Chad Management Group -
32 emplois
Toronto, ON
Responsibilities:
- Conduct thorough investigations and offer guidance on the most current security-related risks, threats, and vulnerabilities. This will involve managing security incidents, overseeing external security reviews, and performing penetration tests to ensure the robustness of our infrastructure's security posture.
- Collaborate on the development of Information Security policies, standards, and baselines. Your input will contribute to assessing compliance efforts.
- Monitor, evaluate, and execute network penetration tests, vulnerability assessment scans, and risk evaluation reviews.
- Define and present key security metrics to influence trends in remediation strategies.
- Communicate findings and provide recommendations to stakeholders during remediation processes as necessary.
- Work closely with IT Operations, architecture, and project teams to design and implement security controls based on policies, standards, and industry best practices.
- Coordinate vulnerability assessments, review assessment results, guide patching, and lead or offer advice on remediation activities related to various IT infrastructure technologies such as BU OS, Middleware, Unix/Linux Servers, Storage, Databases, Appliances, Web Applications, Network Devices, malware tools, IDS/IPS, encryption, etc.
- Contribute to consistent governance reporting by providing results and metrics. You will also collaborate on and organize remediation plans and efforts.
- Engage in research to develop testing tools, techniques, and process enhancements.
- Effectively explain, demonstrate, and document the operational implications of specific security vulnerabilities or loopholes.
- Analyze vulnerability findings and suggest corrective actions and security strengthening measures.
- Manage and configure NGFW, WAF, and NSG.
- Implement Data Loss Prevention (DLP) solutions to enhance data security.
- Provide mentorship, guidance, and knowledge-sharing within the team.
- As needed, offer recommendations, explanations, and guidance on your area of expertise to other teams in the organization.
- Comprehend the Scope of Work for each engagement.
- Proactively recognize security risks and define security requirements and controls to mitigate these risks.
- Carry out your duties in a secure, organized, and professional manner.
Requirements:
- You hold a Bachelor's Degree in Science, Engineering, or an equivalent field.
- You possess certifications such as CISSP, GSEC, or other relevant credentials.
- You have over 5 years of progressive experience in IT security.
- Your track record demonstrates expertise in formulating, maintaining, and enforcing security best practices.
- You are proficient in industry-recognized tools, encompassing Middleware, Servers (Linux/Windows), Storage, Databases, Appliances, Web Applications, Network Security Devices, as well as technologies like Cisco ACI, Nutanix, Azure Cloud Platform, CyberArk, Intune, Microsoft Endpoint Management, SDWAN, Palo Alto, Fortinet, Cisco ASA, and Juniper firewalls.
- Your extensive knowledge covers the current cybersecurity landscape, with a focus on networks and server/system management. You possess a strong background in Cloud Security (Azure, OCI, Nutanix) and a deep understanding of Zero Trust and SASE security models.
- You possess a strong grasp of Authentication, End Point Security, Internet Policy Enforcement, Web Content Filtering, Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions, VMs, as well as common networking services and protocols (TCP/IP, SSH, FTP, DNS, DHCP, SMTP, SSL, etc.).
- Your familiarity extends to Information Security best practices, policies, standards, and baselines, including industry guidelines from ISO 27001/27002, NIST, CIS, and OWASP.
- You have notable experience in database security.
- System hardening for Networking Devices, Windows, and Linux is within your realm of expertise.
- You're a resourceful problem solver who thrives in collaborative settings.
- You exhibit the ability to systematically analyze intricate technical issues, identify solutions, and effectively communicate them to non-technical audiences.
- Your communication skills, both written and verbal, are strong, enabling you to generate concise reports, summaries, and formal presentations.
- You can adeptly explain, demonstrate (when applicable), and document the operational consequences of specific security vulnerabilities or loopholes.
- You're self-motivated and capable of working independently.
- You're a dedicated team player.