Audit / Compliance Requisition ID: 311877 At Rogers, we believe the key to a strong business, is a diverse workforce where equity and inclusion are core to making everyone feel like they belong. We do this by embracing our diversity, celebrating our different perspectives, and working towards creating environments that empower our people to bring their whole selves to work. Everyone who applies for a job will be considered. We recognize the business value in creating a workplace where each team member has the tools to reach their full potential by removing any barriers for equal participation. We work with our candidates who are experiencing a disability throughout the recruitment process to ensure that they have what they need to be at their best. Please reach out to our recruiters and hiring managers to begin a conversation about how we can ensure that you deliver your best work. You matter to us! For any questions, please visit the Recruitment Process FAQ.
Our transportation sector client is seeking an IT Auditor to join their team! Key Details :
Contract Length : 6-month contract.
Hours : 5 days per week, 7.25 hours per day
Location : HYBRID – 2 days / week onsite in Toronto, ON. (Bay St.)
Roles and Responsibilities :
Defines, evaluates, and assesses security architecture requirements for systems environments and IT projects.
Ensures the incorporation of IT security and contingency measures in the development of systems.
Advises on the identification, analysis, and resolution of specific security factors, risks, vulnerabilities; protection of personal privacy issues; and appropriate industry and international security standards.
Carry out information and information technology (I&IT) security projects and tasks in the Ontario Public Service as assigned by Corporate Security or cluster I&IT management
Must Have Qualifications :
5+ years’ experience in IT audit, IT Security, or IT risk – IT audit is preferred
Understanding of security and project controls
Problem solving and analytical skills
General Skills :
Strong understanding and expertise in security architecture
Knowledge of techniques to secure information assets and the planning, design, and implementation of security technologies
Proven techniques to discover gaps or weaknesses in security architecture to identify and mitigate known security threats or inherent weaknesses
Knowledge and understanding of relevant legislation and corporate directives related to the security and confidentiality of information (e.g. Freedom of Information and Protection of Privacy Act) in order to identify and assess areas of concern and risk
Solid knowledge of current security and contingency technology and techniques (e.g. digital signature, encryption, access controls, fire-walls, authentication, virus protection, etc.); and
a proven working knowledge of security audit procedures and protocols
Experience in developing enterprise architecture deliverables (e.g. models)
Experience in providing specialized security support at the specified experience level
Experience in establishing secure environments at a network, operating system or application level
Experience with implementing security on complex and distributed systems.
Awareness of emerging IT trends and directions, especially as related to security
Excellent analytical, problem-solving, and decision-making skills; written and verbal communication skills; interpersonal and negotiation skills
A team player with a track record for meeting deadlines, managing competing priorities and client relationship management experience
Desirable Skills :
Experience in developing enterprise architecture deliverables (e.g. models) based on Ontario Government Enterprise Architecture processes and practice
Experience in Threat Risk Assessment methods
Knowledge and understanding of Information Management principles, concepts, policies and practices
Experience in business recovery and disaster recovery planning.
Experience in performing threat and risk assessment.
Experience in public key infrastructure development and operation.
Experience in security design as part of systems development projects.
Experience in intrusion detection systems.
Experience in mitigation tools for malicious software.
Experience in vulnerability analysis and penetration testing.
Experience in network monitoring.
Experience in security policy development.
Experience in developing and delivering security education.
Experience in forensic investigation.
Knowledge and understanding of Information Management principles, concepts, policies and practices