Information Technology - Scarborough

RESPONSIBILITIES INCLUDE (but are not limited to):
The Information Security Officer/Advisor (ISO) is accountable to ensure that information security risks within technology development are identified, assessed and reported, appropriate controls are in place, and local procedures and activities comply with Information Security (IS) Corporate Policy and Standard, the Information Security Manual (ISM), local standards and regulatory requirements. In addition, the ISO is the center of competence for Information Security, providing advisory services, and is aligned to the lob.
Consulting and Advisory
Governance and Control
Training and Awareness
Information Security Officer Council Member
Consulting and Advisory:
• Work closely with portfolio personnel, stakeholders, and senior management to identify Information Security related risks and controls.
• Understand business, local and Information Security strategies as they relate to the portfolio.
• Provide Information security requirements advice and counsel to portfolio personnel, project teams, and the Business ensuring alignment to IS processes and solutions.
• Lead security design of “projects” (application/infrastructure/etc) as required. Manage/facilitate Information Security Assessments (ISA) throughout the project lifecycle ensuring key risks highlighted and controls identified and implemented to mitigate risk. Assessment function must be segregated and independent from design input.
• Lead the Information Security portion of the TDEI Application and Infrastructure Health Checks as required.
• Evaluate and assess emerging security threats and vulnerabilities in portfolio and work with portfolio personnel to identify appropriate controls.
• Provide portfolio personnel guidance in understanding and responding to security incidents with appropriate stakeholders.
• Complete Information Security assessments for new and existing suppliers, including site visits and evaluation of RFP responses, where appropriate.
• In cooperation with Strategic Sourcing and Outsourcing Centre of Competency, participate as required in contract due diligence reviews for any supplier agreements involved in the portfolio.
• Provide consultation to portfolio and legal personnel in the negotiation of Information Security related contractual clauses with suppliers.
• Be an advocate for IS solutions and standards.
• Work as Information Security subject matter experts and provide expertise in regards to their support area or portfolio.
Governance and Control:
• Implement information security risk governance and control framework for the local organization that incorporates a consistent, sustainable methodology for identifying, assessing, and documenting information security risk that provides early warning of potential failure to meet information security requirements.
• Directs and monitors due diligence of information security risk processes (including ISA and Supplier assessments) and results on an ongoing basis • Oversee and manage portfolio of Information Security Manual exceptions (ISMEs) to ensure these are current, accurate and are supported by sound resolution plans • Complete portfolio level risk assessments • Interprets and acts on IS reports.
• Ensure compliance to standards specific to the local organization, consistent with IS policies and guidelines, and with T&O control frameworks (eg. CMMI, ITIL) via share services (i.e. CMRP).
• Review and provide recommendations to IS policies, standards, guidelines/ processes.
• Escalate IS potential or unresolved issues to management for resolution as appropriate
• Consolidate, interpret and report key information security risk, trends for the portfolio and understand effectiveness of controls in managing the key risks. This includes standard and ad hoc analyses and reporting for a variety of stakeholders including: local organization, Operating Group, IS Corporate Support Area (CSA) and others as appropriate. Integrates, interprets and analyzes data to produce portfolio information security risk profile for the local organization and IS CSA, identifying potential exposures and trends.
• Identify and report IS trends by reviewing portfolio risk assessments and compliance risk reports.
• Report on portfolio of ISME’s, complete trending analysis and collaborate with other ISO’s to determine and report on aggregate risk exposure and develop and propose joint solutions.
Training and Awareness:
• Participate and facilitate communication, and training, to promote effective Information Security risk management and embed IS Risk Management controls and practices within the local organization, leveraging existing programs where available.
• Promoting awareness and knowledge of good Information Security practices in the general and specific (eg. developer) local populations, with guidance from IS CSA e.g. via training and awareness sessions, communication programs • Assist local organizations in developing and implementing their own unit or role specific Information Security training and awareness programs as appropriate.
Information Security Officer Council Member:
• Participate in the client FG Information Security Officers council.
• Consult with fellow Information Security Officers on related requirements and best practices • Assist in dissemination and sharing of IS awareness material • Maintain a relationship of trust and collaboration with other ISO professionals.
• Actively participate and contribute to common ISO initiatives.
– In depth knowledge of Information Security risk and industry best practices
– Working knowledge of the technical areas supported e.g. data warehouses, mainframes, networks, applications etc (at the enterprise level)
– Working knowledge of client’s  Operating Group businesses, or equivalent knowledge from other financial institutions
– Working knowledge of client’s Corporate Policies, Standards, and operating procedures relating to information security risk
– Information Security certification is encouraged e.g. CISSP, CISSLP, GIAC etc., but not mandatory. Experience equivalency is also acceptable.
Specialization in any of the following areas is highly desirable:
– Mobile application security or mobile device security
– Desktop Security
– Software security (e.g. defensive programming, source code analysis, application penetration testing)
– Database security (e.g. secure database configuration)
– Network security (e.g. firewall management, network zone policies)
– Consulting
– Advanced analytic skills
– Highly developed communication skills, both verbal and written
– Strong relationship management skills
– Problem solving
– Negotiation/mediation
– Project management
– Team player
– Well mannered, well spoken

Please send resumes to

Position Type Contract
Application Deadline April 30, 2017
Experience Required 5+ years
Job Duration 6 months
Education Required Designation