Hirejobs Canada
Register
Auckland Jobs
Canterbury Jobs
Northland Jobs
Otago Jobs
Southland Jobs
Tasman Jobs
Wellington Jobs
West Coast Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

IT Security Analyst II - Jobs in Calgary, AB

Job LocationCalgary, AB
EducationNot Mentioned
SalaryNot Disclosed
IndustryNot Mentioned
Functional AreaNot Mentioned
Job TypeFull Time

Job Description

MissionEach student, in keeping with their individual abilities and gifts, will complete high school with a foundation of learning necessary to thrive in life, work and continued learning.ValuesStudents come first. Learning is our central purpose. Public education serves the common good.CultureThe CBE strives to create a dynamic, diverse, and collaborative culture. We value diversity and welcome applications from all qualified individuals.Competition InfoCompetition Close Date: Friday, June 17, 2022 @ 11:59pmCalendar: 12 MonthSalary: Staff Association Grade I, $43.90 to $54.17/hourFTE: 1.0, 35 hours/weekPosition DescriptionPurposeThe Information Technology (IT) Security Analyst II is a senior role that provides support and leadership to ensure the confidentiality, availability and integrity of the CBE’s Information Technology infrastructure and systems, inclusive of all electronic assets and data. This job is responsible for the effective and reliable operations of advanced aspects of day-to-day information security systems as well as monitoring for and timely identification and eradication of IT security vulnerabilities and/or risks within the entire IT environment.In addition, the job is responsible for conducting advanced information security and/or digital forensic investigations, performing non-routine risk assessments, and providing advanced analyses of information technology or information technology related events. This job also assists with planning, co-ordinating schedules of design activities, and executing infrastructure upgrades and changes, troubleshooting, and maintenance of all security systems and services.Working with the Supervisor of Security Operations, Senior Solution Architects, and senior ITS Management this job develops and enhances Information Security Strategies for the CBE. The job is crucial for researching, architecting, designing, and implementation of IT security plans and solutions.AccountabilityThis job is accountable for:

  • Taking proactive actions to identify and arrest IT security threats based on Indicators of Compromise (IOC) or Indicators of Attack (IOA).
  • Providing maintenance, monitoring and configuration of complex security devices and supporting systems including but not limited to firewalls, anti-virus, anti-spam, intrusion detection, content filtering, virtual private networks (VPN), encryption, and other related systems.
  • Ensuring that information security devices and related systems integrate, and inter-operate with each other providing multi-layered secured operations consistent with a defense-in-depth model.
  • Architecting, designing, implementing (or upgrading) and validating of simple to extremely complex information security solutions, technologies, and architectures.
  • Analyzing multiple system and/or security logs, and datasets, carrying out pattern, statistical deviation, or regression analysis to identify inconsistencies, errors, anomalies, intrusions, inappropriate activity or other Indicators of Compromise (IOC).
  • Conducting digital forensics and IT security investigations that range from routine to extremely complex.
  • Performing timely and accurate risk assessments on technologies deployed at the CBE using standardized and non-standardized methods.
  • Either individually or as a team lead, carrying out complex risk assessments and investigations.
Major ResponsibilitiesProvides support and assistance to day-to-day IT Security Operations requirements
  • Creates and maintains policy and rule-sets on firewalls, intrusion detection systems, VPNs, unified threat management platforms and other related systems.
  • Performs vulnerability-scanning, penetration testing, and ‘hardening’ activities to secure systems and applications by reducing or eliminating vulnerabilities and/or possible avenues for attacks.
  • Authorizes course of action and work priorities for patching and other activities based on reviews of Security Alert Bulletins recommendations from junior information security staff and/or other IT staff.
  • Develops patterns for Intrusion Protection Systems (IPS), network devices, firewalls, virtualized security products, or other devices to compensate where threats have no standard anti-virus pattern files.
  • Conducts research to assist with identifying Advanced Persistent Threats (APTs) and advisory threats.
  • Recommends courses of action to the Supervisor of Security Operations and senior leadership based on research findings.
  • Coordinates “Red Team” and “Blue Team” (attacker versus defender) activities to emulate hackers and test operational information security defenses.
  • Ensures anti-virus pattern files and engines are up to date.
  • Oversees web and content filtering rules and bandwidth policies.
  • Ensures that information security components including disk encryption and all cryptographic systems are operational and are performing optimally.
  • Provides oversight of and assistance with the tasks/assignments of junior information security staff to ensure accurate and timely completion.
  • Monitors systems performance, health, alerts, and takes appropriate preventative and corrective actions.
  • Follows change control, and testing processes for effecting modifications to information security systems and other related components.
  • Conducts testing using advanced techniques such as fuzzing, vulnerability/penetration testing, testing of uncommon threat vectors, etc.
  • Optimizes testing efficiency while ensuring greater work thoroughness by using testing suites, scripting, or other automated techniques.
  • Leads and participates as a member on Computer Emergency Response Team (CERT) tasked with resolving major system or technology issues.
  • Assists staff with training and awareness development on security related technologies and threats.
  • Participates on an advisory committee that establishes content filtering rules consistent with staff and student duty-of-care obligations.
Architects, Develops and implements IT Security Designs
  • Researches and stays current on information security architectures and frameworks to ensure student and staff safety related to cyber security.
  • Recommends information security architectures and frameworks to meet complex business and organizational needs.
  • Leads the development of information security architectures and frameworks in conjunction with the Senior Solutions Architect and/or the Supervisor of Security Operations.
  • Leads or oversees the architecture, design, planning, coordination, installation and configuring of information security components, infrastructure, business systems/solutions, and complimentary management suites.
  • Researches, reviews, assesses and recommends Cloud based IaaS, PaaS and SaaS solutions based on Security requirements.
  • Working as part of a team and as a subject matter expert, assists system architects, system analysts, and technology stakeholders in specifying the Information Security components in support of new business systems or enhancements to existing applications or solutions.
  • Collaborates with the administration functions related to networks, business applications, server, and database to ensure confidentiality, availability, integrity of business systems.
  • Carries out project planning activities including task estimates, task sequencing, timeline development, definition of key performance indicators, etc. Initiates, plans, and coordinates schedules of activities related to major infrastructure upgrades, and changes.
  • Creates and maintains thorough documentation of information security components, systems, and standards.
  • Develops and maintains high-level technical relationships and contacts with technology vendors and partners.
  • Either carries out all the above and/or mentors and oversees the work tasks of junior information security staff on all the above.
Supports and conducts IT Security reviews, audits and investigations related to moderately complex to very complex incidents and issues
  • Schedules and oversees periodic reviews and audits on devices, applications and systems.
  • Using multiple data-sources and using advanced techniques analyzes information security systems for anomalies, unusual traffic patterns, Indicators of Compromise (IOC), etc.
  • Provides detailed reporting of threats, vulnerabilities, errors, intrusions and other information as required.
  • Conducts complex IT security investigations using digital forensics tools. Such investigations would include, but not be limited to inappropriate use of electronic resources, student duty of care incidents, phishing, data breaches, and compromised accounts.
  • Provides briefings to executives regarding status of investigations without disclosing details of the investigations.
  • When authorized, using a high level of tact and discretion may interview staff or students regarding information security incidents. Interviews may also include Corporate Security, union, Human Resources, or law enforcement representatives.
  • Liaises with law enforcement on routine IT Security matters and/or security investigations when authorized. When authorized, liaises with federal law enforcement or security agencies.
  • Carries out IT Security reviews, audits and investigations.
  • Maintains a very high level of confidentiality and demonstrates a very high degree of discretion related to security incidents.
  • Creates documentation and preparation of appropriate reports related to complex incidents, issues and investigations.
Conducts analyses and assessments related to complex incidents and issues
  • Conducts vulnerability assessments using defined practices and tool sets and documents results together with proposed actions for remediation.
  • Conducts complex and non-routine risk assessments.
  • Leads a team consisting of both information security staff and other IT roles with conducting complex system or technology risk assessments.
  • With guidance from the Supervisor of Security Operations, conducts and validates research for the purposes of defining and/or modifying CBE information security policy.
  • Working with the Supervisor of Security Operations, conducts and validates research and documents sub-components of CBE’s Disaster Recovery (DR) and Business Continuity Plans (BCP).
  • Remains current with trends and issues in information security and from time to time, reports key findings and/or recommendations to the ITS senior leadership team.
Provides other related IT functions
  • Assists in developing a 3-year Information Security technology roadmap.
  • Liaises with vendors and external agencies as required.
  • Learns and applies new techniques, business processes, systems, hardware and software.
  • Performs other related responsibilities as assigned to meet the purpose and accountabilities of the role.
  • Required to participate in a 7x24 on-call rotation based on a predetermined schedule.
QualificationsEducation and Experience
  • A 4 year post-secondary degree in Computer Science (or equivalent degree in Information Technology); and
  • Minimum of 5 years of experience in an Information Technology role of which, at least three (3) years must have been in an advanced Information Security or Cybersecurity role within enterprise environments.
  • Up to date CISSP or GIAC SANS (Advanced Level) Security certification.
  • Expertise with the following IT security systems: firewalls, anti-virus, anti-spam, intrusion detection, SIEM products, content filtering, virtual private networks (VPN), encryption systems and honeypots.
  • Expertise in desktop and server operating systems (Windows, Mac, Linux, Solaris).
  • Expertise in standard network diagnostic equipment, network protocols and traffic analysis. Working knowledge of switches, routers and bridges.
  • Advanced knowledge and experience with common attack methodologies, tactics and protocols.
  • Advanced hands-on knowledge of PowerShell, Unix, JavaScript, Python and VB Scripting languages. Expertise with interviewing techniques relating to information security incidents and investigations.
  • Experience working with law enforcement agencies.
  • Keen awareness of ISO/IEC: 27001:2013
  • ITIL certifications and/or COBIT certification desirable.
  • Networking, Server, Endpoint and Mobile Computing systems experience is highly desirable.
  • Experience in corporate security or law enforcement would be an asset.
  • An equivalent combination of directly related post-secondary education and directly related experience may be considered.
Demonstrated Skills and Competencies
  • Commitment to continuously learn and grow intellectually.
  • Strong desire to achieve, excel and apply new learnings.
  • Ability to maintain strict level of confidentiality.
  • Strong organizational and project management skills.
  • Strong problem solving and decision making abilities including the skill and tact to review and question existing processes and make improvements.
  • Demonstrated comfort with ambiguity and openness to change.
  • Ability to converse effectively with business users and simplify complex technical concepts for non-technical audiences.
  • Ability to establish and maintain effective working relationships with co-workers and clients.
  • Strong oral and written communication and interpersonal skills.
  • Ability to function effectively and independently in high-pressure situations with constantly changing priorities.
  • Strong organization skills with ability to prioritize many simultaneous responsibilities.
  • Reliable, dependable and trustworthy.
  • Personal suitability.
Conditions of EmploymentPolice Information Clearance: Applicants new to the Calgary Board of Education WHO ARE OFFERED EMPLOYMENT must complete and pass a police information clearance before employment is confirmed.Be Part of Our SuccessAre you looking for an opportunity to join a team where your contribution makes a positive impact on the lives and learning of more than 125,000 CBE students The Calgary Board of Education is looking for exceptional professionals to join our team. Our employees are highly valued and recognized, a career with the CBE offers incredible opportunities, rewards and supports.We thank all candidates for their interest in this position however only those selected for an interview will be contacted.Quick Apply
  • Terms & Conditions
  • New Privacy
  • Privacy Center
  • Accessibility
For Job Seekers
  • Browse Jobs
  • Advanced Job Search
  • Emplois Quebec
For Employers
  • Post a Job
Stay Connected

APPLY NOW

IT Security Analyst II Related Jobs

© 2021 HireJobsCanada All Rights Reserved