Job: IT security analyst at GVA Partners

An exciting opportunity exists for a highly skilled IT Security Engineer to join a dynamic project team. The resource is responsible for the following

  • Perform procedural system maintenance on all computer systems.
  • Ensure all networks including but not limited to LAN, MAN, WAN, GAN meet business demand.
  • Troubleshoot system and network issues, diagnose and resolve hardware or software failures, and replace parts as needed.
  • Maintain all computer system workflows.
  • Maintain and update all computer networks.
  • Maintain and contribute to the development of the computer network.
  • Actively participate in the development, planning and implementation of advanced computer systems.

Other assigned tasks.


  • Lead cybersecurity initiatives in collaboration with the group cybersecurity team.
  • Design and implement security controls to protect and monitor events of information systems, business applications and data.
  • Lead the implementation of information security projects
  • Drive internal and external vulnerability assessment, penetration testing engagements, and manage results through resolution.
  • Respond to escalated security events and drive security incident response processes to ensure rapid resolution with minimal disruption.
  • Design, document and deploy secure infrastructure solutions to improve and evolve the company’s security posture to ensure the integrity, availability and confidentiality of all critical company data.
  • Provide expertise on security tools including but not limited to firewalls, web application firewalls, IDS/IDP, anti-malware software
  • Liaise with stakeholders in the operational implementation of security policies and best practices
  • Collaborate with the client-server team to ensure that technical plans are practical, controls are durable, and implementations are managed to minimize risk and negative impacts to servers, workstations, and client productivity users.
  • Implement infrastructure, configurations and processes to monitor security related events
  • Prevent data loss and service interruptions by researching new technologies that will effectively protect the corporate network.

Supervisory/Management Responsibilities:

  • Ensure compliance with cybersecurity plan/roadmap
  • Provide input to the company’s strategic plan on all initiatives to ensure security gaps/vulnerabilities are identified and addressed
  • Build and ensure credibility through strong relationships, value added operations and professionalism


  • Minimum of 5 years of experience in an area of ​​security specialization with experience working with others
  • Experience working in a large organization and preferably in the telecommunications industry
  • Solid experience as an engineer/architect in application security infrastructure and various network technologies to include devices such as firewalls, VPNs, intrusion/extrusion detection, vulnerability and risk assessment tools , encryption technologies, virus/worm/malware prevention, e-commerce and web application technologies, data loss prevention, whole-disk and device encryption solutions, two-factor authentication, common Windows platforms (desktop and server)
  • Experience with Microsoft, Solaris, Unix, Oracle and MS SQL
  • Work experience in the telecommunications industry
  • Network and/or network security management
  • Knowledge should be up to date with information security best practices and global trends
  • Knowledge of security best practices such as; defense in depth, least privilege, need to know, separation of duties, access controls, encryption
  • Management of identity, authorizations and authentication of user accounts.
  • Management of security incidents and events
  • Experience researching new or emerging technologies and processes that can be incorporated as solutions to recurring security issues


  • Penetration tests
  • Vulnerability lifecycle management
  • Advanced Security Incident Response
  • Systems audit, database security, firewall design, intrusion detection system administration
  • System level security enforcement, security audit and vulnerability management
  • Telecommunications, Network, Wireless and Internet Security

Click here to apply

Comments are closed.