Senior Secret Cleared Business Process Specialist to Lead Table-top exercises

5 days ago


Ottawa Ontario HB, Montréal, Canada S.i. Systems Full time

Our valued Public Sector Client is seeking a Senior Secret Cleared Business Process Specialist to Lead Table-Top exercises (TTX) on a large modernization initiative


Job Description:


Our client has a need to build a service line that would offer Table-Top exercise services to the entire cyber security division. This creates an opportunity to simulate requirements for proposed technologies and test existing ones through those TTX exercises. The goal would be to build a proposition document that remains in house to establish streamline responses to various cyber threats and. Once phase 1 is complete, phase 2 would focus on defining all the artifacts by establishing a solidified TTX playbook or catalogue that can be utilized by the cyber division.


Must Haves:

  • Extensive experience leading Table-Top Exercises
  • Experience Testing Incident responses


Tasks:

  • Defining and developing scenario and fixed templates
  • Creating and defining the rules of engagement
  • Consolidating briefing material from participants of the TTX exercise
  • Logistical planning
  • Creation of guides for setting up physical spaces for a TTX exercise
  • Create user guides/hand outs to be distributed on days of TTX exercise
  • Develop script and communication templates
  • Create detailed checklists and observation logs
  • Creating gap reports
  • Review, analyze, and/or apply Federal, Provincial or Territorial IT Security policies, System IT Security Certification & Accreditation processes, IT Security products, safeguards and best practices, and the IT Security risk mitigation strategies
  • Identify threats to, and vulnerabilities of operating systems (such as MS, Unix, Linux, and Novell), and wireless architectures
  • Identify personnel, technical, physical, and procedural threats to and vulnerabilities of Federal, Provincial or Territorial IT systems
  • Develop reports such as: Data security analysis, Concepts of operation, Statements of Sensitivity (SoSs), Threat assessments, Privacy Impact Assessments (PIAs), Non-technical Vulnerability Assessments, Risk assessments, IT Security threat, vulnerability and/or risk briefings
  • Conduct Certification activities such as: Develop Security Certification Plans, Verify that security safeguards meet the applicable policies and standards, Validate the security requirements by mapping the system-specific security policy to the functional security requirements, and mapping the security requirements through the various stages of design documents, Verify that security safeguards have been implemented correctly and that assurance requirement have been met.
  • Develop and deliver training material
Apply