The Role
To function as an information security technical lead. The duties will include designing, implementing and maintaining information security technology and systems, developing and deploying new information security solutions and providing technical information security leadership to other ITS initiated and College initiated projects. The position will provide technical leadership to system administrators to ensure that systems are designed, implemented and maintained using accepted information security principles. Responsibilities 1. Information Security Lead will provide leadership and direction to appropriate team members and external resources :
a. Leads installation, configuration and maintenance of cybersecurity defense technologies.
b. Provides technical information security leadership for developing standards for securing systems and devices.
c. Conducts information security assessments and reviews.
d. Monitors and enforces compliance with Douglas College information security policies, standards, and procedures.
e. Educates others on best practices in information security.
f. Provides input into staff job description, assists with preparation of interview questions, and interviews candidates for positions within ITS.
g. Collaborates with the management to ensure the adequate coverage for areas and issues.
h. Works closely with the Responsible Administrator to execute the day to day processes and operations of the area to ensure effectiveness and efficiency.
i. Acts as resource to Information Security Analyst for issues relating to but not limited to the interpretation of college and government policies and processes, as well as best practices in situations not covered by existing policies and makes decision on escalated outcomes in collaboration with the Responsible Administrator.
j. Identifies new opportunities and efficiencies in processes and workflows and integration of services.
k. Schedules and assigns work to unit staff based on changing requirements.
l. Coordinates the day-to-day operational support to Information Security Analyst.
m. Identifies new opportunities and efficiencies in processes and workflows and integration of services.
2. Ensures oversight and monitoring for cybersecurity defense technologies :
a. Investigates and remediates information security incidents.
b. Ensures adequate Host Intrusion Detection is in place.
c. Ensures adequate Network Intrusion Detection is in place.
d. Ensures adequate log collection and analysis.
e. Ensures securely functioning identity and access management systems are in place.
f. Creates test plans and conducts system testing.
g. Researches and analyzes existing practices and procedures and proposes adjustments and revisions.
h. Monitors to ensure that adequate system hardening, upgrades, security patches, and malware protection is in place.
i. Maintains the documentation of cybersecurity defense technologies.
3. Remains current in the information security field :
a. Conducts research on information security trends and developments.
b. Remains knowledgeable on the developments in cybersecurity defense technologies.
c. Maintains knowledge of Information Security vulnerabilities.
4. Performs other duties as assigned.
a. Participates in and analyzes security risk assessments for 3rd party vendors, cloud solutions and software systems.
b. Contributes to the planning and design of an enterprise business continuity plan and disaster recovery plan.
c. Provides information, technical assistance and support to users.
d. Attends internal and external meetings.
e. Creates and maintains user documentation for technical and non-technical users. To Be Successful in this Role You Will Need Required Education and Experience :
institution
including education or equivalent experience that includes a subset of :
o Certificate, diploma, or a degree in Information Security
o CISA – Certified Information Systems Auditor
o CISSA – Certified Information Systems Security Professional
o CCSP – Certified Cloud Security Professional
o SSCP – Systems Security Certified Practitioner
o CSSLP – Certified Secure Software Lifecycle Professional
o CAP – Security Assessment and Authorization Certification
o SANS GSEC Security Essentials
o SANS GCED Advanced Security Essentials
o Other Information Security certification
Security experience.
Required Knowledge, Skills and Abilities :
o Problem-solving and analytical skills.
o Organization, time management, and multi-tasking.
o Interpersonal relationships.
o Working effectively with others in a team environment.
o Communicating effectively in person, on the phone, and in writing with all stakeholders.
o Working independently with minimal supervision.
o Establishing priorities and achieving deadlines.
Information Security Lead • Hybrid, Canada