Job Summary
Information and Cyber Security Analyst
Location: Calgary, AB Category: Content/Document Management
Job Type: Direct Hire Reference: CA_EN_6_17453_59523794
Posted: November 14,2017 Salary: $67970 - $93459 Hourly

Print image email image
Apply Now

Title: Information and Cyber Security Analyst
Start Date: ASAP
End Date: Perm
Location: Calgary or Edmonton
 
Information Security – Cyber Security Analyst - Assurance
 
THE OPPORTUNITY:
 
The successful candidate will have knowledge of vulnerability assessment/detection and POA&M reporting. The candidate will be expected to communicate and work closely with process and system owners, security architecture, penetration testing, application development and risk managers to ensure the relevance of architecture and system designs in implementing security assurance requirements. The majority of the work will be assessing security assurance vulnerabilities, engineering responses, conducting risk analysis and providing security assurance support to critical programs. The Cybersecurity Analyst will work collaboratively on a team and reports directly to the Sr. Manager – Cybersecurity and Security Assurance
 
Technical Skill Required:
Security engineering skills with a working knowledge of Security Assurance (SA) technology, NIST standards, Vulnerability & Threat Risk Assessments, and Penetration Testing. Must have familiarity in the Cybersecurity Lifecycle to include: generating SA requirements, creating SA architecture design, configuring SA audit tools, conducting SA verification and performing SA compliance. Effective interpersonal skills are required with a demonstrated ability to support complex organizational relationships. Excellent technical document preparation and verbal communication skills are required. The position requires a strong working knowledge of SA concepts such as patch management, two-factor authentication, host-based security, intrusion detection, security event management and defense-in-depth. Must have strong background in Networking and solid understanding of TCP/IP. Experience with analyzing vulnerability defects, patching the system, running scans against the system, and POA&M management are essential.
 
KNOWLEDGE, SKILLS & ABILITIES:

  • Ability to conduct presentations and convey ideas from research
  • Mastery of OSI model (layer 1 to 7)
  • Exceptional communication and advocacy skills, both verbal and written, with the ability to express complex and technical issues in clear and concise language
  • Ability to collaborate and communicate effectively and tactfully with both business-oriented executives and technology-oriented personnel
  • Recognized Information Technology training – University/College degree/diploma or at least 5 years working experience, or a combination of training and working experiences in Information Security
  • CISSP (Certified Information Systems Security Professional) designation is an asset. If the incumbent hasn’t been certified with the CISSP designation prior to joining, the incumbent is required to certify as a CISSP within the first two years after being employed
  • OSCP (Offensive Security Certified Professional) designation is an asset. If the incumbent hasn’t been certified with the OSCP designation prior to joining, the incumbent is required to certify as an OSCP within the first year after being employed by
  • Experience within a distributed environment running Windows, AIX, Linux, and OSX
  • Familiarity with the common best practice testing methodologies

 
Considered an asset:

  • Knowledge and ability in application, web, or mobile development
  • Knowledge and experience in performing forensic investigations
  • Ability to code in a major UNIX scripting language such as perl or bash
  • Ability to code in a major Windows scripting language such as VBScript or PowerShell.
  • Experience developing and refining threat-informed defense-in-depth security architectures
  • custom remote exploit development, assembly language
  • vpn/endpoint/firewall administration
  • server hardware, storage, network performance tuning
  • Mastery of three of: (windows, linux, solaris, aix, osx)
  • wireless security auditing/hacking

 




Print image email image
Apply Now
alt