Reference Number
DND17J-018507-000059
Selection Process Number
17-DND-EA-ADMIM-421414A
Organization
National Defence
Year
2017-2018
Days Open
7
Classification
CS03
City
Ottawa
Type
External
Total
56
Employment Equity
35
(62.5%)
Screened out
15
(26.8%)
Screened in
41
(73.2%)
Employment Equity 62.5% 35
Screened Out 26.8% 15
Screened In 73.2% 41
Women 10.7% 6
Visible minority 51.8% 29
Indigenous 0% 0
People with disabilities 10.7% 6
English 87.5% 49
French 12.5% 7
Citizens 83.9% 47
Permanent Residents 0% 0
In order to complete your application you will be asked a series of questions. These questions will require detailed written answers that will assess your education and experience. You will be able to save your partial application and return to it to complete all required sections before submission. Be sure to include substantiating details that clearly outline the breadth of experience as well as relevant timelines. It is not sufficient to only state that the qualification is met or to provide a listing of current or past responsibilities – you must also provide concrete examples. Resumes will only be used as a secondary source to validate the experience described.
Please note that the Defence Team members in the National Capital Region (NCR) have begun to relocate to the new National Defence Headquarters - Carling Campus in Ottawa’s west end. Some members of this organization, ADM (IM), may relocate in the next year. The Campus is a great new home with many benefits, from a beautiful setting and buildings designed to make maximum use of natural elements, to a full range of facilities, services and retail outlets. The design features of the Campus will enhance collaboration, innovation and efficiency, making our new home an ideal place for current and future employees.
A pool of partially qualified candidates will be established to fill positions within DND in the NCR and may be used to staff similar positions with various tenure, various linguistic and security profiles.
Positions to be filled: 1
Your résumé.
You must meet all essential qualifications in order to be appointed to the position. Other qualifications may be a deciding factor in choosing the person to be appointed. Some essential and other qualifications will be assessed through your application. It is your responsibility to provide appropriate examples that illustrate how you meet each qualification. Failing to do so could result in your application being rejected.
EDUCATION
Graduation with a degree* from a recognized post-secondary institution in a field related to the position. (i.e. BSc or BEng in Computer Science, Computer engineering or Mathematics).
* Degree: A baccalaureate or higher level degree, as established by educational authorities, unless the type of credential is specified in the relevant Qualification Standard.
EXPERIENCES:
-Recent* and significant experience conceiving, designing, delivering or operating enterprise-level ***IM/IT security solutions, projects and/or IT infrastructures.
-Significant** experience analyzing and applying policies, directives, standards and guidance to IM/IT architectures and solution lifecycles.
-Recent experience preparing and delivering briefing notes, synopsis, technical reports, engineering documentation and briefings for variety of audiences including executives, stakeholders, and engineering review boards.
NOTE:
*RECENT experience is defined as experience associated with performing a range of related activities within the last 5 years.
**SIGNIFICANT experience refers to at least two (2) years of cumulative work experience.
*** ENTERPRISE-level is considered to be a network with 5K+ users.
ASSET EDUCATION
Graduation with a graduate degree* from a recognized post-secondary institution in a field related to the position. (i.e. MSc or MEng in Computer Science, Computer engineering or Mathematics).
IT/Cyber Security certifications such as:
- SANS / GIAC
- CSE IT Security certifications
- Certified Ethical Hacker (CEH)
- Offensive Security Certified Professional (OSCP)
- Certified Information Security Systems Professional (CISSP)
- Certified Cloud Security Professional (CCSP)
- Security +
- Any other professional certification held with good standing.
IM/IT Certifications such as:
- Cisco Networking (i.e. CCNA, CCIE)
- Microsoft (i.e. MCSA, MCSE)
- VMWare (i.e. VCDX, VCIX, VCP)
Project Management certifications such as:
- PRINCE 2
- PMI PMP
Any other certification in a related discipline.
EXPERIENCES:
-Recent or significant experience leading multi-disciplinary teams including: assignment and monitoring of assigned work, evaluation of performance, leading meetings and working groups.
-Significant or recent experience in any of the following areas:
- Applied Data Science, machine learning algorithms and advanced analysis of large data sets;
- Hadoop platform (e.g. MapReduce, Hive, Impala, Spark, Flume, Kafka,) or related Big Data technologies (Apache Storm, Nifi, ELK, Scala, Storm).
- Working with network security data in a SOC environment.
- Programming with JAVA, Python, Perl, SQL, REST or C++.
- Deployment of Linux servers.
- Conducting network, systems and web application security assessments.
- Writing vulnerability assessment and penetration test reports.
- Gathering security assessment requirements and capturing the rules of engagement.
- Employing IT security tools, security test and evaluation tools and procedures and configuration and use of IT infrastructure monitoring tools.
- Assessing security aspects of virtualization, mobile devices or wireless technologies.
- Architecting, designing and delivering enterprise identity management or access management solutions.
- Designing and delivering federated identity management solutions.
- Producing IT Asset Valuations, Threat Assessment (TA), Vulnerability Assessments (VA), and Risk Assessments (RA) IAW Government of Canada, Harmonized Threat and Risk Assessment (TRA) Methodology.
- Designing, implementing, integrating and securing network border protection technologies including Firewalls, Content Inspection, Proxies or Diodes.
- Designing, implementing, integrating and securing enterprise network security technologies including VPNs or Taclane.
- Evaluating, designing, documenting and implementing endpoint security solutions such as Antivirus, Firewall, and Intrusion Prevention System (IPS) in an enterprise environment.
- Designing and implementing data security/encryption solutions in an enterprise environment. This includes: Full Disk Encryption, Removable Media Encryption, Rights Management and Data Classification/Labelling.
- Evaluating and configuring and deploying Microsoft-based security technologies in an enterprise environment.
- Designing, implementing and troubleshooting TCP/IP-based technologies in a LAN/WAN environment.
- Experience designing, documenting and implementing virtualization datacentre solutions.
- Designing, documenting and implementing virtualization datacentre solutions.
- Creating and implementing security controls in a virtualized environment.
- Documenting, testing and evaluating security measures/security solutions to be implemented in enterprise environments.
- Designing and implementing endpoint detection and response solutions.
- Implementing directory technologies including virtual directories.
-Recent experience in any of the following areas:
- Briefing senior management on security-related topics and recommendations.
- Program initiation and management including business cases, options analysis, business plans or strategies.
- Government of Canada expenditure management.
- Planning, executing and managing complex procurement/contracting activities for IM/IT goods and services.
- Various aspects of IM/IT project management including resource management, scheduling, stakeholder engagement and documentation based on PMBOK guidelines.
- Assessing defined IM/IT security risks and advising senior management on potential mitigation.
- Consulting and collaborating with clients and stakeholders to assist in developing and documenting business requirements for IT security.
- System or software development and implementation incorporating secure system or software development methodologies, and/or Information System Security Engineering (ISSE) processes or System Development Lifecycle (SDLC) Processes (such as ITIL, ITSG 33, ITSG 33A).
- Agile engineering practices (test driven development, continuous integration and pair programming, etc.).
English essential
Information on language requirements
KNOWLEDGE
Knowledge of information system security management.
Knowledge of at least one (1) of the following enterprise Cyber security technologies:
- Secure Configuration Management
- Endpoint Protection
- Identity Credential and Access Management
- Network Access Control
- Security Incident and Event Management
- Intrusion Detection System
- Network Security (i.e: firewall, Cross Domain Solutions, encryption etc) or
- Vulnerability Assessments and Security Penetration Testing
COMPETENCIES
Analytical Thinking
Continuous Learning
Teamwork
Communication
KNOWLEDGES:
-Knowledge of GoC Resource Management (such as but not limited to human, finance or procurement).
-Knowledge of Project Management Book of Knowledge (PMBK).
-Knowledge of Enterprise Security Architecture.
-Knowledge of the role of departments and central agencies in the delivery of IM/IT security.
-Knowledge of the mandate and the organizational structure of the Department of National Defence and the Canadian Armed Forces.
-Knowledge of DND operational planning processes.
Ability to gain and maintain a Top Secret SIGINT clearance.
Secret security clearance
The Public Service of Canada is committed to building a skilled, diverse workforce reflective of Canadian society. As a result, it promotes employment equity and encourages candidates to indicate voluntarily on their application if they are a woman, an Aboriginal person, a person with a disability or a member of a visible minority group.
The Public Service of Canada is also committed to developing inclusive, barrier-free selection processes and work environments. If contacted in relation to a job opportunity or testing, you should advise the Public Service Commission or the departmental official in a timely fashion of the accommodation measures which must be taken to enable you to be assessed in a fair and equitable manner. Information received relating to accommodation measures will be addressed confidentially.
Preference will be given to veterans and to Canadian citizens, in that order.
Information on the preference to veterans
We thank all those who apply. Only those selected for further consideration will be contacted.