IMPORTANT NOTICE REGARDING APPLICATION DEADLINE: please note that the deadline for applications is indicated in local time as per the time zone of the applicant’s location.
1. Organizational Context
a. Organizational Setting
The post is located in the Information Security Section, Security and Information Assurance Division (SIAD). This Division is responsible for the management of all aspects of WIPO's information and physical security and safety and ensures that appropriate policies and procedures are in place and effective measures and controls are established to assess and mitigate threats/risks to the Organization. In particular, the Division defines the controls for the implementation of information security technologies and monitors if adequate assurance is maintained over WIPO's information assets. The Division also provides professional safety and security services for WIPO staff, its delegates and visitors and ensures the protection of the Organization's facilities and assets. Appropriate balance of the roles between "service" and "control" is the key for its success in enabling and sustaining WIPO's operations in an environment with increasing demands for openness and connectivity on the one hand and rapidly evolving information security risks on the other hand.
b. Purpose Statement
The incumbent will be the principal technical authority on information security architecture within WIPO. They will be responsible for ensuring that the design of business solutions meet secure architecture principles and standards, as well as for the continuous development of defensible architecture principles and patterns that align with WIPO's information security risk tolerances, ensuring they are resilient against an evolving threat environment. The Senior Information Security Architect is expected to advise and influence business and technology decisions on the development and procurement of ICT services and products. The role will represent information security at Enterprise Architecture committees. The Senior Information Security Architect is a strategic leader responsible for shaping and safeguarding WIPO’s information assets. This role ensures that security architecture principles are embedded in all business solutions, enabling WIPO to operate securely in a rapidly evolving digital landscape.
c. Reporting Lines
The incumbent works under the supervision of the Head of Information Security Section.
d. Work Relations
The incumbent works closely with different areas of the Patent and Technology Sector, The Architectural Solutions Group (ASG). as well as with other WIPO Sectors, officials from IP Offices, and other internal and external stakeholders.
2. Duties and Responsibilities
The incumbent will perform the following principal duties:
a. Lead the development and continuous refinement of WIPO's strategic security architecture vision, ensuring alignment with Information Assurance and ICT strategies. Contribute to the development and maintenance of WIPO's Information Assurance strategy.
b. Collaborate with information risk, enterprise architecture, security engineering, Architectural Solutions Group, and application teams to define and apply business relevant and risk-based security architecture standards.
c. Collaborate proactively with assurance and risk teams to support and strengthen the wider controls environment, ensuring that security architecture aligns with organizational risk management and assurance frameworks.
d. Define, publish and maintain the information security elements of WIPO's enterprise architecture blueprint in close coordination with WIPO's enterprise architect and business ICT teams, integrating security architecture principles into system development and engineering processes.
e. Ensure that WIPO's security reference architectures and patterns are current, standards-based, relevant, and adaptable to evolving business needs. Areas include: identity and access management, service-oriented architectures, security auditing and logging, monitoring and reporting architectures, network segmentation, security policy detection and policy enforcement controls, remote access architectures, endpoint strategies, federation, application security architectures, mobility, and cloud security architectures.
f. Review business and technology services and product architectures, identify design gaps, and recommend security enhancements.
g. Represent information security in the WIPO Architectural Solutions Group ensuring applications are designed with threat models, attacks paths and security standards in mind.
h. Manage a continuous architectural compliance program measuring and reporting compliance and effectiveness to governance committees.
i. Develop and implement an awareness program to promote information security architecture principles and their application among business and ICT stakeholders. Identify and mentor champions for secure architectures practices.
j. Perform other related tasks as required.
3. Requirements
Education (Essential)
Advanced university degree in information security, computer science, engineering, mathematics, business or related discipline. A first-level university degree in information security, computer science, engineering, mathematics, business or related discipline plus two years of relevant experience may be accepted in lieu of an advanced degree.
Certifications in information security: CISSP and SABSA-SCP.
Education (Desirable)
Additional certifications like SABSA Master, CISM, BRMP, CISSP-ISSAP, CSSLP, CCSK, or GSSP.
AWS Certifications: Solutions Architect - Associate or Professional; DevOps/SysOps; Security Specialty.
Experience (Essential)
At least seven years of relevant professional experience in regulated industries.
Proven experience as an Information Security Architect, including leading matrix teams to architect, design, build, and implement complex information security application and infrastructure architectures for organizations facing multiple and sophisticated threats.
Experience in business analysis and integration of secure system development lifecycles into well recognized project and service management methodologies.
Experience working with and participating in an architectural solutions group or board.
Hands-on experience securing at least one of the three major public cloud vendors (AWS, Azure, GCP).
Experience in the implementation of IT Security in the areas of identity and access management, infrastructure, network, endpoints, applications, database system technologies, mobility, cloud, virtualization security architectures, and information security process improvement.
Experience designing and securing solutions that leverage LLMs.
Experience (Desirable)
Experience integrating SABSA security principles with other architecture disciplines such as TOGAF.
Experience with securing and architecting solutions that leverage M365 technology such as power BI and power automate.
Hands-on experience with identity and access management, authentication, and cloud security (AWS, Azure, or GCP).
Experience with security process improvement and securing solutions using large language models (LLMs).
Language (Essential)
Excellent written and spoken knowledge of English.
Language (Desirable)
Knowledge of other UN official languages, particularly French.
Job Related Competencies (Essential)
Broad knowledge of technologies with deep expertise in areas relevant to information security including Security architecture frameworks; Identity and access management; Authentication and authorization; Cloud security; Threat modeling and risk management; Security monitoring, auditing, and incident response; Application security.
Ability to quickly grasp how new technologies work and how they might be applied to achieve business goals.
Excellent insight into business and technological trends and their impact (risks and opportunities) to business enablement.
Strong analytical and strategic thinking skills; able to synthesize information from multiple sources.
Collaborative and able to build partnerships in a multicultural environment.
Demonstrates integrity, values diversity, and shows service orientation.
Good organizational and interpersonal skills to influence others towards a shared vision and positive results with or without the line of command.
Effective communication, able to explain complex technical concepts to non-technical stakeholders.
Results-driven, with personal accountability and ownership.
Committed to continuous learning and innovation.
Job Related Competencies (Desirable)
Strong knowledge of security architecture frameworks (e.g., SABSA, TOGAF).
Proficiency in threat modeling, risk management, and application security (e.g., OWASP).
Familiarity with IT GRC tools, advanced infrastructure security, web services security, and automation platforms.
4. Organizational Competencies
1. Communicating effectively.
2. Showing team spirit.
3. Demonstrating integrity.
4. Valuing diversity.
5. Producing results.
6. Showing service orientation.
7. Seeing the big picture.
8. Seeking change and innovation.
9. Developing yourself and others.
5. Information
Mobility: WIPO staff members are international civil servants subject to the authority of the Director General and may be assigned to any activities, office or duty station of the Organization. Accordingly, the selected candidate may be required to move from time to time to new functions and/or to another duty station.
Annual salary:
Total annual salary consists of a net annual salary (net of taxes and before medical insurance and pension fund deductions) in US dollars and a post adjustment. Please note that this estimate is for information only. The post adjustment multiplier (cost of living allowance) is variable and subject to change (increase or decrease) without notice. The figures quoted below are based on the November 2025 rate of 90%
P4 |
| |||
Annual salary | $77,326 |
| ||
Post adjustment | $69,593 |
| ||
Total Salary | $146,919 |
| ||
Currency USD | ||||
Salaries and allowances are paid in Swiss francs at the official rate of exchange of the United Nations.
Please refer to WIPO’s Staff Regulation and Rules for detailed information concerning salaries, benefits and allowances.
Additional Information
* Initial period of two years, renewable, subject to satisfactory performance. No fixed-term appointment or any extension hereof shall carry with it any expectancy of, nor imply any right to, (further) extensions or conversion to a permanent appointment.
This vacancy announcement may be used to fill other posts at the same grade with similar functions in accordance with Staff Rule 4.9.5.
Applications from qualified women as well as from qualified nationals of unrepresented Member States of WIPO and underrepresented geographical regions are encouraged. Please click on the following links for the list of unrepresented Member States and the list of underrepresented regions and the WIPO Member States in these regions.
The Organization reserves the right to make an appointment at a grade lower than that advertised.
By completing an application, candidates understand that any willful misrepresentation made on this web site, or on any other documents submitted to WIPO during the application, may result in disqualification from the recruitment process, or termination of employment with WIPO at a later date, if that employment resulted from such willful misrepresentations.
In the event that your candidature is shortlisted, you will be required to provide, in advance, a scanned copy of your identification and the degree(s)/diploma(s)/certificate(s) required for this position. WIPO recognizes higher educational qualifications obtained from institutions accredited/recognized in the World Higher Education Database (WHED), a list maintained by the International Association of Universities (IAU) / United Nations Educational, Scientific and Cultural Organization (UNESCO). The list can be accessed here: http://www.whed.net/. Some higher educational qualifications may not be listed in WHED, and will be reviewed on a case-by-case basis.
Additional testing/interviewing may be used as a form of screening. Initial appointment is subject to satisfactory professional references.
Additional background checks may be required.