Job Title or Location
RECENT SEARCHES

Security Architect (Onsite Regina)

Zortech Solutions - 19 Jobs
Regina , SK
Posted 6 days ago
Job Details:
Full-time
Experienced

Role: Security Architect

Location: Regina, SK-Onsite

Duration: 6-12+ Months

Job Description:

The ideal candidate will have extensive experience at a senior level in the following, including, but not limited to:

  • Information Security standards (ISO 27001) and frameworks.

  • Security architecture components and controls.

  • Defense-in-depth security practices.

  • Achievement of industry accredited security certifications: such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP) plus The Open Group Architecture Framework (TOGAF), and/or SANS Institute Global Information Assurance Certification (GIAC) will be considered an asset.

Key qualities of the Resource(s) will be:

  • A self-starter with professional accountability.

  • Communication skills, with the ability to present ideas, strategies, theories and plans to all levels of the organization in a manner consumable for the audience.

  • Organizational skills, with the ability to multitask and set clear timelines for expected deliverables.

  • Collaborative skills and a consultative approach with the capability of problem solving.

Duties of the Resource(s) will include, but are not necessarily limited to:

  • Duties as assigned by the Cyber Security and Risk Management Branch.

  • Participate in technical architecture design reviews to ensure infrastructure and application designs adhere to GOS security policies, guidelines, and standards.

  • Collaborate with the Solution Architects and vendors in identifying cloud security requirements and secure integration of Applications, Endpoint, Network, and Cloud solutions.

  • Analyze the current IT environments to detect critical security deficiencies, identify gaps in processes and recommend solutions for improving security posture.

  • Keep up to date on security industry best-practices and market trends, determine their potential impact on the enterprise, and provide leadership for adapting security advancements into our business.

  • Evaluate emerging technologies and suggest suitable security controls. Be responsive and decisive on adjusting architecture as per customers' requirements, market conditions and technology evolve.

  • Partner with solutioning team to facilitate the evaluation and selection of hardware, software technology and cloud solutions, as well as document the security architecture design of software and solution configurations.

  • Ensure existing data/information assets are identified, classified, and protected across the enterprise. Balance the need for access to information against security and performance requirements.

  • Ensure information security is built into architecture solutions to address all identified risks to assets within the organization, meet regulatory and legislative compliance while ensuring security solutions are leveraged across the organization.

  • Prepare security advisory on existing technology platforms.

  • Aid and support to the Security Risk, Governance, Compliance, and Operations functions.

  • Provide advisory for security vulnerability remediation and risk mitigation.

  • The resource will be required to participate in consultant performance evaluation as deemed appropriate by the Ministry.

  • Familiarity with the GOS, or comparable entity, technical and business landscape will be evaluated.

B. BACKGROUND

The Cyber Security and Risk Management Branch is responsible for managing all things related to IT security including, though not necessarily limited to:

  • Providing interpretation and enforcement of the information security policy and standards.

  • Providing information security education and awareness.

  • Responding to information security Incidents.

  • Performing Threat Risk Assessments (TRAs) for IT-related business initiatives.

  • Providing security assessment and overall security requirements oversight for IT related Solution and Services Procurements.

  • Providing information security advice and guidance for business areas.

  • Evaluating new threats and vulnerabilities.

#L!-CEIPAL

Share This Job: