{"version":"1.0","provider_name":"Systematix","provider_url":"https:\/\/systematix.com\/fr\/","author_name":"Systematix","author_url":"https:\/\/systematix.com\/fr\/","title":"Architecte\u00a0de\u00a0solutions\u00a0&amp;\u00a0int\u00e9gration\u00a0\u2013\u00a0Cybers\u00e9curit\u00e9 - Systematix","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"PwKYKK9DYl\"><a href=\"https:\/\/systematix.com\/fr\/opportunity\/architecte-de-solutions-integration-cybersecurite\/\">Architecte\u00a0de\u00a0solutions\u00a0&amp;\u00a0int\u00e9gration\u00a0\u2013\u00a0Cybers\u00e9curit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/systematix.com\/fr\/opportunity\/architecte-de-solutions-integration-cybersecurite\/embed\/#?secret=PwKYKK9DYl\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Architecte\u00a0de\u00a0solutions\u00a0&amp;\u00a0int\u00e9gration\u00a0\u2013\u00a0Cybers\u00e9curit\u00e9\u00a0\u00bb &#8212; Systematix\" data-secret=\"PwKYKK9DYl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Montr\u00e9al\u00a0|\u00a0Mode\u00a0hybride\u00a0(2\u00a0jours\/semaine\u00a0en\u00a0pr\u00e9sentiel)Mandat\u00a0initial\u00a0de\u00a08\u00a0mois\u00a0+\u00a0extensions\u00a0possibles Nous\u00a0recherchons\u00a0un(e)\u00a0architecte\u00a0de\u00a0solutions\u00a0exp\u00e9riment\u00e9(e)\u00a0pour\u00a0intervenir\u00a0sur\u00a0des\u00a0initiatives\u00a0strat\u00e9giques\u00a0en\u00a0cybers\u00e9curit\u00e9,\u00a0au\u00a0sein\u00a0d\u2019un\u00a0programme\u00a0structur\u00e9\u00a0comprenant\u00a0plusieurs\u00a0projets\u00a0en\u00a0parall\u00e8le.\u00a0 Responsabilit\u00e9s Concevoir\u00a0et\u00a0documenter\u00a0des\u00a0architectures\u00a0de\u00a0solutions\u00a0en\u00a0cybers\u00e9curit\u00e9\u00a0(actuelle\u00a0et\u00a0cible)\u00a0 R\u00e9aliser\u00a0des\u00a0\u00e9tudes\u00a0de\u00a0march\u00e9\u00a0et\u00a0recommander\u00a0les\u00a0solutions\u00a0technologiques\u00a0adapt\u00e9es\u00a0 D\u00e9finir\u00a0les\u00a0exigences\u00a0d\u2019affaires,\u00a0techniques\u00a0et\u00a0de\u00a0s\u00e9curit\u00e9\u00a0 Participer\u00a0aux\u00a0processus\u00a0d\u2019appel\u00a0d\u2019offres\u00a0et\u00a0\u00e0\u00a0la\u00a0s\u00e9lection\u00a0des\u00a0fournisseurs\u00a0 Identifier\u00a0les\u00a0risques,\u00a0proposer\u00a0des\u00a0solutions\u00a0et\u00a0valider\u00a0les\u00a0orientations\u00a0d\u2019architecture\u00a0 Accompagner\u00a0les\u00a0\u00e9quipes\u00a0de\u00a0r\u00e9alisation\u00a0pour\u00a0assurer\u00a0l\u2019int\u00e9gration\u00a0et\u00a0la\u00a0conformit\u00e9\u00a0des\u00a0solutions\u00a0 Collaborer\u00a0\u00e9troitement\u00a0avec\u00a0les\u00a0\u00e9quipes\u00a0TI,\u00a0s\u00e9curit\u00e9\u00a0et\u00a0les\u00a0parties\u00a0prenantes\u00a0 \u00a0 Projets\u00a0cl\u00e9s \u00c9volution\u00a0d\u2019une\u00a0plateforme\u00a0EDR\u00a0vers\u00a0XDR\u00a0 Mise\u00a0en\u00a0place\u00a0et\u00a0am\u00e9lioration\u00a0d\u2019un\u00a0SOC\u00a0(incluant\u00a0SIEM)\u00a0 D\u00e9ploiement\u00a0de\u00a0solutions\u00a0s\u00e9curis\u00e9es\u00a0d\u2019\u00e9change\u00a0d\u2019informations\u00a0sensibles\u00a0 S\u00e9curisation\u00a0des\u00a0communications\u00a0(courriel,\u00a0donn\u00e9es)\u00a0 Profil\u00a0recherch\u00e9 10+\u00a0ans\u00a0d\u2019exp\u00e9rience\u00a0en\u00a0TI,\u00a0dont\u00a0exp\u00e9rience\u00a0significative\u00a0en\u00a0architecture\u00a0de\u00a0solutions\u00a0en\u00a0cybers\u00e9curit\u00e9\u00a0 Exp\u00e9rience\u00a0concr\u00e8te\u00a0dans\u00a0des\u00a0programmes\u00a0comprenant\u00a0plusieurs\u00a0projets\u00a0de\u00a0s\u00e9curit\u00e9\u00a0simultan\u00e9s\u00a0 Expertise\u00a0en\u00a0d\u00e9ploiement\u00a0de\u00a0solutions\u00a0de\u00a0type\u00a0SIEM\u00a0(cloud,\u00a0on-prem,\u00a0hybride)\u00a0 Bonne\u00a0compr\u00e9hension\u00a0des\u00a0domaines\u00a0cl\u00e9s\u00a0de\u00a0la\u00a0cybers\u00e9curit\u00e9\u00a0(SOC,\u00a0XDR,\u00a0journalisation,\u00a0surveillance)\u00a0 Capacit\u00e9\u00a0\u00e0\u00a0structurer,\u00a0documenter\u00a0et\u00a0faire\u00a0\u00e9voluer\u00a0des\u00a0architectures\u00a0complexes\u00a0 Excellentes\u00a0comp\u00e9tences\u00a0en\u00a0communication,\u00a0collaboration\u00a0et\u00a0autonomie\u00a0 \u00a0 Atouts Exp\u00e9rience\u00a0avec\u00a0les\u00a0appels\u00a0d\u2019offres\u00a0publics\u00a0 Connaissance\u00a0des\u00a0patrons\u00a0d\u2019int\u00e9gration\u00a0et\u00a0de\u00a0s\u00e9curit\u00e9 \u00a0"}