Our valued public sector client requires the services of a Senior Network Security Analyst to conduct network security impact analysis and analyze IT security threats and alerts.
The Government of Canada (GC) is continuing to make great strides in becoming a digital-first organization.
The organization is looking to improve the GC Information Technology (IT) infrastructure and the user experience by consolidating, modernizing, and standardizing where possible.
Priorities to support the delivery of government-wide digital transformation include :
Ensuring the Government’s network is secure, fast and reliable.
Providing public servants, the digital tools they need and that support a modern workplace.
Helping to ensure the health of government systems and the modernization of applications by moving data to the Cloud or modern data centres; and
Enabling government-wide transformations through the creation of standards, revised services, and a new funding model.
Infrastructure Security Operations (ISO) is responsible for planning, designing, building, operating and maintaining effective, efficient and responsive cyber and IT security infrastructure to protect GC data and technology assets.
ISO delivers technical safeguards that protect the government network systems and services by detecting and preventing unauthorized access, misuse, modification and denial of network-accessible resources and data .
ISO provides protection through perimeter / border defense services, intrusion detection and prevention services, wired / wireless protection services and web filtering services.
End-point protection and security monitoring are done through anti-virus / malware services, end-point management services, event logging and auditing services, and compliance threat and vulnerability assessment infrastructure services.
The ISO directorate also provides enterprise-level authentication services to both GC employees and external client communities such as Canadian citizens and businesses.
Enterprise Mandated Services comprise Internal and External Credential Management, Government of Canada Internal Credential Management services, Management of Identity, Credential Authentication, and Public Key Infrastructure.
Analyze identified network and / or telecom problems, identify resolution strategies, and implement in a timely fashion.
Analyze IT Security tools and techniques.
Analyze security data and provide advisories and reports.
Assist in training users to use the network and related software.
Review, analyze, and / or apply Internet security protocols such as SSL, S-HTTP, S-MIME, IPSec, SSH TCP / IP, UDP, DNS, SMTP, SNMP Approved GC Cryptographic Algorithms Directory Standards, authentication, and authorization protocols such as LDAP, Kerberos, SAML, OpenID Connect, etc.
Identity Management processes, best practices, standards, policies and supporting technologies Networking Protocols (for example, HTTP, FTP, Telnet) Technical IT Security safeguards IT Security tools and techniques Intrusion detection systems and firewalls
Complete tasks directly supporting Infrastructure Security Operations.
Complete tasks related to authorization and authentication in physical and logical environments.
Conduct impact analysis for new software implementations, major configuration changes and patch management.
Conduct operational processes and procedures as they relate to networking and telecom services.
Configure equipment with assistance from vendor or other computing resources.
Configures and optimizes technical installations.
Coordinate installation, operation, maintenance, resolution of hardware and software problems, monitoring of traffic, capacity planning, system backup and user training for a Local Area Network.
Design / develop IT Security protocols.
Develop proof-of-concept models and trials for IT Security.
Develop, implement, participate, and test a network disaster recovery plan.
Evaluate, test and recommend new data communication hardware and software.
Identify and analyze technical threats to, and vulnerabilities of, networks.
Inform new users of the appropriate hardware and software specifications for access to the network.
Install or coordinate installation of network hardware, software for use with personal computers and mainframe / personal computer interaction, and network upgrades according to vendor instructions.
Installs and monitors facets of technology.
Maintain a reference library to include reference manuals and user guides.
Maintain accurate records and logs of users, equipment serial numbers, service records,
maintenance agreements, warranties, wiring schemes and network problems and solutions.
Maintain interface with vendor representatives and other computing resources to resolve hardware and software problems.
Expertise and Skills
Cyber Security, Network Security (firewalls) >
Must-have : Please provide 2 examples of projects where you have conducted network security impact analysis for new software implementation
Must-have : Please provide 2 examples of projects where you have experience identifying and analyzing technical threats to and vulnerabilities of networks