$500-$1
fixed price
Listing data from Guru. Visit the original listing for the most up-to-date information.
$500-$1
fixed price
Opens on Guru in a new tab
Listing data from Guru. Visit the original listing for the most up-to-date information.
Want similar gigs?
Get notified when new development & tech gigs around $500-$1 are posted.
Set Up AlertAbout Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos ’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs)
Description Responsibilities: Defines, evaluates, and assesses security architecture requirements for systems environments and IT projects. Ensures the incorporation of IT security and contingency measures in the development of systems. Advises on the identification, analysis, and resolution of specific security factors, risks, vulnerabilities; protection of personal privacy issues; and appropriate industry and international security standards. Carry out information and information technology (I&IT) security projects and tasks in the Ontario Public Service as assigned by Corporate Security or cluster I&IT management General Skills: Strong understanding and expertise in security architecture Knowledge of techniques to secure information assets and the planning, design, and implementation of security technologies Proven techniques to discover gaps or weaknesses in security architecture to identify and mitigate known security threats or inherent weaknesses Knowledge and understan