Contract
Submit Resume
6.7 Information Technology Security Design Specialist
Junior, Intermediate, Senior
Experience Levels
- Junior: < 5 years of experience
- Intermediate: 5– < 10 years of experience
- Senior: 10+ years of experience
Responsibilities could include but are not limited to
- Review, analyze, and/or apply: Architectural methods, frameworks, and models such as The Open Group Architecture Framework (TOGAF), United States (US) government Federal Enterprise Architecture Program (FEAP), Canadian government Business Transformation Enablement Program (BTEP) and Government Strategic Reference Model (GSRM), Zachman, Unified Mobility Manager (UMM)
- Review, analyze, and/or apply a broad range of security technologies including multiple types of systems and applications architectures, and multiple hardware and software platforms, including:
- Directory Standards such as X.400, X.500, and SMTP
- Operating Systems such as MS, Unix, Linux, and Novell
- Networking Protocols (for example, HTTP, FTP, Telnet)
- Network routers, multiplexers and switches
- Domain Name Services (DNS) and Network Time Protocols (NTP)
- Review, analyze, and/or apply Secure IT architectures, standards, communications, and security protocols such as IPSec, SSL, SSH, S-MIME, HTTPS
- Review, analyze, and/or apply IT Security protocols at all layers of the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) stacks
- Review, analyze, and/or apply The significance and implications of market and technology trends in order to apply them within architecture roadmaps and solution designs. (examples: web services security, incident management, identity management)
- Review, analyze, and/or apply Best practices and standards related to the concept of network zoning and defence in-depth principles
- Review, analyze, and/or apply IT Security protocols at all layers of the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) stacks
- Analyze IT Security statistics, tools and techniques
- Analyze security data and provide advisories and reports
- Prepare technical reports such as requirement analysis, options analysis, technical architecture documents, mathematical risk modeling
- Brief senior managers
- Security architecture design and engineering support
- Conduct data security designation/classification studies
- Prepare tailored IT Security alerts and advisories from open and closed sources Complete tasks directly supporting the departmental IT Security and Cyber Protection Program
- Develop and deliver training material relevant to the resource category
Specialties could include but are not limited to
- SSL
- HTTP
- HTTPS
- FTP
- Telnet
- S-MIME
- IPSec
- SSH
- X.400/X.500 Directory Standards
- X.509 Certificate Protocols
- TCP/IP
- OSI
- DNS
- SMTP
- NTP IMS