Friday, July 10, 2020

SYSTEM AND NETWORK ARCHITECT

The System and Network Architect defines the changes to the company's information system and telecommunications network. For this he analyzes the flow of information in order to propose a solution that will meet the needs in terms of communication.

The System and Network Architect is above all a designer. In fact, it adapts and measures the elements of the company's telecommunications network. He is the person in charge of ensuring that there is good communication and proper functioning between the client's machines. Clearly: a good network, a message that is sent and received quickly, it is thanks to the System and Network Architect. Internet research as fast as light, this too is thanks to the System and Network Architect.

infographic profession architect system and networks
An essential element of a business, in the era of digital transformation in many sectors, the profession of System and Network Architect is far from obsolete. On the contrary, employment is growing in the systems and network sector.

This is why professionals surround themselves with these coveted profiles from all sides. It has become essential to have an internal resource despite the budgetary constraints faced by businesses.

Coveted by IT services companies as much as by consulting companies, it is becoming increasingly difficult to find them or even to poach them. And it is not with the increase in cybersecurity risks that their jobs are likely to disappear.

As you can imagine, the salary of the System and Network Architect is quite pleasant and may well evolve quickly (see a little below) architect roles and responsibilities.

MISSIONS OF THE SYSTEM AND NETWORK ARCHITECT
Audit the performance, security and reliability of existing systems with reference to functional needs,
Define and document the network architecture (network architecture diagram),
Choose the appropriate technical solutions and operators taking into account the performance / cost ratio,
Design the communication system,
Supervise the construction of the network,
Perform a technology watch.
PROFILE
Assistant and adviser at the same time, the System and Network Architect is of a leadership nature . His managerial side and his power of persuasion allow him to share his ideas. Listening, he has a certain interpersonal skills which facilitates the regular exchanges which he maintains with his collaborators.

The System and Network Architect is also curious and keeps himself regularly informed of the latest technological advances in order to offer adequate and topical solutions. Also, in addition to being rigorous and methodological, he has an analytical and synthesizing spirit: essential assets which save him precious time in his missions.

SKILLS OF THE SYSTEM AND NETWORK ARCHITECT
Knowledge of routers, switches, hubs, etc.
Knowledge of LAN, MAN, WAN,
Network protocols and standards,
Rigor and methodology,
Strength of conviction,
Good interpersonal skills,
Analytical mind,
Curiosity.

TRAINING
To exercise this function it is essential to hold a Bac +5 at least, whether the diploma comes from an engineering school or from a university course in computer science. To obtain your diploma, you can follow one of the following courses:

Engineering degree,
Master in networks and telecommunications,
Master in computer science.

Thursday, July 9, 2020

Information systems architect

The Information Systems Architect is the engineer responsible for developing, building and designing the information system for his client, taking into account his current and future needs with a view to assessing the technical architecture and its a computer tool. He is an architect in the sense that it is he who sketches the database of the company's information flows.

It most often works in a network with technical experts and with service providers who participate in the implementation of the new information system. Information system architects are most often consultants within ESNs (digital service companies) or large companies (banks, mass distribution, etc.).

Design and build the system of an IT company, this engineer begins by studying the needs of the client, in particular by carrying out audits in the various departments. From this information, he builds a first plan of the system: he chooses the technologies best suited to the expectations, constraints and budget of the company.
It analyzes the needs of the trades and the data flows in the company by recommending the technical equipment to acquire and the developments to be carried out (SME) and by supervising the development teams.

Main missions security architect jobs
Invited to define the contours of the referential information system of the company in an evolutionary way, the architect of information systems has as main missions:

Analyze business needs and data flows in the company
carry out audits in the various departments.
establish a system mapping by analyzing the existing
propose an architectural model
implement this model by choosing a hardware and software infrastructure.
Bring added value in the homogeneity of information processing
Coach development teams
Ensure technological watch


Technical skills
Technical position in the true sense of the term, the profession of information systems architect as such requires a general mastery of:

computer technologies and languages
network protocols and security standards
development standards and methods
IS design and modeling
Since he has to evolve in the business environment and therefore to master the organization of the company and its technical infrastructure, the information systems architect also needs:

real managerial skills
a good command of English
Editorial quality
Know the client's job and adapt it to the IT system
A strong spirit of synthesis
Personal qualities
Beyond a purely technical know-how, the architect of information systems must He must also have excellent interpersonal and strategic skills, as well as a certain taste for negotiation, insofar as he works in transverse with its management, with users and with suppliers of technical solutions. In summary, the information systems architect must:

Sense of contact
Ability to comply with production objectives
Great adaptability
Organization / rigor
Taste for challenge
Diplomacy
Good communication skills

Wednesday, July 8, 2020

Recommendations when configuring it

Instagram is nowadays the most used social network by children, youth and adults in much of the world. With more than one billion active users per month globally, the social network owned by Facebook has become very popular, since it allows images, stories and even live broadcasts to be shared, among many other things. In this context and considering that today everything we do on the Internet leaves a mark and is part of our digital identity, and that a large part of that identity is given by what we do on social networks, we take advantage of the fact that today, 30 June, World Social Networks Day is celebrated to share a series of recommendations when setting up privacy and security on Instagram architecture job description

Privacy settings on Instagram
As in most social networks and applications, the privacy and security options on Instagram will be found within our profile, pressing on the three horizontal stripes that are observed in the upper right part of our screen and then pressing on the 'Settings' wheel at the bottom right. Here we will find the menu with all the options that Instagram allows us to configure. In this post we will analyze those most relevant to security and privacy issues, but we recommend you review each one.


Settings menu on Instagram

Within the Privacy options we can configure everything related to our publications; that is, those who can see them, make comments, tag us and contact us, among other things. Here are some of these settings that you shouldn't miss checking out.

Setting up comments on Instagram
Within 'Comments' it is possible to restrict those comments that are abusive or violent. This option is very important to activate, especially in accounts of minors, to avoid cyberbullying and digital harassment .


Configuration options for comments on Instagram

As seen in Image 2, it is possible to block the comments of one or more accounts in particular, which will make them not visible to other users who visit our profile.

On the other hand, we recommend the use of content filters as well. In this sense, Instagram allows you to automatically hide comments that contain aggressive and violent messages in your posts, or to perform a manual filter to block those that contain specific words. This manual filter will block all comments that contain the words, phrases or even emojis entered in the text box below the 'Manual filter' option.

In addition, you can also activate the automatic filter of most reported words, which is based on the list of words included in the most reported comments by all users of the social network with the aim of blocking those comments that include these terms.

In this way we can automatically restrict aggressive or abusive comments, without having to review or delete one by one.

Instagram tagging settings
In the 'Tags' menu we will find everything related to publications in which we are tagged. Here we can choose who can tag us: any person or Instagram profile, only those we follow or no one. On the other hand, we can review the publications in which we have been tagged in the option 'Tagged posts' and even delete the tag or hide the post so that it is not visible in our profile.

There is also the option of manually approving the labels, which although it can be tedious is a good complement for those who allow any account to be able to label them.


Label menu on Instagram

Just as the tags in our profile can be restricted, the mentions can also be restricted. That is, the references using the '@' in stories, publications or comments from other accounts that create a direct link to our profile.

Privacy settings for stories on Instagram
Within the privacy settings for stories there is an option that allows you to hide the stories from certain contacts, as well as the possibility of creating a 'Best Friends' list to share only certain content with this group. Although these options are very useful, especially in public accounts or with a large number of followers, many children and adolescents use this setting to hide the content of their stories from their parents or family and thus share content without supervision. With this in mind, we remind adults of the importance of talking to young children about the use of social networks and jointly review their privacy and security settings.

Tuesday, July 7, 2020

The arrival of the European rival of Visa and Master Card is clarified

Twenty European banks want to create a pan-European payment system to compete with the two American giants Visa and Mastercard. The initiative aims to ensure the sovereignty of payments in Europe.

The European initiative to short-circuit Visa and MasterCard is starting to take shape. According to information from Les Echos, the official launch of the European interbank EPI project could take place this week, and most certainly on July 2.

This initiative, revealed last November, aims to manage all dematerialized forms of payments and therefore do without the two American players, essential today. Among the 20 European financial institutions involved, all the major French banks are present, as are Deutsche Bank, Commerzbank and Santander.

Political project senior security benefits
In this context, a common structure must be created to allow the implementation of the new system, which will replace national systems such as the grouping of CB Bank Cards in France and its European equivalents.

But beyond the financial aspect, this project is above all political. At the origin of this initiative, "positive injunctions, during 2017, came from the European Central Bank (ECB) which, worried about the sovereignty of payments, explained that it would welcome seize the subject ", told AFP on condition of anonymity a French banking source close to the matter.

"It will indeed install the new brand"
"This project will require a lot of technological investment but also communication" explains to Les Echos  a banker participating in the project. "It will indeed be necessary to install the new brand, so that it is as familiar to consumers as Visa or MasterCard". Nothing could be simpler, but Europe seems to be giving itself the means to get there: the European Commission, like the ECB and governments seem to be on the same wavelength.

Monday, July 6, 2020

Penetration test in ports and ISPS port facilities: guidelines for data and information security

The penetration tests on the ICT infrastructures of ports and port facilities are useful for verifying and preventing cyber attacks on the port system and all the systems connected to it. Here are the international cooperation projects currently in place and the solutions to secure data and information

The penetration test is defensive cyber tools very useful to verify and prevent cyber attacks to systems increasingly connected and interconnected as they are now the ports and port facilities .

Penetration test in ports and port facilities: the regulatory scenario
The relationship between the so-called ISPS port facilities and cyber security cannot be separated from the consideration of Regulation (EC) no. 725/2004 which implements Chapter XI-2 of the SOLAS Convention and the ISPS Code (International Code for the Safety of Ships and Port Facilities) within the Community.

As seen in a previous contribution, the Regulation in question would not seem to provide binding provisions regarding the assessment and treatment of the so-called cyber threat scenarios within the two main management documents, namely the Port Facility Security Assessment and the Port facility Security Plan , relating to the IT security of data and information.

But if on the one hand Regulation (EC) no. 725/2004 represents a general reference basis, albeit prescriptive in the field of port security , on the other hand the absence of specific binding rules on cyber risk assessment , supplementing the European Regulation or the subsequent National Maritime Safety Program (PNSM ), has seen the enhancement of independent initiatives implemented by Bodies, international bodies and private associations, aimed at providing a contribution for the improvement of the level of security of networks and information systems in the port and maritime sector, both in terms of national and European.

Accelerator of this trend, in addition to the numerous recorded cases of cyber attacks, is the entry into force of dedicated regulations, which in their rapid succession, are marking the formation of a sector regulatory body , linked to the risk scenarios related to cyber security.


In this sense, we refer mainly to: Architecture engineer job description

● Directive (EU) 2016/1148 of the European Parliament and of the Council of 07.06.2016 ( cd . NIS Directive );

● Commission Regulation (EU) 2019/881 of the European Parliament and of the Council of 04.17.2019 ( cd . Cybersecurity Act ).

Furthermore, in the context of Directive 1148/2016, the maritime and port sector has seen the strategic role of its infrastructures reconfirmed, with respect to which, "... the security obligations ... concern all operations, including radio and telecommunication systems, IT systems and networks " [2] .

This role of centrality, already confirmed by ENISA in its report entitled, Analysis of Cyber ​​Security Aspects in the Maritime Sector , of November 2011 [3] .

The SECNET institutional cooperation project
As part of the initiatives in the European context, the recent project " SECNET - Institutional cross-border cooperation for the strengthening of port security ", co-financed by the Interreg Cooperation Program VA Italy - Slovenia 2014-2020, takes on importance [4] .

The cooperation program, within which SECNET was born, includes a territorial area extending from the north, starting from the triple border Austria - Italy - Slovenia and branching south, beyond Trieste.

On the specific level of transport infrastructures, the port poles of Venice, Trieste and Koper (Capodistria) are altogether involved [5] .

WHITEPAPER
Security: why focus on a zero trust approach?
Safety
Data security
E-mail
Company email
Allows the sending of promotional communications concerning the products and services of third parties with respect to the Data Controllers with automated and traditional contact methods by the third parties themselves, to whom the data are communicated.
The SECNET project started in October 2017 and ended in March 2019, moves in the regulatory context indicated in the introduction and was born primarily, with the aim of:

strengthen the capacity for institutional cooperation between the ports of the program area;
create the foundations for coordinated and permanent port security governance at cross-border level;
employ the latest digital ICT solutions;
provide common specialist skills across borders .
All this, within a border territory, which brings with it specific risk factors on the geo-political level, accidents on the security of the various ports and consequently on their competitiveness [6] .

The above objectives were pursued through a preliminary analysis of the current state of affairs, which characterizes the ports of the Project and which focuses on the following aspects:

data and information security (or cyber security);
perimeter security (in the context of physical security);
best practices used in ICT systems used for port security.
On the basis of this study, a cross-border action plan was subsequently drawn up, tested and implemented by means of specific pilot actions, suitable to improve the perimeter protection systems (physically) and cyber security , on the ICT level.

Friday, July 3, 2020

Adaptive security architecture: the permanent risk assessment

The dynamism of risks, as a result of the appearance of new threats and the continuous identification of vulnerabilities, as well as the increased adoption of technologies, have determined that security models in organizations must adapt to continuous changes.

Currently, prevention and detection approaches, traditionally used in the field of cybersecurity, must be complemented with new ways of dealing with risks, particularly with prediction and response activities.

This perspective, called adaptive security, considers that it is only a matter of time for systems to be compromised, so they must be permanently monitored and remedied, without neglecting the constant work of minimizing risks by reducing their impact or probability. of occurrence.

Adaptive security: What is a security architect
As in nature, the species that survive are not the strongest, nor the fastest, nor the largest, but those that adapt best to changes; in an environment of dynamic risks, the fittest survive, those who manage to adapt better to the environment.

This idea applied to the field of cybersecurity defines adaptation as a relevant condition when risks change constantly. In this sense, those organizations that best adapt to changes are those that achieve their objectives. Adaptive security considers the implementation of security architectures that adapt to their environment in order to understand behaviors and events that allow them to anticipate threats.

You may be interested:  Macro malware in Latin America: the threat hidden in office documents

According to this approach, even if prevention was carried out perfectly, it is not functional, so it is necessary to design an adaptive security infrastructure, with the assumption that said infrastructure will be compromised. Therefore, all systems and devices must be considered potentially compromised and their behaviors must be continually evaluated to determine their risk and trust.

The model was defined by Gartner Adaptive Security Architecture , and is made up of four phases: prediction, prevention, detection, and response; It is based on real-time decision making based on risk and confidence assessments. Among others, its purpose is to reduce the damage that an internal and external threat can cause, minimize losses, as well as minimize detection and response time when an incident occurs.

Each of the phases defines guidelines within a cycle that starts from implementing, monitoring and adjusting the security posture, according to the information collected.

Prediction: Refers to the ability to anticipate threats and attacks, mainly through intelligence activities (early identification of threats). To carry out this phase, the security posture, the organization's exposure and the assessment of prioritized risks must be defined.
Some considerations in this phase are related to other activities, such as the discovery of cybersecurity trends , investigation and identification of incidents that organizations have suffered (at the local, regional or global level). The task is to move from a reactive to a proactive security posture, anticipating threats and attacks.

Prevention: Based on previously collected information, security measures must be implemented or improved, including the acquisition of protection technologies. As in any area of ​​security, the prevention phase aims to prevent attacks.
In this stage the strengthening or isolation of the systems is considered (according to the needs), the application of policies, processes, procedures, and in general, of security controls (technical, administrative or physical) that reduce the probability of occurrence or impact of the identified risks.

Detection: The third phase refers to complementary technologies whose main objective is to identify suspicious or abnormal behavior, as well as to recognize attacks or threats that managed to evade prevention measures.
There are preconditions to consider in this phase. For example, the definition of what a security incident represents, since in this way containment is sought, which is another of the strategic points considered at this stage. Aspects such as confirmation and prioritization of risks are also considered.

Response: The last phase refers to incident response, mainly considering remediation, as well as investigation of events and retrospective analysis of what happened. The main purpose is to eradicate the conditions that allowed the risk to materialize. As a result, the necessary actions to correct it must be carried out, which imply changes, as well as lessons learned.
This security architecture proposal seeks to face current risks, through the constant adjustment of conditions within organizations, based on more and better information, risk and trust assessments. Finally, information security is about making decisions and continually adapting to change.

Wednesday, July 1, 2020

Network security architect

R3D is recruiting a Network Security Architect for a 6-month mandate located in downtown Montreal.

The main network security architect will designate the target network segmentation architecture as well as the project planning in line with business, compliance and risk management needs, and in compliance with the security management framework customer.

The next challenges that we offer you, as a network security architect: Project architect job description

Define, design and implement the network segmentation architecture
Set up architecture patterns to secure the networks
Identify weaknesses, potential vulnerabilities and risks
Secure the networks according to the identified risks and the security requirements mentioned in security documents
Design architectures that offer strong resilience in the face of technological threats
Ensure that contributions are made in accordance with the client's security management framework, approved documentation standards and security standards (NIST CSF, NIST 800, CIS Benchmark, ITIL, FAIR)
Design SMART security solutions (Specific, Measurable, Achievable, Realistic, Temporarily defined)
Harmonize and standardize network security across all business units
Identify and map networks used by systems and keep them up to date in the time
Work in close collaboration with domain experts and operational security teams
Ensure compliance with planning and the quality of architecture deliverables
Identify potential issues and propose solutions collaboratively
Ensure satisfaction of the client for each contribution

The talents and qualifications that you must have:
Baccalaureate, Diploma or Recognized Certificate in Computer Security
15 years of IT experience, including 5 years of experience in network security architecture
CCSP, CISSP, Cisco Certified Network Professional (CCNP), Cisco Certified Design Professional (CCDP) certification, Cisco Certified Internetwork expert (CCIE Security written) is a
Stronger experience in securing internal and external networks
Strong experience in architecture in networks: LAN, WAN, Wi-Fi, TCP / IP, VoIP, Cisco Routers / Switches, VMware, NSX, Network Monitoring
Good interpersonal skills, communication and organization
Strong analytical and planning capacity
Strong ability to understand business needs and potential security and compliance issues
Bilingual French / English

If the consulting world interests you and you wish to join our team, know that even if this mandate is for a few months, we can offer you a permanent position to evolve within R3D.

Send us your application quickly and one of our recruiters will contact you as soon as possible to discuss your profile and our position. And if ever this opportunity is not for you, then do not hesitate to refer us to your network, we offer very attractive SEO bonuses!

Why join R3D?
R3D is more than 500 technical experts across the group who work within technical solutions in consulting services mode or Flat rate / Studio projects. Currently growing, we want to welcome passionate people to support us in our evolution. No matter which path you take, with R3D you will always be able to achieve your career ambitions.