IT Security Analyst II at Calgary Board of Education
Calgary, AB, Canada -
Full Time


Start Date

Immediate

Expiry Date

10 Dec, 25

Salary

47.86

Posted On

11 Sep, 25

Experience

4 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Written Communication, Corrective Actions, Confidentiality, Testing, Fuzzing, High Pressure Situations, Windows, Firewalls, Ips, Routers, Private Networks, Unix, Cissp, Traffic Analysis, Switches, Operating Systems, Reviews, Security Certification, Security Operations

Industry

Information Technology/IT

Description

MISSION

The Calgary Board of Education (CBE) is the largest school board in western Canada with over 144,000 students and 16,000 employees. Our mission: Each student, in keeping with their individual abilities and gifts, will complete high school with a foundation of learning necessary to thrive in life, work and continued learning. We pride ourselves in the values we hold. Students come first. Learning is our central purpose. Public education serves the common good. The CBE encourages an inclusive and equitable workplace, which supports our diverse student and employee community. We encourage all applicants to join our dynamic, diverse, and collaborative culture and welcome applications from all qualified individuals.
When you apply to the CBE, you can feel good about serving our future leaders and contributing to student success.

PROVIDES SUPPORT AND ASSISTANCE TO DAY-TO-DAY IT SECURITY OPERATIONS REQUIREMENTS

  • Creates and maintains policy and rule-sets on firewalls, intrusion detection systems, VPNs, unified threat management platforms and other related systems.
  • Performs vulnerability-scanning, penetration testing, and ‘hardening’ activities to secure systems and applications by reducing or eliminating vulnerabilities and/or possible avenues for attacks.
  • Authorizes course of action and work priorities for patching and other activities based on reviews of Security Alert Bulletins recommendations from junior information security staff and/or other IT staff.
  • Develops patterns for Intrusion Protection Systems (IPS), network devices, firewalls, virtualized security products, or other devices to compensate where threats have no standard anti-virus pattern files.
  • Conducts research to assist with identifying Advanced Persistent Threats (APTs) and advisory threats.
  • Recommends courses of action to the Supervisor of Security Operations and senior leadership based on research findings.
  • Coordinates “Red Team” and “Blue Team” (attacker versus defender) activities to emulate hackers and test operational information security defenses.
  • Ensures anti-virus pattern files and engines are up to date.
  • Oversees web and content filtering rules and bandwidth policies.
  • Ensures that information security components including disk encryption and all cryptographic systems are operational and are performing optimally.
  • Provides oversight of and assistance with the tasks/assignments of junior information security staff to ensure accurate and timely completion.
  • Monitors systems performance, health, alerts, and takes appropriate preventative and corrective actions.
  • Follows change control, and testing processes for effecting modifications to information security systems and other related components.
  • Conducts testing using advanced techniques such as fuzzing, vulnerability/penetration testing, testing of uncommon threat vectors, etc.
  • Optimizes testing efficiency while ensuring greater work thoroughness by using testing suites, scripting, or other automated techniques.
  • Leads and participates as a member on Computer Emergency Response Team (CERT) tasked with resolving major system or technology issues.
  • Assists staff with training and awareness development on security related technologies and threats.
  • Participates on an advisory committee that establishes content filtering rules consistent with staff and student duty-of-care obligations.

EDUCATION AND EXPERIENCE

  • A 4 year post-secondary degree in Computer Science (or equivalent degree in Information Technology); and
  • Minimum of 5 years of experience in an Information Technology role of which, at least three (3) years must have been in an advanced Information Security or Cybersecurity role within enterprise environments.
  • Up to date CISSP or GIAC SANS (Advanced Level) Security certification.
  • Expertise with the following IT security systems: firewalls, anti-virus, anti-spam, intrusion detection, SIEM products, content filtering, virtual private networks (VPN), encryption systems and honeypots.
  • Expertise in desktop and server operating systems (Windows, Mac, Linux, Solaris).
  • Expertise in standard network diagnostic equipment, network protocols and traffic analysis. Working knowledge of switches, routers and bridges.
  • Advanced knowledge and experience with common attack methodologies, tactics and protocols.
  • Advanced hands-on knowledge of PowerShell, Unix, JavaScript, Python and VB Scripting languages. Expertise with interviewing techniques relating to information security incidents and investigations.
  • Experience working with law enforcement agencies.
  • Keen awareness of ISO/IEC: 27001:2013
  • ITIL certifications and/or COBIT certification desirable.
  • Networking, Server, Endpoint and Mobile Computing systems experience is highly desirable.
  • Experience in corporate security or law enforcement would be an asset.
  • An equivalent combination of directly related post-secondary education and directly related experience may be considered.

DEMONSTRATED SKILLS AND COMPETENCIES

  • Commitment to continuously learn and grow intellectually.
  • Strong desire to achieve, excel and apply new learnings.
  • Ability to maintain strict level of confidentiality.
  • Strong organizational and project management skills.
  • Strong problem solving and decision making abilities including the skill and tact to review and question existing processes and make improvements.
  • Demonstrated comfort with ambiguity and openness to change.
  • Ability to converse effectively with business users and simplify complex technical concepts for non-technical audiences.
  • Ability to establish and maintain effective working relationships with co-workers and clients.
  • Strong oral and written communication and interpersonal skills.
  • Ability to function effectively and independently in high-pressure situations with constantly changing priorities.
  • Strong organization skills with ability to prioritize many simultaneous responsibilities.
  • Reliable, dependable and trustworthy.
  • Personal suitability.

BE PART OF OUR SUCCESS

Are you looking for an opportunity to join a team where your contribution makes a positive impact on the lives and learning of more than 125,000 CBE students? The Calgary Board of Education is looking for exceptional professionals to join our team. Our employees are highly valued and recognized, a career with the CBE offers incredible opportunities, rewards and supports.
We thank all candidates for their interest in this position however only those selected for an interview will be contacted.

LAND ACKNOWLEDGEMENT

The Calgary Board of Education acknowledges the traditional territories and oral practices of the Treaty 7 Nations, including the Siksikaitsitapi Nations, Tsuut’ina Nation, and the Îyârhe Nakoda Nations. We acknowledge the Métis Nation within Alberta, and all people who make their homes in the Treaty 7 region of southern Alberta. As a learning organization, we are committed to advancing the Truth and Reconciliation Calls to Action focused on Education for ReconciliACTION

Responsibilities

PURPOSE

The Information Technology (IT) Security Analyst II is a senior role that provides support and leadership to ensure the confidentiality, availability and integrity of the CBE’s Information Technology infrastructure and systems, inclusive of all electronic assets and data. This job is responsible for the effective and reliable operations of advanced aspects of day-to-day information security systems as well as monitoring for and timely identification and eradication of IT security vulnerabilities and/or risks within the entire IT environment.
In addition, the job is responsible for conducting advanced information security and/or digital forensic investigations, performing non-routine risk assessments, and providing advanced analyses of information technology or information technology related events. This job also assists with planning, co-ordinating schedules of design activities, and executing infrastructure upgrades and changes, troubleshooting, and maintenance of all security systems and services.
Working with the Supervisor of Security Operations, Senior Solution Architects, and senior ITS Management this job develops and enhances Information Security Strategies for the CBE. The job is crucial for researching, architecting, designing, and implementation of IT security plans and solutions.

ACCOUNTABILITY

This job is accountable for:

  • Taking proactive actions to identify and arrest IT security threats based on Indicators of Compromise (IOC) or Indicators of Attack (IOA).
  • Providing maintenance, monitoring and configuration of complex security devices and supporting systems including but not limited to firewalls, anti-virus, anti-spam, intrusion detection, content filtering, virtual private networks (VPN), encryption, and other related systems.
  • Ensuring that information security devices and related systems integrate, and inter-operate with each other providing multi-layered secured operations consistent with a defense-in-depth model.
  • Architecting, designing, implementing (or upgrading) and validating of simple to extremely complex information security solutions, technologies, and architectures.
  • Analyzing multiple system and/or security logs, and datasets, carrying out pattern, statistical deviation, or regression analysis to identify inconsistencies, errors, anomalies, intrusions, inappropriate activity or other Indicators of Compromise (IOC).
  • Conducting digital forensics and IT security investigations that range from routine to extremely complex.
  • Performing timely and accurate risk assessments on technologies deployed at the CBE using standardized and non-standardized methods.
  • Either individually or as a team lead, carrying out complex risk assessments and investigations.
Loading...