Senior Analyst, Infrastructure Security
Vancouver (VHO)
Applications have closed
Teck Resources
Teck is Canada's largest diversified mining company and is committed to responsible development. It has major business units focused on copper, metallurgical coal, zinc, gold and energy. Shares are listed on the TSX under the symbols TECK.A and...
Reporting to the Lead – Identity of Infrastructure Security, the Infrastructure Security Analyst (“the Analyst”) is responsible for operating and optimizing Teck’s enterprise toolset to enable secure interaction with core infrastructure as it pertains to identity, authentication and device security. As these services integrate closely with other shared resources, the Analyst must maintain strong working relationships with neighbouring technology teams and external support providers. Maintaining secure infrastructure helps ensure that everyone goes home safe and healthy every day.
Dimension
- The Analyst will be focused on key toolsets within the sphere of infrastructure security, to not only ensure that these tools remain operational, but also work to optimize and enhance the use of these tools at Teck to streamline our operational support across teams, and to drive self-service to our users wherever possible.
- Identity. The management of systems that support Teck’s identity infrastructure: Microsoft Identity Manager, Azure Active Directory, Microsoft Privileged Identity Manager, CyberArk, Non-Employee Administration, Azure Identity Governance. Performing the ongoing maintenance of these systems and working to develop solutions in the following Identity streams: Joiner/Mover/Leaver scenarios, access request management, identity governance, privileged access, session management.
- Authentication. The Analyst will maintain and support toolsets to allow secure authentication to Teck’s resources from any device (CyberArk, DUO, Azure Conditional Access).
- Device Security and Hygiene. Support and maintain the processes and tools around provisioning and maintaining secure clients – mobile or desktop - to all Teck users. (InTune, JAMF)
- Vulnerability Management: contribute to processes and systems that enforce our Vulnerability Management policy: SCCM, ServiceNow, Group Policy; performing remediation where appropriate and working with other teams across CI classes to ensure remediation is completed per policy.
Responsibilities
- Provide support to the platforms detailed in the Dimensions section in accordance with Service Level Agreements for these systems
- Participate in enhancement and project work to elevate and improve the use of these systems at Teck
- Constantly explore areas of improvement within our infrastructure and strongly advocate for them
- Maintain strong working relationships with neighbouring support teams
- Maintain current knowledge of Infrastructure Security concepts and products to ensure our solutions remain current, relevant and supportable.
- Triage and diagnose more complex situations (Tier 3 support) with supported technologies listed in the Dimensions section
Qualifications
- Background in Information Systems and understanding of technology concepts.
- Proficient in basic information security concepts and technologies
- 2-3 years’ experience with Identity & Access Management
- Ability to interact professionally with a diverse group, including managers, and subject matter experts
- Advanced scripting abilities using PowerShell or equivalent
- Basic ability navigating in SQL and SQL scripting
- Experience in or familiarity with the technologies listed in the “Dimensions” section
- Experience with ServiceNow
- Understand the trends and technology evolutions as it relates to cloud technology
- Self-motivated and ability to manage competing priorities in order to get the job done
- Strong technical, analytic and problem solving abilities
- Strong verbal and written communication skills at both technical and business level
- A working knowledge of process automation, software systems modeling, project management, and knowledge management
- Proficient Spanish, both written and spoken, is considered an asset.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Automation Azure Cloud Cyberark Governance Jamf PowerShell Scripting SQL Vulnerability management
Region:
North America
Country:
Canada
Job stats:
7
1
0
Category:
Analyst Jobs
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Information Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Sr. Security Engineer jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open ISO 27001-related jobs
- Open Clearance-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open CI/CD-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs