External Events June 2022 Update

OrganizationEventDateNote
IBMHow To Recover Production Volumes In Hours — Not Days Or WeeksJune 15th 2022Virtual, Free
iSMGISMG Fraud SummitJune 16th 2022Hybrid, Hybrid
ASISHow Financial Services Can Prepare for and Mitigate “Phygital” Attacks Against Critical InfrastructureJune 16th 2022Virtual, Free
RH-ISAC2022 RH-ISAC Emerging Technology ShowcaseJune 29th-30th 2022Virtual, Free
UK Public SectorPSE365: Public Sector Cyber Security Virtual EventJuly 14th 2022Virtual, Free
(ISC)
² Central Florida
A Day in the Life of a CISOJuly 14th 2022Virtual, Free
Carnegie Mellon UniversityDevSecOps Days 2022July 27th 2022Virtual, Free

June 10th, 2022 meeting

DATE:June 10th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Value Assurance: A Novel Approach to Information Security Programs in Organizations
PRESENTER: Sabino Marquez
RECORDING: 

ABSTRACT

The evolution of Information Security from a technical sub-discipline of IT to a strategic enabler of stakeholder value continues unabated. Join Sabino as he discusses innovations in Information Security management and outlines a novel program that places InfoSec squarely “in the business” where it can directly influence the value conversation. Value Assurance is a management strategy which reframes the Information Security function as a strategic investment that enables the Revenue and Go-to-Market strategies and can drive higher valuations at equity events. By aligning the assurance mandate to value and communicating assurance wins in revenue terms, assurance leaders can lead from behind to help accelerate revenue velocity, enable market differentiation, materially increase stakeholder trust, and ultimately help to boost valuation.

BIOGRAPHY

Sabino is an experienced assurance leader who empowers organizations through the strategic governance of their Information Security and Value Assurance programs. A natural entrepreneur and storyteller, Sabino brings over 20 years of experience in the B2B SaaS and Retail Banking sectors to help organizations create and defend ultimate value for their stakeholders. You can learn more about Sabino and his approach to leading the assurance practice here and here.

May 13th, 2022 meeting

DATE:May 13th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Disinformation and Fake News – Democracy Dies in Lies
PRESENTER: Stephen Carras
RECORDING: 

ABSTRACT

January 6th was a wake-up call for democracies and ordinary citizens around the world; fake news isn’t just some meme on social media that your annoying cousin shares to everyone, it almost brought the world’s largest democracy to its knees. While the media and ordinary citizens talk about fake news and those who perpetrate its spread, not as many know its history, and how nation states like Russia use it to influence unwitting pawns around the world. More importantly, how do we as societies (both Canada, the United States, and other nations) proactively and successfully engage with people who believe in these conspiracies and bring them back to normal views and beliefs to prevent future acts of domestic extremism from occurring.

BIOGRAPHY

Stephen is an American living in the Seattle / Bellevue area working as an Engineer, Cybersecurity at T-Mobile. He holds degrees in Security and Risk Analysis – Information and Cybersecurity, and Business with Minors in Finance and Renewable Energy from Penn State. Currently he is also pursuing a Masters in Cybersecurity Analytics and Operations from Penn State while working at T-Mobile. While he is relatively new to the world of cybersecurity, he has worked at other companies in the clean technology and finance industries before making the transition to cybersecurity. In his free time he enjoys learning new technologies, investing, and drinking Starbucks Frappuccinos.

External Events April 2022 Update

OrganizationEventDateNote
ScytheUniCon 2022April 8th 2022Virtual, Free
AttackIQPurple Hats Conference 2022April 21st 2022Virtual, Free
MARSBSides Vancouver 2022May 2nd-3rd 2022Virtual, $
BC GovernmentBC Security DayMay 10th 2022Virtual, Free
MicrosoftMicrosoft Security SummitMay 12th 2022Virtual, Free
BSides SeattleBSides Seattle 2022May 14th-15th 2022In Person, $
CanSecWestCanSecWest 2022May 18th-20th 2022Hybrid, $
Splunk.conf22June 14th-15thHybrid, Hybrid
SMGFraud SummitJune 16thVirtual, Free
MicrosoftVirtual Security & Compliance Summit

April 8th, 2022 meeting

DATE:April 8th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Phishing, are you ready for the next small or big threat?
PRESENTER: Miles Walker
RECORDING: 

ABSTRACT

With phishing attack crimes rising 600% since covid hit, protecting against it is one of the biggest issues facing the tech world today. Miles is eager to arm you with the knowledge of how to safeguard your business from phishing where 90% of cyber crimes start and give you some real world insights and practical information to better protect you and your business.

BIOGRAPHY

Miles Walker is the Channel Development Manager of Graphus.ai, one of Kaseya’s newest acquisitions. Miles joins the team after 15 years in Sales/Marketing and Account Management in London and Toronto. He is now based in Vancouver where his professional career started in Radio @ 104.9 XFM after studying Marketing/Sales and International Business at Capilano University. When Miles is not playing basketball, travelling, sailing or collecting street art he is evangelizing all things cyber security through his LinkedIn videos, events and of course virtually!

March 11th, 2022 meeting

DATE:March 11th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Consumer Privacy is too Complicated for Consumers
PRESENTER: Kevin Murphy (CISM, CGEIT, CISSP)
RECORDING: 

ABSTRACT

The average consumer really has no idea what personal information they are sharing online and how companies (and governments) track their online behaviour. How did we get here? Come join us as we review what consumers can do to “sort of” protect their personal information online.

BIOGRAPHY

Kevin was the vice president of cybersecurity operations and governance at IOActive.com. He is a retired U.S. Air Force intelligence officer and the former director of Windows security architecture at Microsoft. He has over 25 years of experience in threat intelligence and information security and holds the CISM, CISSP and CGEIT security certifications.

February 11th, 2022 meeting

DATE:February 11th, 2022
TIME:2:00pm to 4:00pm (PST)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:7 Mindset Shifts for Success in the Digital World
PRESENTER: Dr. Linda Miller
RECORDING: Link to recorded session

ABSTRACT

Who knew that going digital would end up enabling a more human world. Now that we’re on the brink of international standards for equity and inclusion, sustainable practices and full transparency, how should corporations and businesses position themselves for success and avoid the dangers of a hyper-enabled population? The answer: think about what you would have done 20 years ago, and do the exact opposite.


This talk explores the 7 keys to not just surviving but thriving in a world of hyper-connectedness and constant radical change.


Outline:
Cast off Industrial Age practices and thinking
Relocate certainty, trust, and truth
Imbue meaning and purpose at all levels
Build change intelligence as a capability
Lead ‘transformationally’ day to day
Seek the breakdown then go for the breakthrough
Co-create the future

BIOGRAPHY

Dr. Linda Miller has made a career of transformative change. She has been on leading edge implementations of most major business technologies since 1978.

After a 20-year career in information technology, Dr. Miller sought to humanize how technology was implemented in public and private corporations. Her pursuit led to a PhD in spiritual psychology, post graduate work in executive coaching, and multiple certifications in running successful strategic change initiatives.

Her range of experience spans government to multi-nationals, IT governance practices to corporate restructures to consortiums. Her clients include insurance companies, banking institutions, municipal and provincial governments, mobility technology providers, and law firms.

In 2008 Dr. Miller saw the need for new business tools, techniques, and measurement models that equip leaders and teams to thrive in the high speed, high complexity and highly ambiguous contexts that have become the norm.

Over 7 years of masters and doctoral research, she developed a framework of methods and practices that enable corporations to be successful in technology driven radical change and build the capability to continuously transform. Her courses, advisory services, and published works has helped transforming organizations across Canada and around the world.

Find out more about Dr. Miller and her company at www.iMindTransformation.com

January 14th, 2022 meeting

DATE:January 14th, 2022
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Security Awareness Lessons from Dr. Bonnie
PRESENTER: Rob Slade
RECORDING: Link to recorded session

ABSTRACT


Dr. Bonnie Henry, as BC’s Chief Medical Health Officer, has demonstrably saved tens of thousands of lives over the course of the pandemic. With the regular CoVID press briefings, she has also provided a MasterClass in effective communication of complex technical subjects. This reference provides real-world examples of the most significant points in designing and implementing an effective security awareness program. It also conclusively proves, with mathematical certainty, the importance of a security awareness training program.

BIOGRAPHY

Rob Slade had his booster shot on Boxing Day, and, besides, as an old antivirus researcher, Rob knows that there is no conclusive evidence that Omicron can transmit over Zoom, so you are probably safe to attend this (virtual) meeting. On the other hand, having lost Gloria, Rob’s emotional stability is probably worse than ever, so attend at your own risk. More information than anyone would want to know about Rob is available at http://fibrecookery.blogspot.com/

December 10th, 2021 meeting

DATE:December 10th, 2021
TIME:2:00pm to 4:30pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Operational Threat Hunting for the Enterprise
PRESENTER: Neumann Lim (Deloitte)
RECORDING:Link to recorded session

ABSTRACT


According to IBM’s 2020 Cost of a Data Breach Report, security automation solutions — including AI, analytics and orchestration — and incident response (IR) preparedness, including formation of IR teams and testing IR plans, showed the greatest reduction in data breach costs. Threat hunting is a key component in security operations and incident response preparedness. This talk will guide you through the foundations of beginning to operationalize threat hunting into your enterprise.

BIOGRAPHY

Neumann Lim is a senior manager at Deloitte where he leads the development of the services, strategies and methodologies on cyber detection and incident response. Prior to this role, Neumann spent several years working with large enterprises and governments specializing in incident response. With more than 14 years of infosec experience, he has delivered numerous cyber risk assessments, coordinated national incident responses across multiple industries. Neumann has been invited to share his thought leadership at many security conferences such as Grayhat BlueTeam Conf, DefCon Village, HTCIA Canada, Toronto CISO Summit and CCTX.

November 12th, 2021 meeting

DATE:November 12th, 2021
TIME:2:00pm to 4:30pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Searching for the Balance: Infosec at a Different Angle
PRESENTER:Kovan Mohammed Ameen
RECORDING:Link to recorded session

ABSTRACT

Can we ever catch up to all the chaos? How far behind are we?


When do we get to rest? Will it get worse before it gets better? Will there ever be a point in time where stability is a possibility?… These and many other questions alike have a familiar tone, uncertainty. And I can say with confidence that most, if not all of us, have had questions like that at some point in our lives, regardless of the reasons behind them.
In this talk, we’ll be asking those same questions about information security, with the hopes of clearing the path to find the answers we need, whether that’s going back to the drawing board or evolving to adapt our current solutions in a new way.


Side note: There’s hope, but we need to act fast.

BIOGRAPHY

Senior Information Systems Security student at Southern Alberta Institute of Technology (SAIT). I developed a passion for hacking at just 14 years of age, at first, I wanted to become a pen tester but after pursuing post-secondary education in infosec, I found myself enjoying the educational, analytical, and research side of infosec more. My goal is to have a foundation that creates large-scale cooperation between different organizations and promotes new ways of thinking when it comes to finding long-term solutions to problems the industry faces.

October 8th, 2021 meeting

DATE:October 8th, 2021
TIME:2:00pm to 4:30pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Shoulders of InfoSec Project
PRESENTER: Jack Daniel
RECORDING:Link to recorded presentation

Please note a portion of this meeting will be dedicated to the AGM.

ABSTRACT

When frustrated we may ask ourselves “where are we going and why are we in this handbasket?”, but we rarely have the time to really reflect on where we’re going as an industry and how we got here─and who led the way. The people and ideas which were the foundations of information security are not ancient history, yet few of us know much about them. We are too busy running to keep up and never have time to look back. In this talk we will meet some of the people who founded and advanced our field, and hear some of their stories.

BIOGRAPHY

Jack Daniel is the Community Advocate for Tenable, is a co-founder of Security BSides, a community builder, storyteller, technologist, historian, mentor, and security professional. He has over 20 years’ experience in network and system administration and security, and has worked in a variety of practitioner and management positions. Jack is a technology community activist, a podcaster, and a frequent speaker at technology and security events. Jack used to put letters after his name but he doesn’t anymore; some fell off, others were pushed.

September 10th, 2021 meeting

DATE:September 10th, 2021
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Measuring how well you are managing Information Security
PRESENTER:Walter B. Williams (CISSP, SSCP)
RECORDING:Link to recorded presentation

ABSTRACT

We create controls to manage the risk of a compromise of availability, integrity, confidentiality, privacy, control, authenticity, and utility to the organization for which we are responsible for. To understand if the controls are effective, you have to measure their performance against goals established for each control against the risk tolerance of the organization. This sounds good on paper, but is one of the hardest things to get right in the management of an information security program. We’ll examine what NIST, CIS, and ISO has to say regarding the measurement of our controls, and how to construct metrics. We’ll look at how to identify the applicable controls per each risk to your organization. We’ll construct metrics for completeness of implementation, for effectiveness, and for adverse impact to your organization for those controls and look at ways to map these back to the risks your organization is managing.

BIOGRAPHY

Walter has served as an infrastructure and security architect at firms as diverse as GTE Internetworking, State Street Corp, Teradyne, The Commerce Group and EMC. He has since moved to security leadership, where he’d served as at IdentityTruth, Passkey, Lattice Engines, and Monotype. He is an outspoken proponent of design before build, an advocate of frameworks and standards, and has spoken at Security B-Sides, Source Boston, Boston Application Security Conference, Rochester Security Summit, Wall of Sheep Village within DefCon, RiskSec Toronto and other venues . His articles on Security and Service Oriented Architecture have appeared in the Information Security Management Handbook, and he has a book with CRC press on the same topic. He has a book on How to Create an Information Security Program from Scratch which will be available for purchase on September 15. He sat on the board of directors for the New England ISSA chapter and was a member of the program committee for Metricons 8 and 10. He has a masters degree in Anthropology from Hunter College.

Job posting – Manager of Operations

The Ministry of Citizens’ Services of the BC Provincial Government is looking for a Manager of Operations.

Ministry of Citizens’ Services
Victoria

Manager of Operations
$ 77,700.20 – $ 110,000.05 annually

The Manager of Operations will oversee and manage the Access and Directory Management Services (ADMS) teams that provide the day-to-day operational support for the suite of Access and Directory Management service offerings that are used across the BC Government. This position will be responsible for leading teams of IT professionals within the unit that support identity, access, security, stability, availability, capacity, change and performance management services for ADMS’s systems and technologies.

The BC Public Service is committed to creating a diverse workplace to represent the population we serve and to better meet the needs of our citizens. Consider joining their team and being part of an innovative, inclusive and rewarding workplace.

The Indigenous Applicant Advisory Service is available to applicants that self-identify as Indigenous (First Nations, status or non-status, Métis, or Inuit) seeking work or already employed in the BC Public Service. For advice and guidance on applying and/or preparing for an interview for this opportunity, we invite applicants to connect with the Indigenous Applicant Advisor Amanda by email: IndigenousApplicants@gov.bc.ca or by phone: 778-698-1336.

Qualifications for this role include:

  • Certificate or higher in the computer science field OR an equivalent combination of education, training and experience may be considered.
  • Minimum two (2) years’ experience supervising technical staff. Preference may be given to applicants with experience supervising staff in a union environment.
  • Three (3) years’ experience in technical operations in a complex application environment, supporting a large, diverse, corporate business enterprise with critical system needs. Preference may be given to more years of experience.
  • Three (3) years’ experience leading and resolving complex staff and/or client issues. Preference may be given to more years of experience.
  • Minimum One (1) year experience delivering or supporting Identity and Access services.
  • Minimum One (1) year experience negotiating and managing information technology contracts.
  • Minimum One (1) year experience in a leadership role that ensure teams provide expert customer service support within a shared service model.
  • Preference may be given to applicants with:
    • Experience supporting technical application environments related to Identity and Access.
    • Experience supporting Identity and Access service offerings related to any of the following: MS Azure, MS Azure AD, SiteMinder, MFA, Azure Conditional Access, Keycloak.
    • Experience managing information technology contracts within a Government environment.
    • Diploma or higher in the computer science field.

For more information and to apply online by September 14, 2021, please go to:
https://bcpublicservice.hua.hrsmart.com/hr/ats/Posting/view/79300

August 13th, 2021 meeting

DATE:August 13th, 2021
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:The Role of Physical Security in Cyber Security
PRESENTER: Gerry Sieracki (CISSP, Director of Public Relations (ISC)² San Diego Chapter, TLO, ILO)
RECORDING: Link to recorded presentation

ABSTRACT

When people think of Cyber Security the first thing most people think of are items like ransomware, patching, vulnerabilities, and hacking. Often overlooked is the most basic, fundamental level of protection, physical. In today’s world we can no longer separate the requirements for physical and cyber security. They are both reliant on one another and you cannot have one without the other. This presentation will cover some thoughts on Physical Security, how it relates to Cyber Security, and some lived through examples of incidents I’ve encountered on the job. The goal is to spark some thought and conversation on Physical Security and how it relates to Cyber Security.

BIOGRAPHY

Gerry is a seasoned IT veteran with almost 25 years of progressively responsible work in IT. He currently works as a Network Administrator in the Critical Infrastructure Water Sector focusing on networking and cybersecurity. He has been the Project Lead for several major networking (LAN/WAN) and infrastructure upgrades. Gerry works closely with external agencies such as the FBI, DHS and the SD-LECC on cybersecurity issues.

Gerry earned his CISSP in May 2015. He is a member of Infragard, MS-ISAC (Multi State Information Sharing and Analysis Center), a TLO (Terror Liaison Officer), an ILO (Infrastructure Liaison Officer), and member of the Cyberhood Watch Water and Power Sector – Los Angeles/San Diego. Gerry is trained in the National Incident Management System (NIMS) and has additional training on physical security for Critical Infrastructure.

July 9th, 2021 meeting

DATE:July 9th, 2021
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC:Overview of the Canadian Supply Chain Security Landscape
PRESENTER:Peter Hillier, CD, CISSP
RECORDING:Link to recorded presentation

ABSTRACT

Of the many cybersecurity challenges facing practitioners today, the very high risk Supply Chain security domain is among the most significant. Join us on July 9th as Peter Hillier maps out those challenges, asks why our Government is seemingly ignoring them and provides recommendations for both government and security practitioners alike to address a systems security engineered approach to the problem.

BIOGRAPHY

Peter Hillier served 20 years in the Intelligence and Security areas of the Canadian Armed Forces. He has spent over two decades dedicated to the evolution of the IT Security profession either through creating new services, writing, speaking, and participating in standards development. He is also a longtime professional mentor and Veterans advocate. He currently works under Hillier Information Protection Solutions Inc. and also provides Systems Security Engineering services, training, and R&D through SSEng Group Inc.

Job posting – Senior Security Analyst

The Public Guardian and Trustee of British Columbia (PGT) of the BC Provincial Government is looking for a Senior Security Analyst.

BC Public Service
Public Guardian and Trustee
Vancouver

Senior Security Analyst
$72,724.97 – $83,014.85 annually plus 9.9% Temporary Market Adjustment

The Public Guardian and Trustee of British Columbia (PGT) is committed and dedicated to a mission, vision and mandate that is to protect the legal, financial and personal and health care interests of adults who require assistance in decision making, to protect the legal and financial interests of children and to administer the estates of deceased and missing persons. Employees at the PGT provide quality service in a respectful work environment that demands accountability and integrity.

The Senior Security Analyst is one of several professional and talented IT professionals that maintain, enhance and protect the technology infrastructure for the PGT. Information and Technology Services is responsible for providing all technology, network, hardware, software, disaster recovery capabilities and support services independent of all government central agencies. The Senior Security Analyst is responsible for keeping the company’s security systems up to date and creating documentation and planning for all security-related activities and information.

The BC Public Service is an award-winning employer and offers employees competitive benefits, amazing learning opportunities and a chance to engage in rewarding work with exciting career development opportunities. For more information, please see the webpage titled “What The BC Public Service Offers”.

The BC Public Service is committed to creating a diverse workplace to represent the population we serve and to better meet the needs of our citizens. Consider joining their team and being part of an innovative, inclusive and rewarding workplace.

The Indigenous Applicant Advisory Service is available to applicants that self-identify as Indigenous (First Nations, status or non-status, Métis, or Inuit) seeking work or already employed in the BC Public Service. For advice and guidance on applying and/or preparing for an interview for this opportunity, we invite applicants to connect with the Indigenous Applicant Advisor Amanda by email: IndigenousApplicants@gov.bc.ca or by phone: 778-698-1336.

Qualifications for this role include:

  • Degree, diploma, certification or equivalent in the computer science field.
  • An equivalent combination of education and experience/training may be considered.
  • Professional designation as a Certified Information Systems Security Professional or Certified Information Security Manager, or equivalent.
  • Experience in a Microsoft environment with a security focus
  • Experience with vulnerability and penetration testing
  • Experience with risk assessment, analysis and development of risk mitigation strategies
  • Experience with risk and security policy development
  • Experience with maintaining a corporate IT risk register
  • Experience with security assessment of server and desktop products
  • Experience with security incident response and planning
  • Experience with security awareness training

For more information and to apply online by July 18, 2021, please go to: https://bcpublicservice.hua.hrsmart.com/hr/ats/Posting/view/77188

Job posting – Senior Security Analyst

The Ministry of Citizens’ Services of the BC Provincial Government is looking for a Senior Security Analyst for the BCDevExchange organization.

Ministry of Citizens’ Services
Multiple Locations

Senior Security Analyst $72,724.97 $83,014.85 annually plus 9.9% Temporary Market Adjustment

This is a virtual position that can be performed from any location in BC.

The BCDevExchange organization embraces experimentation, innovation and empowerment. By adopting the principles, values and practices of the BCDevExchange, partner government entities adapt their typical ways of working to better align with leading practice amongst technology companies and digital agencies. Our work centers around the Exchange Lab where we host digital delivery teams working to solve priority public challenges. Digital Delivery Teams learn and improve their product with direct feedback from users every few weeks and deliver substantial value within a year.

The Senior Security Analyst is part of a cross-functional team that is responsible for the support of DevOps Containerized Platforms, DevSecOps framework and service adoption in the government. This role provides expert level information security advice and monitoring for on-prem and cloud-based platforms as your primary persona, while creating information security context for site reliability purposes, changing operational cultures and supporting DevOps teams. This position requires big-picture thinking, strong knowledge of government administration, a broad and open view of the IM/IT environment, strong experience with information security frameworks and methodologies and a dedicated commitment to improving security posture.

The BC Public Service is an award-winning employer and offers employees competitive benefits, amazing learning opportunities and a chance to engage in rewarding work with exciting career development opportunities. For more information, please see the webpage titled “What The BC Public Service Offers”.

The BC Public Service is committed to creating a diverse workplace to represent the population we serve and to better meet the needs of our citizens. Consider joining their team and being part of an innovative, inclusive and rewarding workplace.

The Indigenous Applicant Advisory Service is available to applicants that self-identify as Indigenous (First Nations, status or non-status, Métis, or Inuit) seeking work or already employed in the BC Public Service. For advice and guidance on applying and/or preparing for an interview for this opportunity, we invite applicants to connect with the Indigenous Applicant Advisor Amanda by email: IndigenousApplicants@gov.bc.ca or by phone: 778-698-1336.

Qualifications for this role include:

  • Degree, diploma or certificate in Computer Science or related discipline or an equivalent combination of education, training and experience.
  • Experience conducting log review/monitoring.
  • Minimum 3 years’ experience identifying suspicious or malicious events.
  • Minimum 3 years’ experience using security monitoring tools, vulnerability scanning and conducting complex breach investigations.
  • Minimum 3 years’ experience conducting complex information security threat and risk assessments.

For more information and to apply online by July 5, 2021, please go to: https://bcpublicservice.hua.hrsmart.com/hr/ats/Posting/view/77456

Job posting — Senior Cyber Threat Analyst

Raymond James Ltd. is seeking a Senior Cyber Threat Analyst to work in their Burnaby office.

Responsibilities:

  • Mentors CTC analysts while contributing to the fulfillment of both the CTC’s mission and leadership’s vision;
  • Serves as a primary member of the Cyber Threat Center (CTC) who handles security events and incidents on a daily basis in a fast-paced environment;
  • Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process;
  • Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm;
  • Maintains situational awareness for cyber threats across the global firm and take action where necessary;
  • Daily responsibilities include, but are not limited to:
    • Countermeasure deployment across various technologies
    • Malware and exploit analysis
    • Intrusion monitoring and response
    • Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat
    • Continuing content development of threat detection and prevention systems
    • Data analysis and threat research
  • Maintains knowledge of security principles and best practices. Must remain current with emerging threats and trends;
  • Assists teams in various security and privacy risk mitigation efforts; including incident response;
  • Leads or participates in information security related projects or in managing strategy;
  • Conduct forensic investigations for HR, Legal, or incident response related activities;
  • Develop new forensic detective and investigative capabilities using current technical
  • solutions;
  • Work with various business units and technical disciplines in a security consultant role for cyber threats; and
  • Shares in a weekly on-call rotation and acts as an escalation point for managed security services and associates of Raymond James.

Experience and Skills:

  • B.Sc. in Computer Science, Computer Engineering, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or an equivalent combination of education, training and experience. Experience should include a minimum of two (2) years in conducting Cyber Network Defense and a minimum of three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics;
  • Preferred experience includes a minimum of four (4) years in conducting Cyber Network Defense, a minimum of three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics and four (4) years of experience with in-depth forensic and intrusion analysis;
  • Systems administrator experience in Linux, Unix, Windows or OSX operating systems;
  • Knowledge of networking and the common network protocols;
  • Demonstrated ability to create complex scripts, develop tools, or automate processes in PowerShell, Python or Bash;
  • One or more of the following certifications or the ability to obtain within 1 year:
    • OSCP – Offensive Security Certified Professional
    • OSCE – Offensive Security Certified Expert
    • GXPN – Exploit Researcher and Advanced Penetration Testing
    • GREM – GIAC Reverse Engineering Malware
    • GCFA – GIAC Certified Forensic Analyst
    • CCNP – Cisco Certified Network Professional
    • Knowledge of the following highly preferred:
  • Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis
    • Operating systems, such as Windows, Linux, or OSX
    • Forensic and analytical techniques
    • Networking and the common network protocols
    • Demonstrated ability to create complex scripts, develop tools, or automate processes
    • Demonstrated ability to perform static and dynamic malware analysis
    • Demonstrated ability to analyze large data sets and identify anomalies
    • Demonstrated ability to quickly create and deploy countermeasures under pressure
    • Familiarity with common infrastructure systems that can be used as enforcement points

Competencies:

  • Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions;
  • Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner that engages the audience and helps them understand and retain the message;
  • Exercising Judgment and Decision Making: Use effective approaches for choosing a course of action or developing appropriate solutions; recommend or take action that are consistent with available facts, constraints, and probable consequences;
  • Technical and Professional Knowledge: Demonstrate a satisfactory level of technical and professional skill, or knowledge, in position-related areas; remain current with developments and trends in areas of expertise;
  • Building Effective Relationships: Develop and use collaborative relationships to facilitate the accomplishment of work goals; and
  • Client Focus: Make internal and external clients, and their needs, a primary focus of actions; develop and sustain productive client relationships.

If you would like to join their team, please send a resume and covering letter, quoting the position and Job Posting # 21-191 by June 24, 2021 to:

Human Resources
Raymond James Ltd.,
2100 – 925 West Georgia Street
Vancouver BC V6C 3L2
Email: resumes@raymondjames.ca

Raymond James requires applicants to complete a background verification process prior to commencing employment, including but not limited to a credit and criminal record check.

Raymond James sincerely thanks all applicants who express an interest in this role: only those being directly considered will be contacted.

Raymond James recognizes the value of a diverse workforce and appreciates the unique skills and special contribution of each employee. They are committed to accessibility for candidates through all stages of the recruitment process. Should you require accommodation, please contact Human Resources via email at resumes@raymondjames.ca.

June 11th, 2021 meeting

DATE:June 11th, 2021
TIME:2:00pm to 4:00pm (PDT)
VENUE:Zoom Online meeting
RSVP Required – register at Zoom
TOPIC(S):Tear it Down and Start Over
PRESENTER(S):  Deb Radcliff

ABSTRACT

It’s time to cut our losses and replace our network computing model with something completely different.

As the tech industry pushes businesses into adopting their versions of digital transformation, the heart of all technology is still based on IP, which dates back to 1983. Trying to secure networks by adding layer after layer of security up and down the TCP/IP stack and down into the hardware layers is not working and will not scale. Even at the developer layer, where all this transformation is occurring, attackers are deep into their code repositories and loading malware through their build servers (such as in the SolarWinds Orion patch update that was introduced to 1800 downstream clients and infiltrated more than 100 high-level government intelligence and tech agencies in the US).

We need to figure out a new way to network. What do we replace IP with that is both more efficient and naturally secure (versus trusting the way IP is)? That should be the biggest question on everyone’s mind who’s working toward digital transformation.

Will AI come to the rescue or is it just another technology that can be used against us? What about Quantum networking? Can we move data faster than light more securely than IP transport? Can we somehow return ownership of data to the humans behind that data in the process?

In this session, Deb Radcliff raises provocative questions about future networking and access technologies. So be prepared to answer questions. For example, will we ever actually replace IP? Is AI truly autonomous? Would you take a human chip implant if it were the only means to access your data? If so, what would be your security requirements?

Radcliff will also tell stories of how she became the industry’s first beat reporter starting in 1996 after assisting Jon Littman with research for his best-selling book, “The Fugitive Game,” about hacker on the run, Kevin Mitnick. She will share her experiences and the many colorful characters she’s met from the days before we had cybercops and information security programs.

These characters and experiences are also fictionalized in book I of her cyberthriller series, Breaking Backbones: Information is power, which takes place in the near future (available at Amazon, her publisher (free shipping), and all booksellers). In it, hackers rise up against GlobeCom who takes over the world through human chip implants. She’s nearing completion of book II, “Information Should Be Free,” part of which delves into super smart AI and future networking—and that’s why she’ll be picking your brains around these tough subjects.

BIOGRAPHY

Deb Radcliff is an author, speaker and analyst with extensive background in cybersecurity and cybercrime reporting. In 1996, after researching a best-selling book about computer hacker, Kevin Mitnick authored by Jon Littman, she decided to make cybercrime a beat. At first, she relied on gray and white hat hackers to give her the scoop on hacking techniques and then she built relationships with newly-minted cyberagents and leaders at the FBI, several agencies within DoD, the Secret Service, CIA, NYPD and many other local and federal agencies. Her articles are cited in numerous research papers and college textbooks, and she’s won two Neal Awards for investigative reporting and was runner up for a third. She’s spoken at West Point, HOPE 2000 and other events, and is currently speaking regularly in online venues. She also stood up an Analyst Program at SANS Institute and ran it for 15 years until April 2020.

Today, as a cybersecurity analyst and author, she writes for CSO and manages her own blog OnlineCrimeBytes, runs the Shift Left Academy content program. In April 2021, Radcliff published her first cyberthriller book, Breaking Backbones: Information is Power. The book is part one in a three-part fictional series set in the not-too-distant future when a powerful entity called GlobeCom takes over the world through human chip implants and the hackers mount a coordinated defense to break GlobeCom’s network backbone.