Overview

Canada Revenue Agency CS-03 IT Specialist – IT Security (Open to general public) Temporary in Ottawa, ON

Canada Revenue Agency

Branch Ottawa ON CA

Position:
CS-03 IT Specialist – IT Security (Open to general public)
Location:
Ottawa, ON

Charities IT Modernization; Debt Management Case System; With these changes, security remains an ongoing concern for our IT system as our capabilities grow….

Are you interested in a rewarding career in information technology?

The Canada Revenue Agency is looking for enthusiastic IT professionals who are up for a new challenge. Come join our team! Be challenged and grow as an IT security specialist and help ensure an ongoing secure IT environment.

Who are we?

We are Canada’s tax and benefits administrator.

Every day, we contribute to the quality of life in Canada by delivering world-class tax and benefit services. We work hard to earn the confidence of Canadians and to make sure our services meet their needs.

Our information technology systems process over 21 million tax returns that are majority filed electronically during the tax filing season. In the 2014/2015 fiscal year, the CRA also issued 116 million benefit and credit payments worth close to $23 billion to over 12 million Canadians.

Did you know that the information technology space within the Canada Revenue Agency (CRA) is growing at a rapid rate and offers numerous opportunities for highly motivated IT professionals to be part of very exciting security enhancement IT activities?

Explore our opportunities.

The massive increases in the amount of digital data created every day, from the web, social media, sensors, and other sources has stimulated the development of new technologies in order to manage and analyze very large volumes of data, often data with an irregular structure. At the same time, the application of advanced analytic techniques has opened up opportunities to improve and/or develop new business processes.

With these changes, security remains an ongoing concern for our IT system as our capabilities grow.

If you are looking for a work environment that is challenging, that values team work, where you can work on emerging technologies within one of Canada’s largest IT organizations and where you are surrounded by highly motivated IT professionals, then look no further!

As part of one of Canada’s largest IT organizations you will have a solid career path and numerous opportunities. Join us today!

Key Duties

Building strategic relationships with our clients and ensuring business/IT alignment through a strong culture of collaboration and communication. The Information Technology Branch has partnered with its client branches on key strategic investment plan projects that will position both the Agency and the Government of Canada (GoC) for the future such as: Charities IT Modernization; Contact Centre Transformation; Enhancing Collection Strategies; Debt Management Case System; and International Tax Avoidance/Evasion initiatives.

As an IT Security Specialist, your daily activities will be comprised of some of the following activities:

  • researching, evaluating, analyzing, recommending and monitoring the implementation of information technology system safeguards;
  • conducting technical research and developing business cases, feasibility studies and long-term strategies;
  • planning, developing and delivering information technology security services;
  • developing, testing and implementing IT solutions and products;
  • analyzing potential or on-going cyber threats and responding to IT Security events/incidents;
  • writing and/or editing reports related to the cyber treat landscape for presentation to senior management and providing recommendations to senior management to remediate cyber threats in consultation with infrastructure platform owners;
  • representing IT security in technical working groups;
  • leading forensic analysis of devices and software;
  • developing, providing input to; promoting; and ensuring adherence to policies, procedures and standards in disciplines such as security, risk management, architecture, data management, and IT continuity planning;
  • consistently identifying and resolving problems;
  • providing mentoring/training and knowledge transfer;
  • developing, maintaining, and modifying technical information regarding standards, methodologies, technical processing environments, tools, techniques, best practices, procedures, hardware and software;
  • conducting vulnerability assessments (VA) or penetration testing;
  • conducting security evaluations in accordance with GC guidelines and standards (e.g. ITSG 33);
  • providing technical advice, demonstrations, and presentations to colleagues, clients, and management; and/or,
  • maintaining personal technical currency.

Staffing Requirements to apply

You must clearly demonstrate on your online application how you meet the essential staffing requirements to apply.
SCREENING FOR PREREQUISITES

Essential Education

To be eligible, candidates must meet the CRA’s CS Education Standard (Approved alternatives will be accepted);

****IMPORTANT – Mandatory document to provide (1/2)****

Please attach to your online application your proof of education (i.e. an electronic copy of your degree or diploma) showing that you meet the education requirement. In order for the staffing board to see your proof of education, you must choose one of the following two options:

  • Option 1: Upload your proof(s) of education under the “Education” section of your candidate profile.
  • Option 2: Upload your proof(s) of education to the “Documents” section in your profile AND directly attach it to Step 3 of your application. If you don’t click on the box next to the uploaded documents, the staffing board will not be able to see your proof(s) of education.

If your proof of education is not received by the closing date and time indicated on the notice of job opportunity, this may result in your application being rejected.

Essential Experience

Candidates will be selected for an interview based on how they demonstrate that they meet the following job-specific experiences. Candidates must thoroughly describe any and all applicable experiences related to each experience below and include job titles and dates of experience acquired.

For all streams, your application must clearly outline how you meet the following ESSENTIAL factors A and/or B:

A. Significant experience* in the field of Information Technology security specifically related to installation, configuration, tuning, and support of IT Security solutions (e.g. Public Key Infrastructure (PKI)) or products (e.g. firewall),

OR

B.Significant experience* in the field of Information Technology conducting research & analysis; synthesizing information and producing IT or information security reports and recommendations.

  • Significant experience is normally associated with the performance of these functions as part of the major job duties accomplished for a period of not less than 5 consecutive years.:

In addition to the above experience, candidates must meet at least one of the following stream’s experiences in each stream for which you are applying to be successfully screened into the process:

Stream 1 (IT Security Operations and Vulnerability Assessment):

  • Recent experience** in the monitoring, analysis and mitigation of cyber security threats and incidents; or
  • Recent experience** configuring and supporting Entrust PKI software products; or
  • Recent experience** developing, testing and implementing IT security solutions and products; or
  • Recent experience** conducting vulnerability assessments (VA), including application and database scanning, analyzing results, and authoring reports within a diverse (multi-platform) IT infrastructure.

Stream 2 (Risk Management):

  • Recent experience** in the application of IT Security risk management methodologies utilizing GC guidelines and standards such as ITSG-33, Harmonized Threat and Risk Assessment, Management of Information Technology Security (MITS); or
  • Recent experience** developing IT Security project proposals and work plans; establishing priorities; estimating resource requirements; identifying slippage, risk and alternative actions; monitoring and reporting.

Stream 3 (Security Systems Development):

  • Recent experience** installing, configuring, tuning and supporting Computer Associates – Single Sign-On (SiteMinder) and/or CA – Identity Manager; and/or CA – Directory Lightweight Directory Access Protocol; or
  • Recent experience** developing IT security detailed business requirements, concepts of operations, technical and business communication materials and Use Cases for IT security solutions for various audiences; or
  • Recent experience** developing communication materials aimed at senior executives, transforming complex technical concepts into presentations and training materials; and
  • Recent experience** managing IT security projects using industry recognised methodologies and frameworks, establishing project management framework and processes.

Stream 4 (Security Planning and Policy):

  • Recent experience** defining IT security policy instruments, guidelines and providing technical guidance on IT security related items; and
  • Recent experience** developing IT security detailed business requirements, technical and Use Cases for IT security solutions for various audiences; and
  • Recent experience** performing research and analysis from a minimal information set and presenting this information in concise documents such as issue papers and/or briefing notes.

** Recent experience is normally associated with the performance of these functions as part of the major job duties for a period of not less than 2 cumulative years within the last 5 years.

Asset requirements (Prerequisites stage)

We may use the asset staffing requirements to screen applications. Make sure you clearly show on your (application or candidate profile) how you meet them.

Stream 1 (IT Operations and Vulnerability Assessment):

  • Experience*** with theories/ principles/ techniques related to public-key cryptography and the security principles associated with operating and maintaining a trustworthy PKI; or
  • Experience*** in conducting vulnerability assessments (VA), including application and database scanning, analyzing results, and authoring reports within a diverse (multi-platform) IT infrastructure; or
  • Experience*** performing forensic analysis of devices and software; or
  • Experience*** performing penetration testing on computer applications and infrastructure; or
  • Experience*** in Information Technology security analysis; or
  • Experience*** in developing, testing and implementing IT security solutions and products; or
  • Experience*** completing secure source code reviews.

Stream 2 (Risk Management):

  • Experience*** providing technical advice, demonstrations, and presentations to colleagues, clients, and management.

Stream 3 (Security Systems Development):

  • Experience*** in supporting, developing, testing and implementing IT security solutions and products.

Stream 4: (Security Planning and Policy)•

  • Experience*** providing advice and presentations to colleagues, clients, and management as well as presenting security materials to senior levels of management; or
  • Experience*** applying ITSG-33 Security controls.

All streams:

  • Current standing as Certified Information Systems Security Professional (CISSP).

*** Experience may be further defined according to one or more of the following:

  • Complexity (difficulty level of tasks performed)
  • Variety (number or specific type of tasks performed)
  • Timeframe / timeline (period of time during which the experience took place)
  • Business Lines of job being staffed (Branch, Directorate, Division, Section and/or workload)

Languages Requirements

English essential, Bilingual Imperative BBB/BBB
Staffing requirements to be assessed/applied

Any essential staffing requirements indicated below will be assessed/applied at a later date. Any discretionary staffing requirements indicated below may be applied/assessed at a later date.
Essential assessment

  • Performance
  • Ability to communicate effectively orally (pass mark : 70%)
  • Ability to communicate effectively in writing (pass mark : 70%)
  • Ability to identify and resolve IT Security problems (pass mark : 70%)
  • Ability to work with other team members (pass mark : 70%)
  • Dependability (pass mark : 70%)
  • Judgment (pass mark : 70%)
  • Client focus (pass mark : 70%)
  • Information Technology Security knowledge (pass mark : 70%)
  • Values and ethics (pass mark : 70%)

Results from locally developed assessment tools are not portable to other staffing processes. Assessment results may be used for appointment.

Additional Staffing Requirements / Assets

  • Start date
  • Duration of appointment
  • Minimize business disruptions
  • Employment Equity
  • Budget consideration

Conditions of Employment

  • Security status: Reliability Status (Some positions may require a Reliability Plus or a Secret Status)
  • Willing and be able to work overtime, as required

How to apply

We will only accept online applications received by the closing date and time shown on this notice of job opportunity.

Candidates must submit their application by logging into their CRA candidate account at Canada Revenue Agency – Careers website (http://www.cra-arc.gc.ca/crrs/menu-eng.html).

NOTE: The onus is on the applicant to relate their qualifications to the experience requirements of this advertised position, in clear and precise detail. The information provided must enable the Staffing Board to understand the exact kind of position(s) occupied by the candidate, the period they occupied the position(s) and the tasks actually performed for each position. Only applicants who demonstrate that they meet the experience requirements for this advertised position will be considered further. Failure to provide sufficient information will result in those applicants being screened out.

****IMPORTANT – Mandatory document to provide (2/2)****

As part of the online application via the Canada Revenue Agency’s (CRA) careers portal, applicants must also submit:

  • A resume which includes dates (years and months), organizations and position titles of positions occupied over the last five years.

The resume may be used to validate the information provided in the application questionnaire.

Before proceeding with appointments from this staffing process, the manager will give priority for appointment to individuals with CRA preferred status.

Appointments made from this staffing process will be based on one or more of the staffing requirement(s) identified on this notice.
General information

For information on how to apply, communication during the staffing process, foreign credentials, employment equity, accommodations during assessment, security status or clearance, and our code and conflict of interest requirements refer to the general information page http://www.cra-arc.gc.ca/crrs/srch/tps-eng.html.

CRA employees are dedicated to serving in the public interest and have worked hard to earn the trust of Canadians. The Code of integrity and professional conduct and the Directive on conflict of interest, gifts and hospitality, and post-employment are important documents that outline the expected standards of conduct for CRA employees. We strongly recommend that you take the time to review these documents before you consider an employment opportunity with the CRA. Please note that a conflict of interest arises whenever an employee’s private interests and/or outside activities impair, or could be perceived to impair, their ability to make decisions with integrity, impartiality, honesty, and in the best interests of the CRA and the Government of Canada.

Before submitting an application, potential applicants are asked to carefully review the requirements of this job opportunity to determine if they are eligible to apply.

Applicants can view the status of their application by logging into their candidate profile on our Careers (http://www.cra-arc.gc.ca/crrs/menu-eng.html) site.

Pool

A pool of eligible candidates will be created for this staffing process.

This staffing process may be used to staff similar positions.

If it is impossible for you to apply online or you have technical difficulties submitting your online application, please contact the https://careers-carrieres.cra-arc.gc.ca/gol-ged/wcis/pub/cntctus.action CRA Job Opportunities Helpdesk before the closing date and time shown on the notice of job opportunity.

You can also call our general enquiries/reader service telephone lines at 1-800-571-7150 (bilingual service) and 1-800-465-7735 (TTY service for the deaf and those with a hearing disability).

Veterans Hiring Act (VHA)

The CRA is proud to support the Veterans Hiring Act. If you are a veteran, click here to find out more.
Appointment

Before proceeding with appointments from this staffing process, the manager will give priority for appointment to individuals with CRA preferred status.

Appointments made from this staffing process will be based on one or more of the staffing requirement(s) identified on this notice.

or proceed with Standard Application Form.

Employment Type: Temporary
Location: Ottawa, ON, CA
Posted on: 2017-10-29
Posted by: