Promoting security awareness and development.


Procom Consultants Group is currently seeking 2 Security Analysts for one of their clients.  It is an initial 1 year contract with a high likelihood for a multiple year extension.  Interested candidates can apply by contacting Kim Kozak at 604.632.1674.


Security Analyst Job Details

The Security Analysts will be expected to apply their advanced experience with network and application security, multi-tier security infrastructures, firewalls, intrusion detection systems (IDS), and whitelisting technology to identify and implement improvements on existing security processes, policies, standards, risk assessments, audits and documentation.

Consultants will assist with completing problem identification, system architecture definition, hardware/software specification and design, implementation, testing, training, and product deployment.

Some of the areas they’re focusing on are as follows and new projects are being released on a regular basis:

  • Intrusion detection and prevention

  • Greater access control for shared folders

  • Control of desktop application installations to an approved list

  • Anti-virus upgrades and enhancements

  • Through the Technology PMO, our Client is focused on improving Security in the areas of Network, Application and Data Protection, Identity and Authorization, and Compliance.

Security Analyst Requirements

  • Ability to analyze complex customer business and technical requirements and develop enterprise-scale solutions leveraging the project software or service offerings.

  • Ability to analyze complex issues for impact and alternative solutions, making logical decisions based on overall product objectives.

  • Ability to recognize project changes, identify risks and contingency plans, and work with Project Manager through change control process.

  • Ability to prioritize tasks and manage time efficiently. High level of self-initiative and self-motivation.

  • Ability to work with resources to estimate work and architect solutions.

  • Ability to provide innovative state-of-the-art security process solutions.

Security Analyst Responsibilities

  • Develop processes that analyze data and produce accurate, meaningful, easily interpreted results based on user requirements and business constraints

  • Collect, review and update documentation as necessary

  • Identify gaps and deficiencies in processes or documentation

  • Initiate and coordinate necessary change management processes to support project activities

  • Frequently report on all associated activities for project tracking purposes

  • Develop supporting reporting documentation required by various stakeholders

  • Work with security and privacy to ensure that solution/project policies and procedures are consistent with the company's policies and procedures.

  • Identify and communicate project issues and drive the resolution of design and delivery issues with the project delivery units

  • Handle unusually complex problems and provide highly innovative and creative solutions that will achieve quality and work process improvements.

  • Monitor and report on technical project milestones, risks and issues and identify strategies to minimize/resolve obstacles to successful project delivery

  • Conduct and facilitate technical project activities related to scope, schedule, resources, cost estimates and budgets, communications, risk, procurement and development of resulting project documentation

  • Regularly interface with appropriate stakeholders to build and maintain strong relationships and ensure the smooth transition of business solutions throughout the project lifecycle

  • Risk assessments, security threat and vulnerability analysis, and creating reports

  • Continuous contribution of best practices documentation and technical notes for internal and external distribution

Security Analyst Duration

1 year initial contract with the possibility of multiple year extensions

Security Analyst Location

Downtown Vancouver

Security Analyst Start Date

Ideally January 2015




This entry was posted in Industry, tagged Security and posted on December 20, 2014