Tasks
- Attend daily monitoring meetings and provide recommendations on resolving current threats and recommended detections to enforce security controls.
- Perform Daily Cloud Security Analysts tasks.
- Interact with users, partners, and Information System Security Officers (ISSOs) to resolve or mitigate security vulnerabilities or threats and improve security controls.
- Identify and analyze security threats or vulnerabilities within DND’s Azure and M365 environments.
- Review, analyze, and document all security threats using various tools (Defender XDR, Defender for Cloud, Defender MDE, Azure Sentinel).
- Create and document monitoring use cases to meet ITSG-33 security controls in common repositories.
- Monitor positional email inbox and respond to user queries.
- Evaluate and identify gaps in cloud security services in the areas of identity and access management, network security, endpoint security, data security, network security, and threat monitoring and detection.
- Attend partner meetings to review, analyze, and improve cloud security services, policies, security controls, and processes.
- Brief management on the status or outcomes of tasks and analyses as required.
Deliverables
- Weekly report identifying top security threats, vulnerabilities, and/or security gaps and compensating security controls.
- *Please provide 2 references in your proposals (if required above) who can validate that the information submitted in response to the solicitation is accurate.
Additional mandatory criteria
- M1: Must clearly demonstrate 2 years of experience within the past 4 years of working in a highly complex, large scale, and federated IT environment supporting over 50,000 employees.
- M2: Must have a post-secondary education in information technology (IT) or IT security.
- R1: Clearly demonstrate 2 years of experience within the past 4 years of advanced knowledge and skills in identifying security gaps, threats, and vulnerabilities using Azure Sentinel, Defender for Cloud, Defender XDR, and Defender MDE.
- R2: Must clearly demonstrate at least 1 year (full 12 months) of experience in the last 3 years in the identification, assessment, and remediation of vulnerabilities on Azure endpoints.
- R3: Must clearly demonstrate 1 year (full 12 months) of experience in the last 3 years leveraging threat intelligence feeds for proactive risk identification and mitigation.
- R4: Must clearly demonstrate 1 year (full 12 months) of experience in the last 3 years using the MITRE ATT&CK framework.
- R5: Demonstrated experience delivering cybersecurity services – including risk and threat detection and monitoring – within a Canadian security or intelligence agency (e.g. DND/CAF, CSIS, CSE) supporting corporate and operational (military) IT environments.