Int. Cyber Security Analyst to perform threat assessment and implement controls for our Telco client -2849

Job Type: Contract
Positions to fill: 1
Start Date: Mar 15, 2023
Job End Date: Sep 15, 2023
Pay Rate: Hourly: $ 80
Job ID: 127914
Location: Calgary
Apply
Int. Cyber Security Analyst to perform threat assessment and implement controls for our Telco client -2849

Location: Calgary OR CANADA EAST (Remote)
Duration: 6 months (possible extension)


Must have skills:
  • 4-7 years’ experience working in information or security roles
  • Experience in assessing the technical security posture of on-premise and cloud IT environments, third-party providers of infrastructure and data management, HRM, CRM and workload automation solutions.
  • Proven hands-on technical security experience with Web Proxies, NGFW, Email Security Gateways, SIEM, Identity Protection and Data Encryption solutions.
  • Proven experience in defining policies, rules and configurations for cyber security solutions.
  • Hands-on experience with cloud services such as Salesforce, Office 365, GitHub, AWS, Microsoft Azure.
  • Support and maintenance of key security technologies and systems, as well as design and implementation of security controls within the platforms
  • Daily operations, technical education and support for the following applications/platforms:
    • Splunk
    • Cisco suite of applications including, but not limited to Cisco Endpoint Protection (AMP), Firepower Threat Defense, Umbrella;
    • CyberArk suite of applications (Privileged Access Management and CyberArk Identity formerly known as Idaptive);
Nice to have skills:
  • Active certifications and credentials in information systems or cyber security operations and management
Responsibilities:
  • Define, promote and advocate business risk driven technical security requirements and recommendations.
  • Oversee implementation and maintenance of preventive, detective and corrective measures across the enterprise to protect business information
  • Coordinate technical cyber security assessments of business ventures, partnerships, contractors and vendors.
  • Ensure adequate security controls are implemented to protect business information in databases, data warehouses and storage systems.
  • Team up with internal teams and vendors to define cloud, infrastructure and endpoint security requirements, validate implemented changes and provide corrective measures to ensure protection of on-premise and cloud environments.
  • Develop metrics to track operational workflows: measure effectiveness of security processes, identify problem areas and provide actionable insight to management.
  • Develop control documentation based on security frameworks and tailored to business requirements and best practices: technical security documentation to include low level design, security baselines, process maps, operating procedures and guidelines.