Sr IT Security Engineer to analyze and develop IT security solutions for GC infrastructure
S.i. Systems
Ottawa, ON-
Number of positions available : 1
- Salary To be discussed
-
Contract job
- Published on November 4th, 2024
-
Starting date : 1 position to fill as soon as possible
Description
The Government of Canada (GC) is continuing to make great strides in becoming a digital-first organization.
The organization is looking to improve the GC Information Technology (IT) infrastructure and the user experience by consolidating, modernizing, and standardizing where possible. Priorities to support the delivery of government-wide digital transformation include:
Tasks:
The organization is looking to improve the GC Information Technology (IT) infrastructure and the user experience by consolidating, modernizing, and standardizing where possible. Priorities to support the delivery of government-wide digital transformation include:
- Ensuring the Government’s network is secure, fast and reliable.
- Providing public servants, the digital tools they need and that support a modern workplace.
- Helping to ensure the health of government systems and the modernization of applications by moving data to the Cloud or modern data centres; and
- Enabling government-wide transformations through the creation of standards, revised services, and a new funding model.
Tasks:
- Analyze existing services; propose, design, develop and implement improved overall systems design user experience, security controls, safeguards in accordance with government policies and standards
- Analyze IT Security Infrastructure and services statistics including security log analysis and other systems operational logs and events analysis).
- Analyze IT Security Infrastructure tools and techniques.
- Analyze data and provide advice and reports.
- Assist in implementation strategies
- System and subsystem solution designs compliant with policy, business, security, operational and support requirements.
- Detailed system and subsystem technical, development, integration, interface and build documentation
- Functional and technical test plans, test cases and test results documentation
- Technical collateral for cost/benefit analysis and proposals
- Detailed root cause analysis documentation; Detailed Change Request technical analysis documentation; and Operational collateral
- Conduct systems integration and development of selected services, sub-services, and applications
- Documentation: structured analysis and recommendations, weekly status reports, installation procedures, build books, maintenance procedures, business requirements analysis, network topologies, specifications and standards, design documentation, solution and implementation requests, support procedures, backup and restore procedures, etc.
- Deliver design and prototypes for the delivery of new service offerings.
- Identify the technical threats to, and vulnerabilities of networks and systems.
- Directory, authentication, and authorization protocols such as LDAP, Kerberos, SAML, OpenID Connect, or any future security authentication protocols
- Identity Management processes, best practices, standards, policies and supporting technologies
- Operating Systems such as Windows, Unix and Linux
- Networking Protocols such as HTTP, FTP, and Telnet
- Secure IT architectures fundamentals, standards, communications, and security protocols such as IPSec, IPv6, SSL, and SSH
- IT Security protocols at all layers of the Open Systems Interconnection (OSI) and Transmission Control
- Protocol/Internet Protocol (TCP/IP) stacks
- Domain Name Services (DNS), DHCP and Network Time Protocols (NTP)
- Network routers, multiplexers, and switches
- Application, host and/or Network hardening and security best practices such as shell scripting, service identification, and access control
- Intrusion detection/prevention systems (HIDS/HIPS), Network-based Intrusion Defence Systems, malicious code defence, file integrity, Enterprise Security Management, Security Information and Event Management (SIEM) Systems and/or firewalls
- Data Parsing
- Wireless technology
- Cryptographic Algorithms
- Manage the IT Security configuration.
- Monitor and develop reporting for system utilization and performance metrics.
- Perform lab testing to evaluate fixes, new features, and system interoperability.
- Prepare technical reports such as IT Security Solutions option analysis and implementation plans.
- Provide cross training and knowledge transfer to other support personnel.
- Provide engineering support through planning and implementing complex changes in large scale multi-tenant networked environments.
- Provide Independent Verification and Validation (IV&V) support to IT Security related projects.
- Provide network security expertise on multi-disciplinary project teams to develop design alternatives.
- Provide operational support for firewalls / VPNs / web content filtering infrastructure by performing change.
- Review perimeter security requirements and develop cost effective responses.
- Review, assess, develop alternatives, and recommendations for perimeter security approaches, technology, and processes.
- Provide expertise as well as design and implement solutions including Directory Technologies, Directory ETL systems, Authentication and Authorization Systems, Identity Management Systems, Credentials Management systems as well as business applications integrations.
Apply
Requirements
Level of education
undetermined
Work experience (years)
undetermined
Written languages
undetermined
Spoken languages
undetermined
Other S.i. Systems's offers that may interest you