Consultancy Call: Digital Security Specialist

Consultancy Call: Digital Security Specialist

Tactical Tech is an international NGO, with an office in Berlin, working to investigate and mitigate the impact of digital technologies on society.

We are developing educational materials to train journalists, human rights defenders, and civil society on leading investigations, in particular to combat misinformation, with an emphasis on digital security. The materials will be geared toward those living in Latin America, Sub-Saharan Africa, MENA, and Southeast Asia.

We are inviting experienced Digital Security Specialists who have a strong understanding of Human Rights, Freedom of Expression, and Privacy and Technology, to contribute to learning material content in two ways: 1. to assess existing content and provide concrete feedback and 2. to identify missing content and write additional texts where needed.

Interested Candidates should have:

  • at least 5 years practical experience as a Digital Security Specialist, especially supporting investigators, journalists, and human rights defenders;
  • experience in the locational risks and safety considerations in any of the following countries: Zimbabwe, Uganda, Mauritania, Zambia, Ghana, Colombia, Peru, Syria, and the Philippines
  • fluency in written and spoken English;
  • excellent writing skills and a proven ability to write in a non-academic, engaging manner for non-technical audiences in a number of formats;
  • good knowledge of the issues around leading investigations, combatting misinformation, digital privacy and security, freedom of expression;
  • ability to deliver on-time under tight deadlines;
  • excellent skills in using open source software;
  • excellent interpersonal skills;
  • experience working internationally and a sensitivity to political situations, culture and different views of the world;
  • familiarity with Tactical Tech’s Data Detox Kit and Exposing the Invisible projects;
  • demonstrable commitment to Tactical Tech's mission and values, including an understanding of the geopolitical contexts in which Tactical Tech's work is carried out.

If you are interested in collaborating with us please email your interest to be included on the Roster to roster@tacticaltech.org (tag: DEK Digital Security Specialist) with your CV, a list (with online links) of your recent publications, and a note explaining why you're interested in consulting with us and your approximate hourly and daily consultancy rate. Please submit these documents as a PDF. The PGP Key fingerprint for roster@tacticaltech.org is: B468 3189 57AF DB42 ACF2 DD8B 2F2E D124 AF9E C238.

Only successful candidates will be contacted, when project work becomes available. Unfortunately, we do not have the capacity to respond to individual phone and email inquiries.

Related content

The Zoom Boom: Tools To Work from Home

Due to the pandemic and resulting quarantine, millions of people are using digital tools to continue their work and communication from home. A new article for the Heinrich-Böll-Stiftung by our Programme Director, Christy Lange, asks: how secure are the digital tools that have become a part of our everyday life?

Safety First!

Stay digitally, physically and psychologically safe and aware of potential risks by adopting some basic good practices and tools to keep your human sources, yourself and your evidence protected in this new chapter of Exposing the Invisible: The Kit.

La technologie est stupide : comment choisir la technologie pour le travail à distance

Cet article aborde les questions de savoir quelle technologie est bonne, sûre et appropriée à utiliser en ces temps complexes si nous voulons agir et travailler de manière responsable et à distance. Comment décider de la technologie à laquelle nous devons faire confiance ? Il examine également ce qui pourrait être fait à l'avenir pour répondre à cette question beaucoup plus facilement qu'aujourd'hui.

→︎ Read more

How to Manage Your Sources

From Exposing the Invisible The Kit: Start building your own contacts, learn how to develop, interact with and maintain sources and how to enrich your investigations with their cooperation.

Cultivating Your New Phone with Care

Whether you’ve gotten your new smartphone second-hand or purchased a new one, you’ve just welcomed a new device into your electronic family. As you would with any other valuable device like a computer or smart appliance, it’s not just about taking care of the outside, but making sure its insides are equipped to handle your information. The new step-by-step Data Detox guide will help you cultivate your new phone to help protect you.

Gendersec Training Curricula

A training curriculum that brings a holistic and feminist perspective to privacy and digital security trainings, including over 20 topics and workshops models.

Exposing the Invisible: The Kit

The Kit is a self-learning toolkit for investigation techniques. It's the starting point for curious minded people who want to start uncovering the evidence and information around them.

Gendersec Wiki

A website made in collaboration with the participants of the Gender and Technology Institutes to showcase activities, how-tos, storytelling and tutorials.

Holistic Security: The Trainer's Manual

The Trainer's Manual is the counterpart to the Holistic Security Strategy Manual for Human Rights Defenders. It reflects on further learnings and best practices grown out of Tactical Tech's engagements with experts and trainers on the overall protection, digital security, and psychosocial well-being for human rights defenders between 2013 and 2015.