and agile technology and information applications to facilitate the science of delivery through decentralized services; creating and maintaining tools to integrate information across the World Bank Group, the clients we serve and the countries where we operate; and delivering the computing power staff need to analyze development challenges and identify solutions.
The ITS business model combines dedicated business solutions centers that provide services tailored to specific World Bank Group business needs and shared services that provide infrastructure, applications and platforms for the entire Group. ITS is one of three VPUs that have been brought together as the World Bank Group Integrated Services (WBGIS), to provide enhanced corporate core services and enable the institution to operate as one strategic and coordinated entity.

Unit Context

The ITS Information Security and Risk Management (ITSSR) unit, headed by the Chief Information Security Officer (CISO), is responsible for providing leadership in managing the functions and activities of information security and risk across the World Bank Group, enabling the achievement of WBGโ€™s business objectives.ย  ITSSR enables and facilitates a risk aware culture, ensures that WBG information assets are protected in an effective, efficient, and balanced manner; and IT security and risk management efforts throughout the World Bank Group are coordinated and aligned to the Bank's business and IT strategy.ย ย  ITSSR establishes and maintains the World Bank Group's IT and InfoSec policies and standards;ย  develops and engineers the WBGโ€™s information security plans and solutions; responds to security incidents; and ensures that the information risks are identified, assessed, and managed in consistent with the overall risk management approach and with the established appetite and tolerance.

Duties and Accountabilities:

ITSIS is seeking to fill the position of IT Analyst, Security, Risk and Compliance within ISOC. The IT Analyst serves across all areas of threat intelligence to help inform and defend the business and protect brand reputation. As a trusted member of the cybersecurity team and industry community, the analyst works closely with internal technical teams, business units and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, government agencies and public affiliation peers. The IT Analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. The analyst will also distill threat intelligence so technical and non-technical contacts can understand it and make educated decisions about next-step actions. In addition to applied experience, the individual will bring excellent problem solving, communication and teamwork skills, along with agile ways of working, strong business insight, an inclusive leadership attitude and a continuous learning focus.

Note: If the selected candidate is a current Bank Group staff member with a Regular or Open-Ended appointment, s/he will retain his/her Regular or Open-Ended appointment. All others will be offered a 3 year term appointment.

Scope of Work

- Research current and emerging threats facing the business and industry sector.

- Lead production and delivery of recurring threat intelligence products including reports, one pager, threat briefs etc.

- Deliver threat briefings and awareness sessions to internal staff.

- Conduct and publish in-depth risk assessments to evaluate and categorize the risk posture of detected cyber threats while supporting development and refinement of risk assessment methodologies and tools used for threat categorization

- Collaborate with internal and external stakeholders, to gather and share relevant threat intelligence.

- Develop and maintain threat profiles and reports to enhance detection and response capabilities.

- Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.

- Centralize multiple threat sources (premium, industry-shared, open-source, dark web), correlate indicators and threats, and distill actionable intelligence.

- Deliver on the digital risk management portfolio covering social media, brand protection etc.Develop and maintain high quality PowerBI dashboards to show coverage and effectiveness.

- Automate routine tasks for efficient operations and support of the team.

- Document threats into contextual reports outlining severity, urgency and impact, and ensure they can be understood by both management and technical teams.

- Participate, implement and maintain deception technology

- Be readily available to participate in collaborative threat analysis meetings with internal and external trusted entities.

- Liaison with threat hunting, infrastructure, IT, vulnerability management, threat intelligence and software engineer team members.

- Understanding of various generative models (e.g., GPT, GANs) and their applications.

- Plan and execute the implementation of threat management solutions through a data driven and agile approach.

- Perform other duties as assigned.

Selection Criteria

* Bachelor's degree in computer science, information technology, systems engineering, or a related field.

* Minimum 5 years of Information Security experience required with majority of time in a SOC.

* Strong written and verbal communication skills across all levels of the organization.

๐Ÿ“š ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—š๐—ฒ๐˜ ๐—ฎ ๐—๐—ผ๐—ฏ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐—ถ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ! ๐ŸŒ๐Ÿค ๐—ฅ๐—ฒ๐—ฎ๐—ฑ ๐—ผ๐˜‚๐—ฟ ๐—ก๐—˜๐—ช ๐—ฅ๐—ฒ๐—ฐ๐—ฟ๐˜‚๐—ถ๐˜๐—บ๐—ฒ๐—ป๐˜ ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ฒ๐˜€๐˜ ๐˜€๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—จ๐—ก๐—›๐—–๐—ฅ, ๐—ช๐—™๐—ฃ, ๐—จ๐—ก๐—œ๐—–๐—˜๐—™, ๐—จ๐—ก๐——๐—ฆ๐—ฆ, ๐—จ๐—ก๐—™๐—ฃ๐—”, ๐—œ๐—ข๐—  ๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜๐—ต๐—ฒ๐—ฟ๐˜€! ๐ŸŒ

โš ๏ธ ๐‚๐ก๐š๐ง๐ ๐ž ๐˜๐จ๐ฎ๐ซ ๐‹๐ข๐Ÿ๐ž ๐๐จ๐ฐ: ๐๐จ๐ฐ๐ž๐ซ๐Ÿ๐ฎ๐ฅ ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ ๐ก๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐š ๐ฃ๐จ๐› ๐ข๐ง ๐ญ๐ก๐ž ๐”๐ง๐ข๐ญ๐ž๐ ๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐๐Ž๐–!

* Maintain a current understanding of advanced persistent threats (APTs), threat actor tactics, techniques, and procedures (TTPs), and cyber threat trends.

* Applicable knowledge of adversary tactics, techniques and procedures (TTPs), MITRE ATT&ACK framework, CVSS, open source intelligence (OSINT) and deception techniques.

* Demonstrated ability to investigate, handle and track incidents.

* Proficient in SIEM, intrusion detection and prevention systems (IDS/IPS), threat intelligence platforms and security orchestration, automation and response (SOAR) solutions to centralize and manage incident and remediation workflow.

* Ability to analyze incident logs, assess malware, and understand vulnerabilities and exploits, along with strong operating systems knowledge.

* Experience in incident handling, vulnerability management, hacking tools, intelligence gathering and kill chain methodology.

* Capable of working with diverse teams and promoting an enterprise-wide positive security culture.

* Ability to maintain a high level of integrity, trustworthiness and confidence, with the highest level of professionalism.

* Strong project management, multitasking and organizational skills.

* Ability to preserve credibility with the team and external constituents through sustained industry knowledge.

* Ability to motivate teammates to achieve excellence and willingly shares knowledge.

* Proven experience executing cyber threat hunting, incident response, or other relevant security operations.

* Familiarity with common enterprise scripting languages (PowerShell, Python, Bash, etc.).

* Leverage diverse ideas, experiences, thoughts, and perspectives to the benefit of the organization.

* Excellent problem solving, communication and collaboration skills.

* Understanding of how operating systems work and how malware exploits them.

* Past exposure to handle malware and financial crime malware related incidents.

* Familiarity with industry-standard processes defined for systems design, database design, development, testing, and integration phases of a project, including Agile-based implementations.

* Experience working in Agile environments, participating in Agile ceremonies, and utilizing Agile methodologies for security operations and threat investigations.

* Knowledge of common hacking tools and techniques

Preferred Skillsets / Requirements

โ€ข GIAC Certified Incident Handler (GCIH), GIAC Cyber Threat Intelligence (GCTI), GIAC Reverse Engineering Malware Certification (GREM)ย preferred, but not required.

Competencies

โ€ข Client Understanding and Advising - Looks at issues from the clientโ€™s perspective and takes action beyond normal expectations to ensure client satisfaction.

โ€ข Learning Orientation - Stays abreast of new trends and developments in own specialty area, the broader industry, and exposes self to increasingly more challenging projects and opportunities to learn.

โ€ข Broad Business Thinking - Maintains an in-depth understanding of the long term implications of decisions both for department and the clientโ€™s business. Ensures that decisions are supported by relevant stakeholders as well as sound performance data.

โ€ข Compliance with Standards - Monitors and maintains records on requests for information and assistance.

โ€ข Knowledge of Emerging Technology - Tests new technology to evaluate capability compared to specifications.

WBG Culture Attributes:

1. Sense of Urgency โ€“ Anticipating and quickly reacting to the needs of internal and external stakeholders.
2. Thoughtful Risk Taking โ€“ Taking informed and thoughtful risks and making courageous decisions to push boundaries for greater impact.
3. Empowerment and Accountability โ€“ Engaging with others in an empowered and accountable manner for impactful results.

World Bank Group Core Competencies

The World Bank Group offers comprehensive benefits, including a retirement plan; medical, life and disability insurance; and paid leave, including parental leave, as well as reasonable accommodations for individuals with disabilities.

We are proud to be an equal opportunity and inclusive employer with a dedicated and committed workforce, and do not discriminate based on gender, gender identity, religion, race, ethnicity, sexual orientation, or disability.

Learn more about working at theย World Bankย andย IFC, including our values and inspiring stories.

Recommended for you