This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Part-time job opportunities in English for the people in Montreal

To post a job, login or create an account |  Post a Job

   montreal part-time jobs   

Bringing new part-time opportunities every day!

previous arrow
next arrow

Cloud Security Architecture Specialist

Alltech Consulting Services, Inc.

This is a Contract position in Montreal, QC posted August 7, 2020.

Job description The company is currently undergoing a transformation as we look to move more workloads to the public cloud and modernize our information technology stack.

This is a unique opportunity to grow with a world class organization as the industry undergoes a technology revolution.

This position will be part of the Cloud Security Architecture (CSA) and is part of the Technology Operations Risk (TOR) organization.

The mission of the CSA team is to conduct comprehensive security evaluations and provide architecturaldesign guidance for current and emerging cloud technologies to be used in the Firm.

This highly leveraged internal position within the firm’s IT Security organization has excellent growth potential.

The CSA team works with IT groups on a global basis to ensure that IT projects are executed using secure and approved patterns.

This role requires hands-on experience in cloud, application andor infrastructure security, technology risk management in a highly regulated environment as well as great organizational and communication (verbal and written) skills.

Roles Responsibilities
– Provide security expertise to engineering and development teams, acting as a project team member providing, consulting, advising, ensuring security requirements are integrated in the project.

– Provide specific security expertise to engineering teams by identifying and creating patterns and blueprints for repeatable security, infrastructure and application instantiations.

Blueprints and patterns may address such areas as network design, database access, authentication methods, encryption requirements, key management, entitlement design, identity management, logging, input validation, secure data transfer among others.

This involves liaising with other technology subject matter experts to build consensus, outlining areas of improvement in written form and explaining concerns early on.

– Identify areas of risk on projects where security requirements cannot be fully addressed in the required time frame of the project.

– Document and present those risks to senior business, IT and Security team members.

– Help identify areas of security the firm might want to invest in improve IT security.

– Product security case reports to document and highlight specific risks along with potential mitigations.

Required Skills
– 5 to 8 years of information security experience
– Excellent communication interpersonal skills to be able to interact at all levels be effective as part of a broader team, capable of taking broad objectives and create and execute a concrete plan
– Ability to influence and engage with senior management
– Ability to manage expectations and handle high-pressure situations with tight deadlines
– Experience in an information security (application andor infrastructure) role in an enterprise environment.

– 2 years Hands-on experience with popular Cloud Vendors and technologies such as Amazon Web Services, Microsoft Azure.

– Ability to quickly adapt to changing priorities and demands
– Ability to write documentation for all types of audiences, from very specific technical guides to higher level research on technologies and vendors.

– Ability to work independently, and self motivate
– Demonstrated ability to see through sales pitches to find inconsistencies and omissions to quickly identify the most effective areas to look for controls gaps, and the technical ability to follow through.

Skills Desired
– Experience with technologies for protecting data at rest and in transit along with key proper management practices.

– Experience with PKI
– Experience with Modern Authentication Technologies such as OAuth2, OpenID Connect and SAML 2.0
– Experience with Docker or other Linux Container technologies
– Experience with Kubernetes or similar workload orchestration
– Knowledge of traditional network technologies, such as firewalls, NAT, Load balancers, and web proxies
– Experience with Software Defined Networking Technologies
– Experience with infrastructure as code tools, such as Hashicorp Terraform
– Experience with CICD pipelines (re automation)
– Knowledge of traditional security concepts such as patchvulnerability management, input validation, authentication, authorization