Previous Job
Security Officer- TRA, CONOPS
Ref No.: 17-00277
Location: Ottawa, Ontario
TRM Technologies Inc is currently looking for IT Project Security Officer for one of our private sector clients. The position is one year term employment with 3 weeks vacation.  Not a contract but does have the ability to go full-time.

Job Summary:
Under the direction of Senior Manager, Support and Security Services, the IT Security Officer manages and improves information security including security awareness programs, policies, guidelines and standards and designs information security solutions. She/he performs vulnerability assessments, ongoing information risk assessments and audits to ensure that information systems are adequately protected. She/he monitors the network to detect security irregularities and investigate as warranted and monitors and measures overall information security practices across the different technologies and processes within the Organization.


Bachelor's degree in Computer Science, Computer Systems Engineering or a related field AND some years of experience IT security or in a related field
College diploma or certificate in Computer Science, Computer Systems Engineering or a related field AND several years of experience in IT security or a related field
A demonstrated equivalent combination of education, training and/or experience. This includes but is not limited to demonstrated military education, training or experience.


Of security concepts and their implementation on various platforms
Of security processes, procedures, best practices and policies
Of government security and technology laws and policies
Of network topologies and principles
Of challenges related to technological needs and their resolutions
Of security methodologies
Of technological mapping
Of security devices and tools


Working with PMO and writing/managing documents such as CONOPs (Concept of Operations), TRAs (Threat Risk Assessment), SOS (Statement of Sensitivity), SAR (Security Assessment Reports), RALs (Risk Acceptance Letters)
Documentation on SLA for recovery and SA&A PCI compliance
In installations and implementation of security solutions across various computing platforms and network infrastructure
In the management of both physical and logical information security systems
In technical documentation
In weighing business risks and suggesting appropriate information security measures
In writing IT security policies
In personnel administration
In using software for word processing, spreadsheets, presentations, databases, e-mail, and Internet browsing