Information security analyst
Sheridan College’s Information Technology Department based in Oakville, ON is inviting applications from suitable candidates for the position of Information security analyst. Sheridan College’s Information Technology Department offers specialized programs in fields like computer science, software engineering, and data analytics. It provides a blend of theoretical knowledge and practical skills, preparing students for tech careers. Its focus on innovation and hands-on training ensures students stay competitive in the evolving IT market. The candidates selected for the vacancy will be required to start the work as soon as possible.
Also hiring: Cleaner, heavy duty
Job Description:
Employer Name: Sheridan College
Department: Information Technology
Position: Information security analyst
No of Vacancies: 3
Salary: $69924.00 – $87405.00 yearly
Employment Type: Full time
Employee Group: Administrative
Location: Oakville, ON, Canada
Shift: At least 3 days/week
Work Categorization: Hybrid Position | On-site
Reference Number: J1124-0460
Requirements:
Languages: Candidates must have knowledge of the English Language
Education: Candidates need standard educational qualifications such as a Secondary (high) school graduation certificate or equivalent experience
Experience: Candidates should have considerable experience in the relevant field
Other Requirements:
- The candidates should be able to maintain up-to-date skills and knowledge through professional activities
- The candidates should have knowledge of current technologies and trends, as well as familiarity with various desktop computer applications to prepare reports, project plans, and presentations
- The candidates should be able to undergo a security and criminal background verification, which may be required prior to hire
Responsibilities:
- The candidates should be able to perform daily security maintenance and activities for enterprise systems (Sitecore, PeopleSoft and C-Cure) and perform security knowledge transfer to assist in making security part of normal IT and College activities and respond to abuse complaints, including copyright violations, online harassment or threats, hacking, and spam
- The candidates should be able to serve as an advisor in the development, implementation, and maintenance of an information security infrastructure and monitor, evaluate, and perform risk assessments to ensure security practices are robust
- The candidates should be able to monitor and report on information security activities and compliance with relevant regulations and policies
- The candidates should be able to execute protocols to evaluate, test, assess, and improve the integrity and effectiveness of security infrastructure, including firewalls, Intrusion Detection Systems, and other security devices
- The candidates should be able to monitor programs and processes to ensure the implementation and effectiveness of information security policies and standards and evaluate and monitor new threats and vulnerabilities to systems, ensuring security processes are applied
- The candidates should be able to monitor internal and external information security trends and keep others in IT and other Sheridan groups informed about security-related issues and activities
- The candidates should be able to understand potential threats, vulnerabilities, and control techniques and communicate this information to departmental system administrators and management
- The candidates should be able to participate in technology research and solution testing related to security capabilities and advise on the development, implementation, and maintenance of Sheridan’s information security policy, standards, and guidelines
- The candidates should be able to assist Sheridan units in investigating security breaches and pursuing associated disciplinary and legal matters and perform administrative duties incidental to IT security, such as completing incident reports and inform Sheridan faculties and departments about information security best practices, procedures, and policies and perform other security-related
How to apply:
If the position is fit for you and the basic requirements are fulfilled then you can now apply directly to the employer (along with your resume and reference number) through the below-mentioned details.