Cybersecurity Risk Assessment

Posted on: 06 April 2026 Deadline: 21 April 2026

1. Background and organizational context

The International Initiative for Impact Evaluation (3ie) is a mission-driven non-profit organization dedicated to using evidence to transform people’s lives in low- and middle-income countries (L&MICs). We collaborate with decision-makers in governments, foundations, NGOs, development and research organizations globally to meet their evidence needs and facilitate the use of evidence in their work.

3ie has offices in India, the United Kingdom, and the United States, with staff based across the globe — including staff engaged through Employer of Record (EOR) arrangements.

3ie's technology environment spans multiple cloud platforms, SaaS applications, and externally accessible digital assets. The organization is subject to data privacy obligations under multiple regulatory frameworks, including the EU/UK General Data Protection Regulation (GDPR), and India's Digital Personal Data Protection (DPDP) Act, 2023.

In order to proactively understand and manage its cybersecurity risk posture, 3ie seeks to engage a qualified, CISA-certified firm to conduct a comprehensive Cybersecurity Risk Assessment across its core technology environment.
 

2. Objectives

The primary objectives of this engagement are to:

  • Identify and evaluate key cybersecurity risks across 3ie's defined systems, applications, and environments.
  • Assess governance practices, policies, and risk management processes against the NIST Cybersecurity Framework (CSF) 2.0.
  • Evaluate technical safeguards, security configurations, and identity and access management controls within in-scope systems.
  • Provide risk-based observations mapped to NIST CSF functions and aligned to India's DPDP Act controls.
  • Deliver a prioritized, actionable remediation roadmap to support management's risk mitigation decisions.
     

3. Scope of work

In-scope systems and environments

The assessment shall cover the following systems and environments: 

CategoryDetails
Network environment3ie's internal network infrastructure and connectivity
Core business applicationsBirdview PSA, Time Reporting System (TRS), SmartSimple GMS, 3ie Connect (Sage/Salesforce integration)
CRM and productivity platformsSalesforce CRM, Microsoft 365 (M365), Google Workspace
Hosting and infrastructureAWS, Linode, and Acquia hosting environments, Github; organization-managed workstations, laptops, and servers
Public digital assets3ieimpact.org website and other publicly accessible digital assets such as DEP, EGM (and EGM Open Access), RIDIE, TREE toolkit, Remote Sensing inventory and PIR methods menu 
Governance documentationRelevant cybersecurity policies, procedures

4. Required activities

The selected firm shall perform the following activities as part of the engagement:

  • Conduct structured risk discovery interviews with key 3ie personnel and/or relevant service providers to understand governance, risk management practices, and operational workflows related to in-scope systems.
  • Review relevant cybersecurity policies and procedures, evaluating documentation against the NIST CSF Quick Start Guide (QSG) for small businesses.
  • Work with management to establish and validate a structured inventory of in-scope systems, SaaS applications, and technology assets — identifying those that handle sensitive personal data or underpin critical operational functions.
  • Perform a targeted review of security configuration settings within defined systems, including:
    ◦    Organization-managed workstations and endpoints
    ◦    Microsoft 365 and Google Workspace tenant configurations
    ◦    Identity and access management posture
    ◦    Endpoint security coverage
  • Conduct vulnerability and security configuration analysis on 3ie-managed workstations, laptops, and servers.
  • Conduct an Open-Source Threat Intelligence (OSINT) review of 3ie's publicly-facing domain(s) to evaluate observable external exposure.
  • Map all identified observations to the NIST CSF 2.0 core functions (Govern, Identify, Protect, Detect, Respond, Recover) and, where applicable, to India's DPDP Act controls.
  • Evaluate each observation using a structured likelihood and impact model to determine risk ratings (Low / Moderate / High).

5. Deliverables

The selected firm shall provide the following deliverables to 3ie upon completion of fieldwork:

#

DeliverableDescription

1

Executive summaryA concise summary in plain language, suitable for organizational leadership and the Board, describing the overall cybersecurity posture and key risk findings.

2

Detailed risk assessment reportFull report with all observations mapped to NIST CSF 2.0 functions and tied to DPDP Act controls; delivered in both PDF and Excel formats for management tracking.

3

Risk-based recommendationsSpecific, actionable recommendations for each identified risk observation, with clear rationale and suggested ownership.

4

Prioritized remediation roadmapA roadmap categorizing recommended actions into short-term (0–3 months), medium-term (3–12 months), and long-term (12+ months) implementation horizons, informed by complexity and security benefit.

5

Final debrief presentationA presentation and discussion session delivered to relevant 3ie stakeholders, walking through key findings, risk ratings, and the recommended roadmap.

6. Regulatory and compliance context

Given 3ie's global operations and data processing activities, the selected firm must demonstrate awareness of and, where applicable, incorporate the following regulatory frameworks into the assessment:

Regulation / frameworkRelevance to 3ie
EU/UK GDPRStaff and beneficiary data processing across European and UK operations
India DPDP Act, 2023Primary jurisdiction for 3ie's India office; report observations must be tied to DPDP Act controls

7. Minimum qualifications and experience

Firms submitting a proposal must demonstrate the following minimum qualifications:

  • Active CISA (Certified Information Systems Auditor) certification held by the engagement lead or senior team member.
  • At least one team member holding a Certified Ethical Hacker (CEH), CompTIA Security+, or equivalent technical certification.
  • Demonstrated experience conducting cybersecurity risk assessments for nonprofit organizations, INGOs, or similarly distributed multi-jurisdiction entities.
  • Familiarity with the applications and platforms in scope (Microsoft 365, Google Workspace, Salesforce, AWS, and similar SaaS environments).
  • Experience supporting organizations subject to multi-jurisdiction data privacy obligations (GDPR, DPDP Act, PIPEDA).
  • Ability to work entirely remotely with a geographically distributed client team.

8. Proposal submission requirements

Proposals must be submitted to skhandelwal@3ieimpact.org no later than 21 April 2026. Late submissions will not be considered.

Proposals must include the following sections and information:

  • Cover letter confirming the firm's interest and ability to meet all minimum qualifications outlined in Section 7.
  • Firm background and experience, with specific reference to nonprofit or INGO clients and comparable cybersecurity risk assessment engagements (with anonymized or named references as appropriate).
  • Proposed methodology and workplan, including a description of each phase of the engagement, key activities, and an indicative timeline.
  • Engagement team composition: names, roles, and current certifications of all personnel assigned to this engagement.
  • Proposed fees: a fixed-fee quote for the core engagement as described in this Terms of Reference.
  • At least two references from comparable engagements, including contact information.

Recent Jobs
Posted on: 06 April 2026
Deadline: 21 April 2026