REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES]



Similar documents
REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES]

Ministry of Communications and Information Technology (MCIT); Islamic Republic of Afghanistan

Consultant for Security Framework of Mobile Applications Service Contract (Advisory Services)

REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES FIRMS SELECTION)

External Supplier Control Requirements

Cisco Advanced Services for Network Security

A Decision Maker s Guide to Securing an IT Infrastructure

Passing PCI Compliance How to Address the Application Security Mandates

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Keyword: Cloud computing, service model, deployment model, network layer security.

National Cyber Security Strategy of Afghanistan (NCSA)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Consultancy Services: International Consultant E-GIF, ITIL standards and IT Governance Project: E-Government Resource Center (EGRC II)

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Secure Code Development

State of Texas. TEX-AN Next Generation. NNI Plan

EC-Council Certified Security Analyst (ECSA)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Hackers are here. Where are you?

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Reducing Application Vulnerabilities by Security Engineering

ICANWK406A Install, configure and test network security

External Supplier Control Requirements

Hackers are here. Where are you?

Priority III: A National Cyberspace Security Awareness and Training Program

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

How to complete the Secure Internet Site Declaration (SISD) form

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cisco Security Optimization Service

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Global Partner Management Notice

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

GoodData Corporation Security White Paper

Intro to Firewalls. Summary

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

PCI Requirements Coverage Summary Table

Firewall and UTM Solutions Guide

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

How To Protect A Web Application From Attack From A Trusted Environment

CRYPTUS DIPLOMA IN IT SECURITY

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Enterprise Computing Solutions

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Ministry of Information and Communication Technology EXPRESSION OF INTEREST

Course Title: Penetration Testing: Security Analysis

INFORMATION TECHNOLOGY

Analyze. Secure. Defend. Do you hold ECSA credential?

Privacy + Security + Integrity

Islamic Republic of Afghanistan Ministry of Communications & Information Technology. Major working plan of central directorate of MCIT for -1392

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Computer Network Engineering

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Cyber Threats in Physical Security Understanding and Mitigating the Risk

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Evaluation Report. Office of Inspector General

Web App Security Audit Services

Protecting Your Organisation from Targeted Cyber Intrusion

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Network Security Policy

ددم یلع اي PROFILE Name: Date of Birth: Marriage: Job experience: WORKING EXPERIENCE December 2014 Present MCI and April 2013 December 2014

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Presented by Evan Sylvester, CISSP

Information Security Services

White Paper. Information Security -- Network Assessment

Broadband Connectivity to Government and Local Government Institutions in Bangladesh

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

How To Manage Security On A Networked Computer System

Better secure IT equipment and systems

Study of Afghan Telecom Industry

Request for Expressions of Interest IT System Consultant

LINUX / INFORMATION SECURITY

A Model-based Methodology for Developing Secure VoIP Systems

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Introduction to Cyber Security / Information Security

Penetration testing & Ethical Hacking. Security Week 2014

Certified Information Systems Auditor (CISA)

CS5008: Internet Computing

Fujitsu s Approach to Cloud-related Information Security

74% 96 Action Items. Compliance

Vulnerability Management

Transcription:

REQUEST FOR EXPRESSIONS OF INTEREST (REOI INCLUDING TOR) [INDIVIDUAL CONSULTANCY SERVICES] COUNTRY: NAME OF THE PROJECT: SECTOR: CONSULTING SERVICES: CONTRACT TYPE: DURATION OF ASSIGNMENT: DUTY STATION: CONTRACT REFERENCE NO: WORLD BANK GRANT NO: PROJECT ID NO: IMPLEMENTING AGENCY: Afghanistan Afghanistan ICT Sector Development Project Information and Communications Technology (ICT) Individual Consultant to support ICT Department for Designing the Cyber Security Framework of Afghanistan Individual Consultant-Time based Contract 12 months Kabul, Afghanistan MCIT/ICTDP/C-3.6 IDA-H-665-AF P121755 Project Implementation and Coordination Unit (PICU) of MCIT Background: The Ministry of Communications and Information Technology (MCIT), Islamic Republic of Afghanistan has received financing from the World Bank towards the cost of the ICT Sector Development Project (ICTDP) amounting to estimated cost of 50 Million USD and intends to apply part of the proceeds to hire a qualified Individual Consultant to support ICT Department of MCIT for Designing the Cyber Security Framework of Afghanistan. This Consultancy Support will be provided to the Information Systems Security Directorate of MCIT, under the World Bank funded Project Afghanistan ICT Sector Development Project. The aim of the ICT Sector Development Project of MCIT(as funded by the World Bank) is to expand broadband connectivity, mainstream use of mobile applications across the Government and develop the capacity of the IT sector to facilitate improved service delivery across Afghanistan while accelerating job creation and economic growth. The project will do so by: (a) Creating the enabling environment and making strategic investments for the development of Afghanistan s backbone and broadband infrastructure; (b) Supporting the mainstreaming of mobile applications across Government by supporting innovations and creation of cross cutting enablers; and (c) Developing local IT infrastructure and capacity in the public and private sectors. Project Development Objectives with their Output Indicators for each Project Component of the World Bank funded ICT Sector Development Project of MCIT are listed below: Page 1 of 8

The PDO-level results indicators are as follows: Impact of Consultancy Support Component 1: Expanding connectivity Expanded reach and availability of telecommunications services and specifically broadband Internet services Component 2: Mainstreaming mobile applications Use of mobile applications across Government for public services and program management Improved capacity of Government to use IT strategically Component 3: IT industry development Growth of local IT Individual Consultants and job creation in the IT based services sector Output Indicator(s) Revised ICT policy adopted by the Government of Islamic Republic of Afghanistan Access to internet services (number of subscribers per 100 people) Access to telephone services (number of subscriptions per 100 people) Length of fibre optic network built under the Project (km) Number of Government agencies or programs using m-apps for public service delivery or program management Number of ministry CIOs and other officials trained under the Project Number of people trained under the Project Baseline (2010) 2003 telecom and Internet policy; 2003 ICT policy Proposed targets (2016) Revised policy adopted 3 10 55 80 0 1000 0 10 0 100 0 1500 1) Project Implementation Arrangements: a) The Project has a centralized management structure. The Ministry of Communications and Information Technology (MCIT) is the implementing agency for the project. MCIT is implementing a number of sectoral projects funded by the government and other development partners. To manage its portfolio of investment projects better, MCIT has established a program implementation and coordination unit (PICU) that the Deputy Minister (Technical) of MCIT chairs. b) Director of the Planning and Policy Department and Deputy Minister of IT are the core members of the PICU. The Finance and Procurement Directorates of MCIT provide support to the PICU. This is to ensure further strengthening and sustainability of program management capacity that has been developed over the last few years within MCIT. Core financial management and procurement functions for the project are handled by the respective departments within MCIT.A Project Management Office (PMO) supports MCIT in implementation of the IDA project. This PMO is part of the established PICU. Page 2 of 8

Schematic of Project Implementation and Coordination Unit PROJECT STEERING COMMITTEE (PSC) for the Project on ICT SECTOR DEVLEOPMENT PROJECT of Afghanistan Program Implementation and Coordination Unit (PICU) Chairman of PICU: H.E. Engineer. Baryalai Hassam, Deputy Minister Technical-Ministry of Communications and IT Project Management Office Project Management Specialist Financial Management Specialist Procurement Specialist M&E Specialist Communications specialist Other Specialists/Experts of PMO Dr. Aziz-ur Rahman Safi- Policy and Planning Director of MCIT Mr. Janat Fahim - Procurement Director of MCIT H.E. Engr. Aimal Marjan- Deputy Minister-IT of MCIT Engr. Gul Ahmad Rastman- CEO of AfghanTelecom Engr. Wakil Shergul- Chairman-ATRA [Co-opted Member] Mr. Yasin Hamraz- Finance Director of MCIT 2) Brief on Rapid Growth of Telecommunications Sector in Afghanistan: a) The Afghan Telecom Regulatory Authority (ATRA) was established in 2006 for issuance of licenses, monitoring of quality of services provided by the licensees and taking measures towards developing the sector by encouraging private sector investments. Activities of ATRA are mainly based on the Telecom policy developed and adopted by the Minister of Communications and IT on 03 July, 2003 with the vision to develop the Telecom and Internet sector in order to provide affordable and quality services to the citizens of Afghanistan on a nationwide basis. b) In July 2003, two licenses for GSM Services (in 900 MHz) were issued to Afghan Wireless Communications Company (AWCC) and Telecom Development Company Afghanistan (Roshan).Pursuant to the Policy, they were provided a duopoly on GSM Services until the end of 2005.Based on the fact that the three year term of the two original licenses was about to come to an end, on 21 May 2005, ATRA officially launched an international competitive tender for two additional licenses for GSM Services (and any other services in the assigned 900 and 1800 MHz bands). As a result, two additional GSM licenses were issued in May 2006, one to MTN and another to Etisalat. Page 3 of 8

c) The former Telecommunication Department of the Ministry of Communications of Afghanistan was taken out of the Ministry of Communications and became a government owned Telecommunications Company which also received a Unified Services license from ATRA in 2005. It was named Afghan Telecom (AfTel). Aftel also inherited Fixed Line and Fiber Optic networks. In addition, AfTel also provides Internet services through its fixed line facilities as well as through WiMAX frequencies allocated to it by ATRA. d) Since private entry into the Telecom market in 2003, the telecom sector in Afghanistan has grown at a remarkable rate and now approximately 18 million Afghanistan businesses, government entities and consumers have mobile telephone service and over one million users have Internet service. And, the current installation of an AfTel Fiber Optic ring throughout Afghanistan is connecting Afghanistan with the rest of the World at lower costs for voice and data services. Now, that the basic needs of the people in Afghanistan have been fulfilled, MCIT and ATRA have also issued 3G (Third Generation) licenses to four(out of 5) existing mobile operators of Afghanistan. e) Afghan Telecom (AFTEL) is a Telecom Operator, 100 % owned by Ministry of Communications and IT (MCIT). It is a Government owned Corporation and planned to be privatized in due course of time. In 2006, Optical Fiber Cable Ring Project was funded by the Government from the Core Development Budget, to establish an OFC Ring of 3100 Kms and again in 2010, another 500 Kms have been funded. AFTEL is the only Operator in Afghanistan currently permitted to own the OFC based Backbone of the Country. The Company is selling Internet Bandwidth by bringing the same from neighboring Countries (Pakistan, Iran, Tajakistan and Uzbekistan) through OFC Backbone. Telecom Operators and ISPs are hiring the OFC based Internet Capacities and the Fiber Capacities from Afghan Telecom. f) Under the World Bank funded ICT Sector Development Project as approved in May, 2011, up to 27 Million USD will be spent to connect 05 Provinces and 13 Districts to the existing OFC Ring of Afghan Telecom. Within next 03 years, it is estimated that all the 34 Provincial Capitals and many Districts will be served by the OFC based Backbone Network. Objectives of the Consultancy Assignment: Individual Consultant will assist the Head of Information Systems Security Directorate of MCIT, to provide Cyber Security Services to MCIT. These Cyber Security Services include data audit, policy enforcement, information assurance and incident responses. The Consultant will train the Staff of MCIT on Cyber Security Technologies, Access Controls, Authentication Procedures, Intrusion Detection & Incident Responses, Risk Management, Vulnerability Assessment & Audit and Cyber Security Policies, Regulations and Procedures. Detailed Scope of Work/Tasks of the Consultant: a) Provide on-site orientation to MCIT s Staff related to Cyber security, information assurance and related technologies; b) Carry out in-depth analysis of the Cyber Security infrastructure of MCIT; c) Conduct risk analysis on MCIT s existing networks; Page 4 of 8

d) Prepare standard procedures for the cyber security risk assessment; e) Provide a framework on the Incident Response Process; f) Provide training to MCIT s Information Systems Security Directorate Staff on: i) Cyber Security Basics: Goals of cyber security, structure of the Internet, common types of attacks and review of the players in the cyber security arena; ii) Understanding Cyber Technology: Cyber technology, TCP/IP, networked applications and network components; iii) Cyber Attack Technology: Threats, exposures, weaknesses and attack methodologies; iv) Access Controls: The role of access controls, group policies, security templates, and firewall policies; v) Authentication: Authentication, authorization and accounting, enterprise grade authentication and the role of multifactor authentication; vi) Intrusion Detection and Incident Response: Intrusion prevention and detection, incident response, forensic analysis and the evidence life cycle; vii) Risk Management: Identifying assets, determining exposures, considering controls to reduce cyber risk and mechanisms to secure critical systems; viii) Security Policies and Best Practices: Designing and implementing policies, standards and procedures developing best practices; ix) Securing Network Communications: Securing remote access networks, creating VPNs and assessing the need for secure communications; x) Vulnerability Assessment and Audit: Scanning systems of MCIT, performing vulnerability assessments on MCIT s Systems executing penetration tests and mechanisms to review log files and working with syslog servers of MCIT; xi) Cyber Security-way forward: An analysis of the future of cyber security, emerging job roles and needed skills for the emerging cyber security fields. g) The Consultant will also carry out any other Tasks within the broad scope of cyber security as assigned to him by Director of Information Systems Security Directorate and by Deputy Minister- IT of MCIT. Deliverables and Reporting Requirements: a) The entire assignment is scheduled to be completed within 12 months from the date of signing the Contract or from the date of joining the Assignment at MCIT; b) The Consultant will be located at MCIT main office -Kabul, Afghanistan; c) The Consultant will report to the Director of Information Systems Security Directorate of ICT Directorate of MCIT; d) The Consultant will submit monthly Progress Reports on all the Tasks assigned to him, to the Director of Information Systems Security Directorate, to the Head of the PMO-ICTDP and to the Deputy Minister-IT of MCIT. Page 5 of 8

Qualification Requirements of the Consultant: 1. Should have University Degree in any IT Discipline; Master s degree in information security will be preferred; 2. Must possess Professional Certifications such as CISSP, CEH, ISMS or Higher/Equivalents; 3. Should have at least 5 years of experience in network and data security; 4. Should have minimum of 2 years of hands on technical experience in Cyber security, information assurance and related technologies; 5. Must have Knowledge of industry standards, e.g. ISO 2700 series and other industry related security standards; 6. Must have experience with the utilization of Information Security tools NMAP, Ethereal, Web Inspect, etc. and manual techniques to exploit the vulnerabilities in the OWASP top 10 including but not limited to cross-site scripting, SQL injections, session hi-jacking and buffer overflows to obtain access to target systems; 7. Should have good understanding of systems design and analysis; Understanding of international policies and standards in areas of network securities; Understanding of Cisco platforms being used by the Government; Understanding of network security standards; Good understanding of computer hardware; Good understanding of server applications and operating systems; Understanding of international policies and standards in areas of computer networks and hardware; 8. Should have ability to perform network traffic forensic analysis, utilizing packet capturing software, to isolate malicious network behavior, inappropriate network use, or identification of insecure network protocols; Attack and Penetration experience in testing of internet infrastructure and web-based applications utilizing manual and automated tools; 9. Should have experience in the analysis and assessment of the vulnerabilities of the infrastructure (software, hardware, networks); 10. Should have good knowledge on Encryption Algorithms for GSM Mobile Phone calls. 11. Should have ability to Trace Outbound VOIP/Tail End Hop Off (TEHO) Calls. 12. Should be able to Provide Security for Cisco IP Phones; 13. Should have experience in Image Processing & Image Segmentation for Customized Physical Security for MCIT; 14. Should have excellent programming skills to Review software source code to identify potential security issues and vulnerabilities that could be exploited by hackers to gain unauthorized access to data and system resources; 15. Should have ability to program Surveillance security Algorithm's using Advanced Digital Image Processing Using Matlab or OpenSource; 16. Should be able to install firewalls, data encryption and other security measures. Page 6 of 8

17. Should have deep Packet level knowledge till layer 7 Inspection with good understanding of IPS/IDS; 18. Should be able to recommend security enhancements and purchases; 19. Should be able to analyze newly discovered computer viruses and designs and develop software to defend against them; 20. Should be able to train staff on network and information security procedure; 21. Should have basic understanding of networks, including TCP/IP and network security concepts ; 22. Must be able to troubleshoot complex PC configurations ; 23. A thorough knowledge of English is essential; 24. Should have good communication and interpersonal skills. Timelines and payment schedules: The selected Consultant will be paid on monthly basis, after the monthly Reports have been submitted to the PMO of the ICT Sector Development Project of MCIT. All the agreed upon Milestones of the consultancy will be considered complete only upon the acceptance and formal approval of Deputy Minister-IT of MCIT and the Project Director of ICTDP-MCIT. All payments will be made within 30 days from the date of submission of approved and signed Invoices, Activity/Time Sheets for the Period and the Monthly Reports, both in English and Pashtu/Dari languages. Facilities to be given by MCIT: The following facilities and Support will be provided to the Consultant by the client (MCIT): A suitable working space; Internet connectivity in Office. Relevant background documents. Vehicle for mobility for official tasks during working hours. Request for Expressions of Interest (REOI) by MCIT: The Ministry of Communications and Information Technology (MCIT) now invites eligible Consultants to indicate their interest in providing the services. Interested Consultants must provide information indicating that they are qualified to perform the services. Description of qualifications held, experience and availability of appropriate skills should be given in Consultant s CV. A Consultant will be selected in accordance with the procedures set out in the World Bank s Guidelines: Selection and Employment of Consultants by World Bank Borrowers (January, 2011 edition). To ensure impartiality, the consultant (including his home office, if any) must not, in any way, be affiliated with business entities that are currently providing or are seeking to provide goods or services to the project. Page 7 of 8

For further details, Interested Consultants are requested to contact GM-FPD of MCIT, at the address given below, during office hours from 0800 to 1600 hours: Mr. SamimullahSamim; General Manager for External Procurements; Foreign Procurement Department (FPD) Procurement Department, Ministry of Communications and IT (MCIT) Mohammad Jan Khan Watt; Kabul, Afghanistan Phone: Office: +93 20 210 37 41; Cell: +93 700 222 009; Email:fpd@mcit.gov.af Any queries on the position may also be addressed to the above mentioned email address (fpd@mcit.gov.af), with CC to mi.bhat@mcit.gov.af latest one week before the deadline for submission of expression of interest. Expressions of interest, including detailed Resumes (CVs) must be delivered by E-Mails To: fpd@mcit.gov.af; with CC to: mi.bhat@mcit.gov.af;nadir.soroush@mcit.gov.af Last date for receiving the CVs is 07 th July, 2014 Page 8 of 8