Job Summary:
The Security Specialist will be responsible for requirements elicitation and analysis operational policy and process design and implementation of Privileged Access Management (PAM) technologies. The role involves working on cyber security processes including compliance risk evaluation and exception handling. The specialist will also be expected to provide leadership and contribute to IT transformation projects.
Location: Remote N/A N/A Canada
Responsibilities:
- Requirements elicitation and analysis.
- Operational policy and process design.
- Working on cyber security processes including compliance risk evaluation and exception handling.
- Implementation of Privileged Access Management (PAM) technologies.
- Designing documenting and improving Information Technology Service Management (ITSM) business processes.
- Facilitating workshops and prioritizing requirements.
- Administering a PAM solution end to end.
- Producing visual process models and architecture diagrams.
Required Skills & Certifications:
- A University degree in Computer Science Business Administration or related discipline or certification in Information Technology from a recognized community college. An equivalent combination of education and experience may be considered.
- 5 years operational experience in requirements elicitation and analysis associated with operational policy and process design activities.
- 5 years experience in cyber security processes including compliance risk evaluation and exception handling.
- 5 years experience in Privileged Access Management technologies.
- 5 years experience in Privileged Access Management implementation.
- 5 years experience in leadership roles such as team lead lead architect or program technical lead.
- Excellent communication skills (written and oral) in English.
- Experience fulfilling a similar role in one (1) large IT transformation project to support the delivery and operation of a new Privileged Access Management (PAM) solution.
- 5 Years demonstrated experience designing documenting and improving Information Technology Service Management (ITSM) business processes related to the implementation of complex enterprise systems.
- 5 Years demonstrated competency in requirements elicitation workshop facilitation and requirements prioritization.
- 5 Years demonstrated experience in Privileged Access Management (PAM) and Cybersecurity processes.
- 5 Years demonstrated experience in producing visual process models and architecture diagrams.
Preferred Skills & Certifications:
- Knowledge and experience of Active Directory/MS Entra ID Identity and Access Management or Identity Administration and Governance solutions.
Special Considerations:
Scheduling: