IT Security Design Specialists


ReplyTo Full Name: Alli Lush  Reply To Email:

The scope of this requirement is to provide an architecture for the GC regarding internal identities, credentials, and access management. The scope of work will include policies and processes that encompass a complete solution pertaining to this. Interactions with other ICAM components will be clearly specified upon contract award however implementation details such as network segmentation and high-availability will be specified subsequently by the project team responsible for implementation; as such implementation is not part of the scope of this requirement.

The Senior IT Security Design Specialists (ICAM experienced) are required to, but not limited to:
1. Review/analyze and gain knowledge, understanding, and application of:
• GC policy instruments, such as the:
o Directive on Identity Management
o Standard on Identity and Credential Assurance
o Guideline on Defining Authentication Requirements
• ITSG-31 (or NIST SP 800-63)
2. Familiarize themselves with the current GC ICAM environment;
3. Participate in appropriate requirements‐gathering activities (e.g., workshops, interviews, modeling, or other requirements elicitation and analysis activities) with departments to elicit information and requirements from key stakeholders for a GC-wide enterprise ICAM foundational solution;
4. Compile, translate and distill gathered data into functional specifications including: use cases, requirements, functionality and scope recommendations;
5. Prepare or review technical and/or business presentations and briefings or technical documents as required by the Technical Authority;
6. Analyze and develop documents such as a security requirements definition, a threat and risk assessment, and a privacy impact assessment;
7. Prepare a concept of operations document that includes processes and methodologies that will support the development, implementation, verification, and maintenance of an enterprise GC ICAM solution;
8. Provide advice and guidance, based on experience gained with large ICAM deployments ideally in the public sector, on ICAM architecture, process, governance, and policies to make a government-wide program successful;
9. Implement a proof of concept in a lab setting to demonstrate and prove the concepts and principles of the GC ICAM target architecture and concept of operation;
10. Provide regular status reports, format and frequency to be defined in consultation with the Technical Authority;

SecurityStatus: Must Hold    Location: Ottawa

Posted By Full Name: Lianne White   Posted Date: 130223451362070000

StartDate: (contract to start upon contract award)    Closing Date: 130235184000000000

Leave a Reply

Your email address will not be published. Required fields are marked *



  Copyright © [2016] ITnet - All rights reserved.

linkedin   twitter facebook