Friday 13 July 2012

Sr. Security Specialist

We are currently seeking a Sr Security Specialist in London Ontario for a 6 month contract opportunity


The Business Technology Risk Management (BTRM) team directs and supports the organization in the protection of its information assets through the implementation and management of information security policies and standards
This individual will be responsible for providing technology risk management and information security business consulting & advisory services that allows our business partners to secure their business through the use of technology. The successful candidate will be part of a dynamic team focused on providing professional Technology Risk & Information Security management services as part of key business initiatives. His/Her role is to identify, evaluate, and conduct Business Technology Risk Assessments to ensure appropriate technology controls are in place, identify key risks, and ensure proper management and mitigation of any identified technology control deficiencies. This role will focus on both business initiatives as well as technology initiatives. 

Skills: 
• Proven understanding of technology risk management & information security frameworks and methodologies 
• Proven experience in risk based analysis & information security technologies 
• Strong ability to lead independent technology risk assessments based on a control based methodologies 
• Prepare risk based reporting & presentation for finding to technology and business leaders 
• 5 + years of experience in (IT) Risk Assessment, IT Audit, Development & management of information security policy and standards, Disaster Recovery and Business Continuity planning, Threat & Vulnerability Assessment and Testing Methods. 
• Experience with financial banking, credit card processing, acquiring, issuing and merchant services 
• In-depth experience with financial regulatory & compliance reporting environments 
• Experience working with the Payment Card Industry Data Security Standard 
• Effective project management skills and the ability to coordinate multiple projects simultaneously 
• Experience with project management tools & methodologies 
• Strong Presentation, Communications and Writing Skills 
• Strong Analytical & Analysis Skills 


The following technical skills are desired: 
• Experience with the following technology components: 
o Firewalls, IDS/IPS, Vulnerability Management, Encryption, Content Filtering, Anti-Spam, Anti-Virus, Forensic and Data Loss / Leakage tools. 
o Network Technologies (Hubs, routers, switches, wireless, SAN’s) 
o Web Applications (XML, JAVA) 
o Encryption (PKI, SSL, AES, 3DES) 
o Unix (Solaris, AIX, Linux), Windows Server, Database (Oracle, MS SQL, DB2) 
o Vulnerability scanning and penetration testing tools 
o Web Application Scanning tools 
o Secure Code Application Testing tools 

Candidates must have: 
IT Risk assesment background 
IT Audit experience 
Security 
PCI Knowledge 
Cryptology experience 
Excellent Communication 

Personnel Locations Requested: 
Seeking personnel with the ability to travel between US and Canada, primary focus of our work will be within Canada, (Ottawa, Regina, Toronto) with 80% of the work being done remotely, estimated travel requirements is not expected to exceed 20%. Primary work location will be remote work from home, supporting business acquisition, technology integration and technology conversion activities. Resource will be working as part of a dynamic and diverse team that is located throughout North America. TD will not reimburse for relocation or daily living expenses, unless pre-approved travel is required. While on approved travel, reasonable travel and living expenses in accordance with TD Travel policy will be reimbursed. 

IMPORTANT: 
Along with the resume, please attach a separate document with the candidate’s response to the following question (submissions without this response will not be considered): 
• Describe a recent Technology Risk Assessment you have performed. Include the scope of the assessment, what methodology followed, what challenges encountered, and how the results were summarized for both technology and business consumption?

No comments:

Post a Comment