Technology Architect
CSI Consulting - Toronto, ON

This job posting is no longer available on Indeed. Find similar jobs:Technology Architect jobs - CSI Consulting jobs


I viewed your resume online and have an excellent job opportunity to offer to you.

Please read the job description below and if it interests you, please send me your resume along with your minimum annual salary expectations at Deepti @ or call me at 4163646376 ext 2031

If you are not interested but have anyone that might be interested, please feel free to send me the contact details.

My client is OLG. They are looking for a Technology Architect. It is a permanent full time position. Location is Toronto, ON.
Job description

The Technology Specialist supports the design, implementation and continuous improvement of Information Security processes and controls that monitor and mitigate risk to OLG information assets. The position provides expert advice and guidance regarding security policy, best practice and standards to those involved in planning, developing, maintenance, protection and use of the OLG IT infrastructure and business applications. The positions supports the development and implementation of an Information Security architecture, roadmaps, strategic planning, and related technologies as required to align OLG Information Security goals with the Enterprise Architecture and Business goals.

Support the Security Architect, Security Manager, and the Information Security Office in general

Provide 24x7 3rd tier expert support to lines of business and IT support and management teams regarding unauthorized/inappropriate activity and anomalous system behaviour.

Lead remediation and resolution of security related incidents (CSIRT – computer security incident response team) by providing expert advice to ensure understanding of the issue and facilitating actions for future mitigation

Participate in the infrastructure change assessment and approval processes to mitigate unauthorized security config change which could result in incident

Maintain a broad understanding of other (non security) technology areas, architectural domains, and supported business processes

Maintain an overall view / perspective of current relevant Security technologies / processes / landscape

Contribute to the development of the Information Security architecture, roadmaps, and strategic planning exercises.

Research, maintain, and promote awareness of existing and emerging IT trends and directions, especially as related to security technologies

Liaise and collaborate with IT and Business partners, Internal/External Auditors, regulators (AGCO) etc to understand business risk provide expert knowledge regarding information security best practice, standards, policy and provide mitigation strategies that meet business and security objectives.

Identify threats to OLG information security assets and develop/manage research-based remediation and mitigation strategies/actions.

Support the processes/procedures and tactical remediation/mitigation activities regarding Security technologies, ie, Identity Management (IDM / UAM), Security Risk Management, Vulnerability Management, Security Incident Management

Contribute to meeting SLAs for Operational IT Security Services

Support the development/review of OLG IT Security policy, standards, as part of projects or initiatives, and / or to codify existing or planned Security products / practices.

Support the audit function to validate and appropriately address findings.

Monitoring and ensuring compliance to Security policy, process and procedure

Maintain working relationships with executors of security services and practices, ie ITSC / access management, IDS / security builds

Maintain working relationships and promote understanding of security best practice, policy, process, procedure with IT and Business partners
Desired Skills and Experience
A minimum post-secondary education with an IT or Engineering discipline and/or courses or designations related to specific IT domains (application, information, platform, networks, security) and specific technology management methods, techniques and tools

Five (5) or more years’ experience in an information technology field with experience in at least one or more of the IT domains (preferably related to an information security discipline), leading and/or having an active part in design, build and implementation of business application and technology situations.

Expert knowledge in at least one of the following IT domains (application, information, platform, networks, security), with a focus on the analysis and design of Risk Management (Information Security / Service Continuity / Disaster Recovery) components.

  • system analysis, design, programming (java, c, c++, j2ee), data modeling, physical system and database design, data warehousing
  • operating system skills (Windows, AIX, OpenVMS, Unix, Linux, VM technologies) and replication technologies
  • database skills (DB2, SQL, Sybase, Oracle) and replication technologies
  • network analysis and design (routing, switching, wireless technologies)
  • storage analysis and design

Proficient knowledge and understanding of security related analytical / reporting tools (ie, tools used for virus management, ids management, vulnerability management, firewall management, encryption, network traffic analysis)

Proficient scripting/programming skills (ie, vb, java, perl, python, php)

Functional understanding of the security related standards and frameworks (ie, ISO27005, ITIL, CoBit, PCI, FIPPA)

One of the following security certification is preferred (CISSP, CEH, CISA, ABCP)

Excellent problem solving skills and analytical thought processes

Ability to lead teams and work independently with integrity and confidentiality

Knowledge of IT and more specifically Information Security industry trends with an ability to apply understanding to the needs of OLG.


Deepti Dewan | CSI Consulting Group
Senior Technical Recruiter
150 York St. | Suite 1612
Toronto, Ontario M5H 3S5
Tel: 416-364-6376 x 2031 | Fax: 416-364-2735 |
Deepti @

DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error or please delete it. Please note that any views or opinions presented in this email are solely those of the author and do not necessarily represent those of the company. Finally, the recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.