Security Analyst

BC Investment Management Corporation

July 06, 2015

Original postings on the Viatec site are removed after the position is closed, but the posting will be archived here. The original posting was at

Job Category: 
Job Specialization: 
IT Management
Company Overview: 

The British Columbia Investment Management Corporation (bcIMC), one of Canada’s largest institutional investors, provides professional funds management services for public bodies and publicly administered trust funds.  We offer our clients five asset classes: Public Equities, Fixed Income & Foreign Exchange, Private Markets, Mortgages and Real Estate.  Our investments are diversified globally.

The assets under management (more than $100 billion) are predominantly pension plan funds from the BC Public Sector and our investment time horizon is long-term.  bcIMC aims to be the fund manager of choice for this sector.  Key to these efforts are our employees.  We look for ethical people who have true passion for the investment industry, and who are committed to providing exceptional client service and delivering superior investment performance.  

Job Summary: 

The Information Technology Department is responsible for developing technology solutions that can best contribute to the achievement of bcIMC’s mission and long-term objectives.  The Department manages the Corporation’s information technology architecture and technical infrastructure, providing support to end users including problem resolution, training and education.  The Department is also responsible for conducting disaster recovery planning and contributes to corporate business continuation planning to minimize potential impact on the delivery of investment services.

The position contributes to IT security including but not limited to: user authorization, intrusion detection and response, network device security, physical and IT facility security, anti-virus and malicious software detection, employee awareness, vulnerability management, vulnerability assessments, participates in investigation and reporting on security breaches and misuse of IT resources.

Provides technical support for the configuration, installation and maintenance of multi‑platform/environment hardware and software used on the network, workstations and servers; provides second level hardware and software problem determination, resolution or re‑direction. assists in the development and maintenance of guidelines, standards and documentation for the network and telecommunications; assists with needs definitions, cost estimates, selection criteria and requirements definitions for users; and tests, evaluates and reports on hardware and software product compatibility with corporate technologies; determines priority of activities to be done.  Provides training to users on supported hardware and software products.

Specific Accountabilities:

  1. Provide tier one on-going maintenance, monitoring and incident handling of all bcIMC security technology and security initiatives.
  2. Participate in testing, evaluation, upgrade and implementation of new and existing security applications to address emerging threats and vulnerabilities.
  3. Participate in Change Management, Problem Management, Configuration Management, and Inventory Management activities based on the NIST and ITIL frameworks.
  4. Assist with ongoing Security Education and Awareness initiatives.
  5. Actively adheres to compliance and risk management policies, and participates in disaster recovery and business continuity planning.
  6. Acts as first point of contact for managed SIEM service, monitors and coordinates ticket resolution with SIEM vendor NoC.
  7. Sets priorities for incident resolution and escalates when attempted solutions are not satisfactory.
  8. Documents, analyzes and diagnoses security specific technical  issues as they relate to bcIMC’s IT infrastructure.
  9. Provides technical security advice and recommendations for systems, products and services available.
  10. Assists with needs definitions, cost estimates, selection criteria and requirements definitions related to security initiatives.
  11. Validates receipt of system services by outside suppliers or contractors.
  12. Actively adheres to compliance and risk management policies, and participates in business continuity planning.

For your information, our recruitment process will require the successful candidate to agree to a criminal record search, to complete a declaration of no previous or current criminal status, and to agree to our corporate Code of Conduct policy.


How To Apply: 

Please visit the Careers Page of our website for full details of the position and instructions on how to apply, citing File# 314 by July 27, 2015.

We thank all candidates for their interest, however, only those selected to continue to the next phase of the recruitment process will be contacted.