INVISIBLE CHILDREN has floated a tender for Global Security Consultant. The project location is USA and the tender is closing on 01 Mar 2019. The tender notice number is , while the TOT Ref Number is 30754846. Bidders can have further information about the Tender and can request the complete Tender document by Registering on the site.

Expired Tender

Procurement Summary

Country : USA

Summary : Global Security Consultant

Deadline : 01 Mar 2019

Other Information

Notice Type : Tender

TOT Ref.No.: 30754846

Document Ref. No. :

Competition : ICB

Financier : United States Agency for International Development (USAID)

Purchaser Ownership : -

Tender Value : Refer Document

Purchaser's Detail

Purchaser : INVISIBLE CHILDREN
Tel: 619.562.2799 641 S STREET NW WASHINGTON, D.C. 20001
USA
Email :crcaprocurements@invisiblechildren.com

Tender Details

Tenders are invited for Global Security Consultant.

Target Location(s)

United States (namely Washington, D.C.), Democratic Republic of Congo (DRC), the Central African Republic (CAR), South Sudan, Uganda (namely Entebbe and Kampala)

Duty Station

Remote, with travel expected to: Washington, D.C., USA, Kinshasa, Dungu, Ango (DRC); Bangui, Obo, Zemio, Bria (CAR)

Overview

Invisible Children (IC) is a global nonprofit organization headquartered in Washington, D.C., implementing multiple projects across northeastern DRC, eastern CAR and southwest South Sudan, all of which focus on improving protection, strengthening resilience, and building social cohesion at the community level in the midst of violent conflict and instability. With a growing staff, expanding footprint of field offices in central Africa, and an increased operational and programmatic presence in severely austere and ungoverned areas, IC is seeking a qualified security expert to audit its global security policies, procedures and practices, in light of existing and emerging security threats, and to provide recommendations, trainings, and tools to improve the organization-s security management and reinforce a working culture that prioritizes the safety and security of staff, assets, partners, and beneficiaries. Operations in the central Africa region are complicated by poor infrastructure, political instability and lack of governance, and a proliferation of armed groups. In order to properly assess security risks across all offices, including headquarters and field-based offices, and to ensure that staff have the resources, policies, practices, and training to limit exposure to these risks, IC is hiring a consultant to strengthen its existing security practices and tools and fill critical gaps.Objectives, Activities, and Deliverables

Objective #1: Develop a familiarity with IC-s operating context and risk points, as well as its existing security policies, procedures, tools and systems to inform initial recommendations for immediate improvements and subsequent planning for security assessments

The consultant will conduct a detailed ‘desk- review of IC-s global (headquarters and field-based) security policies and procedures. Using IC-s existing policies, procedures, and security management plans, and other data that the consultant may collect or request from IC (such as questionnaires to staff), conduct a review of IC-s security infrastructure, identifying key risk points, strengths, and weaknesses. This review may include:

· Desk review IC-s current field-based security policies, procedures, manuals and other components of its security infrastructure such as assets, information sources, and service contracts in place;

· A briefing on regional security dynamics with IC-s Director of Research and Policy and other relevant field-based senior leadership;

· Review of data from IC-s Crisis Tracker conflict analysis platform to understand relevant field-based security trends and threats, including armed group activity;

· Conduct interviews with IC HQ and field-based senior leadership to understand IC-s operational footprint, key risk points, and risk management needs, as well as IC-s expectations regarding a) safety and security of its staff, assets (including digital property), and partners, b) staff understanding of security policies and staff culture around risk IC's footprint, risk profile and risk management needs;

· Conduct a review/assessment of IC-s current emergency evacuation and security services

· Any other preparatory tasks that the consultant will deem required at this stage

Objective #2. Based on the information collected and analysis conducted from the ‘desk- review, provide IC with initial recommendations for immediate improvements to its security management, including modifications to policies and procedures, system upgrades, and trainings

Deliverable(s):

· An initial written report, submitted to IC, outlining recommendations for immediate improvements to IC-s policies, procedures, and systems (particularly related to digital security), recommend trainings for IC staff (HQ and field-based), and a detailed workplan for subsequent on-site security assessments of IC offices.

· Presentation of the initial report key outcomes for IC senior leadership;

Note: Deployment to IC offices to conduct on-site security assessments, as well as the delivery of trainings, and other relevant outputs will be determined by IC senior leadership following the presentation of initial report

Objective #3: [Per the outcomes of Objective #2] Develop a more detailed and comprehensive analysis of IC-s operating context, security threats and risk points, existing security management capacities, policies, procedures, as well as site-specific risks, assets, and gaps, through on-site visits to IC offices and in-person consultations with IC staff, partners, and other key stakeholders.

The consultant will conduct site visits to each IC office in Washington, D.C., DRC, and CAR, to assess the security environment in each location (‘location- understood to be both the immediate location of the office, and, where applicable, the geographic region served from that office) to inform recommended revisions to IC's site-specific and global security manuals, systems, and tools, and to inform recommended trainings:

· Visit each office, assessing the site-specific security situation as well as existing security assets;

· Build a detailed picture of threats, assets, office risks, personnel risks, and travel risks;

· Interview staff and partner personnel to further understand the risks, as well as attitudes and sentiments towards risk and insecurity, from local stakeholders;

· Interview NGOs, UN agencies, security forces, medical providers, and other relevant stakeholders operational in the region to understand safety and security resources, local best practices, and usable evacuation routes;

· Any other tasks that the consultant deems necessary for the production of the localized plans, upon approval by IC-s Project Director (HQ) and relevant Country Director(s).

Deliverables:

· [Per the outcomes from Objective #2] Conduct on-site trainings with IC staff (and partners, where applicable) at designated offices. (Following the presentation of the initial report key findings in Deliverable #2, IC will determine which, if any trainings, the consultant should administer during initial site visits to IC offices.

· IC may request that the consultant provide “interim” debriefs following key site visits, to discuss initial findings and recommendations. These debriefs would include, but may not be limited to:

· a) Recommendations for immediate improvements to site-specific safety and security management plans, tools and systems, hibernation and evacuation plans, and other relevant security measures;

· b) Recommended trainings for field staff and partners

· c) Recommendations for immediate improvements to information management systems, communication systems, and security-related building upgrades.

Objective 4: Provide IC leadership with a comprehensive analysis of relevant security threats and assets, as well as a comprehensive set of recommendations for improvements to the organization-s global security management capacity, policies, procedures, tools, and systems

Deliverable(s):

· A final report submitted to IC senior leadership detailing recommended improvements to the organization-s global security policies, procedures, tools, and systems. The final report should be informed by information gathered during the desk review phase, HQ and field-based site visits, and consultations with relevant staff and other stakeholders, and should include, at a minimum:

· a) Recommended revisions to IC-s global security policies, procedures, and management plans, as well as recommended processes by which these are reviewed and updated moving forward;

· b) Recommended system, tools, and platform upgrades, additions, or changes;

· c) Recommended trainings and resources for staff and partners (in addition to those already provided by the consultant though Objective #3)

· Presentation of an overview of key findings and recommendations to IC leadership.

Objective 5: Ensure relevant IC leadership and lead operations and program staff, are thoroughly trained on the revised/updated security manuals, and on any new or updated security systems and tools

Deliverable(s):

· Remotely design a training module (or set of modules, as needed), to be presented to IC leadership for review and approval in advance of the on-site training

· Upon approval from IC, conduct an on-site training-of-trainers for designated IC leadership and staff on the updated security manuals, systems, and tools. The training may include various modules, with some modules designed for all staff and partners, and with other modules designed specifically for IC leadership and security personnel;

· Produce a “training outcomes” report outlining any notable gaps, concerns, and/or new recommendations that may have arisen during the training-of-trainers that should be taken into consideration

Objective 6: As needed, provide IC with advisory support as the organization develops itoperational capacity to address security risks and implements recommended changes

If and when the timeframe of the security consultant-s consultancy matches with that of the ongoing IC processes, IC may request advisory support from the consultant on a case-by-case basis for needs such as, but not limited to the following:

· Staff structure and recruitment: Recommendations on IC staff structure, reviews of relevant job descriptions, part

Documents

 Tender Notice