Cybersecurity and Protection Specialist – “Digital Shield” - Technology Specialist and Trainer

Number of Positions: 1

Duration: 4  Days

Location: Duhok, Sumel and Sharya

Reporting to: Project Manager

Publishing date: 25th November 2025

Deadline of submission: 27th November 2025

Field of intervention: Business Administration, Management, or Economics.Experience

 

 

About Us

The Lotus Flower is a non-governmental organization which is legally registered in the Federal Government of Baghdad and KRI. The Lotus Flower programs empower vulnerable women, girls and other community members  so that they are safe, have opportunities to learn, the tools to become financially independent and the freedom to lead change. We provide safe social spaces inside refugee & IDP camps and implement projects to help them rebuild their lives and earn a living. We run multiple women’s and children centers for the IDP, refugee and host community in Iraq and have mobile teams in areas where static centers are not feasible.

The Lotus Flower services work to fill resource gaps by providing community-responsive programming which changes over time in response to feedback but revolves around 6 pillars from the UN’s Sustainable Development Goals:

  • Health & Safety (including MHPSS)

  • Education and Livelihoods

  • Peacebuilding & Human Rights

  • Climate Change

We aim to provide a foundation for women, girls, and other needed community members  to rebuild themselves, their families, and their futures. As local implementers, we work at the grassroots level to get right into the heart of communities, listening to local needs and employing local communities to implement the programs. 

Our main fundamental belief is that women and girls are powerful drivers of change, and we provide the support they need to reach their full potential and rebuild their futures. We strive for a world where they are safe from violence, free to access education, and are empowered to participate in their communities to drive social and economic change from within. We are investing in the future of women and girls because they play a vital role in resurrecting and strengthening communities. As local implementers, we work at the grassroots level to get right into the heart of communities. To ensure we meet their needs, we listen to the local community and employ local women to implement the programs.

The Lotus Flower has been widely recognized for its impactful and innovative work in advancing women's rights, economic empowerment, and justice for survivors. In 2021, the organization was honored with the CARE International Partnership Award, a prestigious recognition granted every four years to celebrate the professionalism and commitment of CARE’s global partners. Further affirming its dedication to women’s economic independence, The Lotus Flower received the IValues Award from the Friedrich Naumann Foundation under the “Economy and Jobs” category for the success and significance of its Women’s Business Incubation project. The organization also gained international acclaim through the PILnet Global Partnership Award for its groundbreaking initiative “Accountability for Yazidi Survivors of Atrocities by Da’esh,” which was recognized as one of the best cross-sectoral pro bono legal collaborations worldwide. Additionally, The Lotus Flower was a proud recipient of the UNHCR Innovation Award in 2022, further highlighting its commitment to delivering creative, impactful solutions for vulnerable communities.

 

 

Overall objective of the position:

 

The organizing body is seeking highly qualified Cybersecurity and Protection Specialists to deliver a two-day, advanced, hands-on training program titled “Digital Shield.”
The aim is to strengthen the digital safety, resilience, and response capacity of young women and girls (ages 15–25) by equipping them with practical skills in online self-protection, privacy management, and safe reporting of technology-facilitated gender-based violence (TFGBV). The training will be conducted in close coordination with the Police Technology-Facilitated GBV Crime Unit Liaison.

 

Scope of Work and Key Deliverables

1. Curriculum Design

The trainer is responsible for developing a highly practical, advanced-level curriculum with the following components:

  • Certification Standard: Curriculum must meet the competency level of a Certified Digital Resilience Practitioner (CDRP) for core participants.

  • Pre-training Vulnerability Assessment: Conduct a short assessment of participant digital habits and exposure risks to tailor the content to local threats and online platform use.

  • Inter-agency Integration: Ensure smooth coordination with the Police TFGBV Crime Unit Liaison for legal insights, reporting standards, and jurisdictional considerations.

 

2. Training Delivery: Practical, Hands-On Labs

The training must be structured as intensive, practical laboratories with measurable outcomes.

Day 1 – Proactive Digital Hygiene & Anonymity Layering

Advanced Platform Hardening (Zero-Trust Model):

  • Application-level security configuration across common platforms.

  • Data access revocation, legacy login security, and metadata scrubbing.

  • Digital Footprint Auditing & Remediation:

  • Guided reverse engineering of digital exposure.

  • Hands-on use of proprietary/approved tools for metadata analysis.

  • Each participant must complete a Personal Digital Footprint Audit and a Remediation Plan.

 

Day 2 – Digital Evidence, Documentation & Reporting

Forensic Documentation Protocol:

  • Practical lab on creating a Chain of Custody for digital evidence.

  • Capturing volatile evidence correctly (timestamping, URL metadata, IDs, platform logs).

The Police-Ready Brief:

  • Structured transformation of raw evidence into an indexed Pre-Litigation / Reporting Brief meeting police and prosecution standards.

  • In-depth session with the Police Liaison on:

  • Evidence admissibility

  • Reporting pathways

  • Regional TFGBV statutes

  • Survivor-centered reporting

 

Essential Qualifications

Trainer Qualifications & Requirements

The ideal applicant/team should demonstrate:

  • Dual Expertise: Strong background in advanced cybersecurity/IT security and GBV protection, TFGBV, or digital safety advocacy.

  • Practical Training Experience: Proven portfolio of delivering hands-on technical training to youth and/or vulnerable groups.

  • Legal/Documentation Skills: Strong understanding of digital evidence requirements and reporting mechanisms.

  • Communication Strategy: Ability to design impactful awareness content or online safety campaigns.

 

Required Qualifications and Skills

Education

  • Bachelor's degree in Cybersecurity, Computer Science, Information Security, Digital Forensics, IT, or a closely related field.

 

Experience

  • Minimum 5 years of practical experience in one or more of the following:

  • Cybersecurity, digital security, IT administration, digital forensics

  • Online safety training or TFGBV response

  • Training youth or marginalized groups on digital literacy or protection

  • Experience with NGOs, women’s protection programs, or social impact initiatives is a strong advantage.

Technical Skills

  • Ability to design accessible, practical training materials.

  • Strong understanding of:

  • Digital hygiene and privacy protection

  • Platform security configurations

  • Digital forensics and evidence handling

  • Threat modeling and risk assessment

  • Advanced facilitation skills and experience with hands-on workshops.

  • Familiarity with adult-learning and youth-learning methodologies.

General Skills

  • Strong commitment to ethics, confidentiality, and survivor-centered approaches.

  • Ability to work under pressure, prioritize, and deliver high-quality outputs.

  • Excellent communication and teamwork skills.

Language

  • Spoken and written proficiency in Kurdish and Arabic

 

General Requirements

Timeframe:

  • Two full training days for the “Digital Shield” workshop (date TBD).

  • Pre-work: curriculum design + vulnerability assessment.

  • Post-work: reporting and deliverables.

HOW TO APPLY:

·        Interested trainers or training company should submit their proposals, including (CV), references, and a proposed training to careers@thelotusflower.org  while mentioning “Technology Specialist and Trainer  as the subject of your email.

·        CVs in the form of pictures, and screenshots will not be accepted.

·        CVs that do not include the subject line will not be considered.

·        Only shortlisted candidates will be contacted.

·        Applications past the expiration date of the advertisement will not be considered.

 

Confidentiality

All information provided in response to this TOR will be treated as confidential and used only for the purpose of selecting a trainer.