Information Security Analyst

Partager :

RSL’S story: 

Refrigerative Supply Limited is a family business owned by Alison Hamilton and Linda Gibbs.  The business was founded by Peter Gibbs' and Alison Hamilton's parents, Jack and Elizabeth Gibbs. In 1949 they acquired the four-year-old Vancouver branch of an American-based company. From this modest beginning, the Company now has a Head Office in Burnaby and sixteen other branches. We are committed to remaining a family business and are proud to have the third generation working in the business. The company's mantra is to ‘inspire excellence and trust’ by providing creative solutions and unrivaled experiences, in-store and online, that make RSL the choice for customers, suppliers, and employees at every location. For more information, please visit: www.rsl.ca 


RSL Mission 

Our purpose is to provide the highest quality HVAC and Refrigeration experience in Canada. 


RSL Vision 

To be the environment that inspires excellence and trust within our community. 


RSL Values 

Gracious, Collaborative, Courageous, Innovative, Community Focused and Exceptional Experience 


The Opportunity: 

 

Scope of the position 

 

You are a self-motivated achiever who gains satisfaction from providing excellent customer service and thrives in a dynamic environment.  You are excited about working in a high-paced environment providing security advice on your cloud infrastructure, including network, service, and application components. This role conducts risk assessments, architectural reviews, provides cyber security subject matter expertise, and assists in the building and design of secure solutions. Additional duties may include network and application penetration testing, and support for cyber security investigations as well as on-call response for cyber security incidents.  As well, you will be building out our disaster recovery and business continuity process and plan.  You are highly organized, detail oriented, with good verbal and written communication skills. 

 

As a key member of the IT Team, the Information Security Analyst will work closely with IT Operations to support \ secure business applicationsdata, infrastructure, and IT processes as well as lead in the creation of an Information Security strategy for RSL. 

 

Duties and Responsibilities 

 

    • Assist IT operations team in defining baselines for the secure configuration of all devices. 
    • Maintain operational configurations of all security solutions as per the established baselines. 
    • Review logs and reports of all installed devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution. 
    • Lead and conduct vulnerability assessments and delivering clear, actionable reports. 
    • Lead in the design and execution of vulnerability assessments, penetration tests and information security audits. 
    • Lead the planning and design of enterprise security architecture. 
    • Lead in the creation of enterprise security documentsi.e. policies and standards. 
    • Provide oversight and contribute to the design and deployment of infrastructure and application solutions.   
    • Maintain up-to-date detailed knowledge and awareness information security risks, solutions, new attacks and threat vectors. 
    • Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. 
    • Problem-solving mentality leveraging internal and/or external resources. 
    • Exceptional written communication and strong verbal communication skills. 
    • Experience with non-technical attacks and social engineering. 

 

 

Skills and Qualifications 

 

  • Technical Diploma or University degree in Computer Science or related filed 
  • One or more of the following certifications preferred: 
        • (ISC)2 - CISSP, CSSLP, CCSP 
        • GIAC - GSEC, GCIH, GCIA, GCFE, GWAPT or GPEE

  • Solid understanding of modern authentication protocols and a background in cyber security.
OU
 
 
En cliquant sur le bouton, j'accepte Conditions d'utilisation et Politique de confidentialité de GetHired
 
Propulsé par GetHired.com | Conditions d'utilisation | Politique de confidentialité