This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Jobs in Toronto & GTA for everyone!

To post a job, login or create an account |  Post a Job

   Jobs in toronto & gta   

New job offers published everyday for the diverse people of Toronto & GTA!

previous arrow
next arrow

It security analyst

Tundra Technical Solutions

This is a Full-time position in Ottawa, ON posted June 28, 2019.

The Information Technology and Telecommunications team is accepting applications for the position of Information Technology (IT) Security Analyst.

Reporting to the Chief Information Security Officer and Director Information Technology, the successful candidate will take a lead role in IT security related technical planning, architecture design, installation and integration, monitoring and maintenance of IT information security systems including networking, computing, software and external SaaS components.

He/she will also take a lead role in critical and complex intra and inter-organizational projects requiring high levels of coordination and an extreme breadth of knowledge.

Overall, the successful candidate will be responsible for the efficiency, effectiveness, evaluation, utilization, modernization and interoperability of security systems with existing networking and computing environments.

Flexibility to shift hours will be required in order to provide a response to critical issues and events that occur outside of normal work hours.Essential functions:Security Deployment
• Designs, builds and maintains a Security Information and Event Management (SIEM) system in accordance with industry and chosen vendor best practices;
• Identifies and implements key monitoring security metrics, develops SIEM use cases and alerts, and continuously monitors network, system and application vulnerabilities and threats;
• Builds, executes and maintains a Threat and Vulnerability Management System, including vulnerability and patch scanning, web application scanning, penetration and application testing,compromise and configuration assessment;
• Builds Minimum Security Baselines (MSB) and performs System Hardening and Configuration Management for Endpoints (PCs, mobile devices, kiosk, etc.), servers (Windows, database, DNS, DHCP, etc.), network (switches, routers), other systems (copiers, fax VoIP, SCADA, IOT, Cloud etc.); andSecurity Operations System Hardening and Configuration Management:
• Monitors for attacks, intrusions, anomalies, unauthorized or illegal activities;
• Internal threat monitoring and contributing through intelligence services/platforms;
• External threat monitoring from various threat feeds and ISAC platforms and incorporating these feeds to security tools to ensure that known threats are blocked;
• Investigates, documents, and reports on information security incidents, issues and emerging trends;
• Assists and performs system updates, IPS/IDS signature updates, antivirus updates and roll out software patches; and
• Tracks, reports on and remediates vulnerabilities and system weaknesses by workingcollaboratively with IT Infrastructure and other technical staff.Security Audit:
• Ensures that critical systems and processes are in compliance with the organization’s minimum security baselines and/or industry practices;
• Coordinates with other system owners to assess and improve their cyber security risk postures;
• Develops security metrics templates and prepares monthly and annual security metrics reports;
• Maintains cyber forensic toolsets and makes enhancement acquisition recommendations;
• Assists with ISMS compliance, security programs, projects and other initiatives as required;
• Manages the organization’s Data Governance Lifecycle (discover, remediation, asset registry, data flow mapping);
• Performs Privacy Impact Assessments (PIA) for new and existing projects/systems; The successful candidate must have strong analytical skills in security analysis in order to identify appropriate solutions.

He/she must be able to analyze security breaches to determine their root cause.The successful candidate must be able to anticipate cyber-attacks, always thinking one-step ahead of a cyber-threat.

He/she must be detail-oriented, self-motivated and demonstrate initiative when performing tasks.

The successful candidate must be able to discover, identify, capture and document relevantinformation into a cohesive report.

He/she must have superior research and report writing skills and must be able to conduct security and compliance audits.

The successful candidate must have strong customer service orientation with the ability to deal effectively with end users.

These abilities, as well as a professional, positive attitude will ensure success in building positive working relationships in a team environment.Qualifications for this position include:
• Completion of a three-year diploma/degree in a relevant field of study that may include, but is not limited to Information Technology, Information Systems, or Engineering;
• Five years of experience in a similar position where duties included participating in threat and risk assessment;
• Experience in deploying and operating vulnerability scanners, such as Tenable, Rapid7 products or any other SCAP scanner;
• Experience in configuring and operating software whitelisting functionality in Windows environment, such as AppLocker, Faronics and similar tools;
• Experience in deploying and managing patch management systems, including SCCM,Manage Engine and similar tools;
• Experience in using network access control solutions such as NAC, Cisco ISE, Aruba Clear Pass;
• Experience with log management systems and SIEM systems;
• Demonstrated experience with endpoint protection methods and malware defenses.
• Strong knowledge of Python, PowerShell scripting languages;
• Must demonstrate a deep understanding of Microsoft Windows account permission controls;
• Familiarity with security tools and software.

Must demonstrate ability to use nMAP, Metasploit, OpenVAS, Netcat, Wireshark, Kali Linux suite;
• Familiar with IDS/IPS systems.

Must demonstrate ability to customize IPS signatures;
• Must demonstrate the ability to write custom SQL query, RegEX queries to filter for security events; and
• Excellent communication and written skills in English.The following will be considered as assets:
• Experience with NIST, HIPAA, and CIS standards;
• GIAC Certifications, IT Security Certifications;
• Knowledge of PCI-DSS, ISO 27001:2013 and ITIL Standards and procedures; and
• Bilingualism (English and French).Candidates must be in possession of a Class G drivers’ licence (province of Ontario or Québec equivalent) along with a driver’s abstract (issued within the last month) and must be in possession of or be able to obtain a security clearance for an Airport Restricted Area Identification Card (RAIC).

Company A global provider of innovative staffing solutions and services, Tundra was formed with a simple idea — ‘Go Beyond’ — challenge conventional practices while redefining clients’ expectations.

Since 2004, Tundra has grown quickly, today operating offices across North America, Europe and Asia.

We are actively working with top global contract and full-time talent.To ‘Go Beyond’ and ‘Redefine our Client Expectations,’ Tundra developed a clear and concise Vision: “To become the number one presenter for the top global talent.” Simply ‘finding people’ is not enough; our clients require the ‘right people’ at the ‘right time’ and for the ‘right role.’ Attract, engaging and maintaining relationships with the most talented resources is our distinctive competence.Please contact us if your business seeks a recruiting partner who finds the very best talent and challenges conventional recruitment practices, ideas, processes and tools.

Our innovative approach to Permanent and Contingent Recruitment, Direct Source Solutions, Recruitment Process Outsourcing (RPO), MSP services and Payroll Management Solutions has positioned Tundra as one of world’s fastest growing human capital management companies.