Our valued public sector client requires the services of a Senior IT Security System Operator to configure and maintain security devices and appliances.
The Government of Canada (GC) is continuing to make great strides in becoming a digital-first organization.
The organization is looking to improve the GC Information Technology (IT) infrastructure and the user experience by consolidating, modernizing, and standardizing where possible.
Priorities to support the delivery of government-wide digital transformation include :
Ensuring the Government’s network is secure, fast and reliable.
Providing public servants, the digital tools they need and that support a modern workplace.
Helping to ensure the health of government systems and the modernization of applications by moving data to the Cloud or modern data centres; and
Enabling government-wide transformations through the creation of standards, revised services, and a new funding model.
Infrastructure Security Operations (ISO) is responsible for planning, designing, building, operating and maintaining effective, efficient and responsive cyber and IT security infrastructure to protect GC data and technology assets.
ISO delivers technical safeguards that protect the government network systems and services by detecting and preventing unauthorized access, misuse, modification and denial of network-accessible resources and data .
ISO provides protection through perimeter / border defense services, intrusion detection and prevention services, wired / wireless protection services and web filtering services.
End-point protection and security monitoring are done through anti-virus / malware services, end-point management services, event logging and auditing services, and compliance threat and vulnerability assessment infrastructure services.
The ISO directorate also provides enterprise-level authentication services to both GC employees and external client communities such as Canadian citizens and businesses.
Enterprise Mandated Services comprise Internal and External Credential Management, Government of Canada Internal Credential Management services, Management of Identity, Credential Authentication, and Public Key Infrastructure.
Analyze functional requirements to identify information, procedures and decision flows.
Analyze IT Security tools and techniques.
Analyze security data and provide advisories and reports.
Install, configure, integrate, define policy, fine-tune, operate, monitor performance, and detect faults in the system for : host and network intrusion detection and prevention systems, network and computer forensic systems, firewalls, VPNs, network devices, enterprise network vulnerability tools, malicious code, anti-spam content management tools, file integrity tools, remote management utilities, enterprise security management systems etc.
Complete tasks directly supporting Infrastructure Security Operations.
Complete tasks related to authorization and authentication in physical and logical environments.
Conduct impact analysis for new software implementations, major configuration changes and patch management.
Configure intrusion detection systems, firewalls and content checkers, extracting and analyzing reports and logs, and Configure IT Security management.
Configure, update and upgrade operating systems (such as, but not limited to : Windows, Unix and Linux
Configure / update virus scanners.
Configures and optimizes technical installations.
Define and document interfaces of manual to automated operations within sub-systems, to external systems and between new and existing systems.
Define input / output sources, including detailed plan for technical design phase, and obtain approval for system proposals.
Design and document in detail all system components, interfaces, and operational environment.
Design data structures and files, sub-systems and modules, programs, batch, online, and production monitoring procedures, testing strategy and systems.
Design / develop / document IT Security protocols and other IT pro Cloud IaaS, PaaS, and SaaS environments (including but not limited to : Azure, AWS, GCP).
Expertise and Skills
Cyber Security, Security Administrator >
Must-have : Please provide 2 examples of projects where you have configured and maintained security devices and appliances such as IDS / IPS, firewalls, APT, SIEM
Must-have : Please provide an example of a project where you have participate in SIEM rule-creation and tuning to create actionable alerts