Corporate Security Operations Lead managing security operations for Carbon60 in a hybrid environment. Involves monitoring, incident response, and security controls across cloud and internal systems.
Responsibilities
Monitor and manage Carbon60’s cloud‑delivered security tooling, including: Coralogix for centralized security logging, alerting, and managed 24×7 monitoring, CrowdStrike Falcon for endpoint detection and response Reco for SaaS security posture management
Act as the primary internal escalation point for security alerts, including triage and investigation of alerts escalated by the Coralogix 24×7 monitoring team.
Assess alert impact and severity, determine required response actions, and coordinate containment and remediation with IT Operations and platform teams.
Produce regular operational security metrics and reporting, including incident trends, response times, tooling coverage, and posture indicators.
Ensure comprehensive security logging coverage across all systems and services used by Carbon60 employees, including: Corporate IT systems, Datacenter infrastructure, AWS and Azure environments, Identity platforms and key SaaS applications
Validate that logs are properly onboarded, normalized, retained, and searchable within Coralogix.
Own and monitor security controls across identity and productivity platforms, including: Okta, Microsoft 365, Google Workspace
Own the end‑to‑end vulnerability management program for Carbon60’s internal environments.
Act as Carbon60’s internal security lead for external penetration testing and red‑team engagements focused on core internal environments.
Requirements
4–7+ years of experience in security operations, vulnerability management, or infrastructure security
Prior experience working in a managed services provider (MSP) environment
Hands‑on experience with: CrowdStrike Falcon, Coralogix or similar SIEM/log analytics platforms, Reco or equivalent SaaS security tools, Qualys or comparable vulnerability management platforms
Required experience securing and monitoring Okta, Microsoft 365, and Google Workspace
Practical experience securing datacenters, AWS, and Azure environments
Experience participating in on‑call rotations for security escalations
Strong understanding of incident response, logging, and risk‑based vulnerability remediation
Strong written and verbal communication skills for technical and non‑technical audiences.
Benefits
Competitive compensation package
Retirement Savings Matching Program (RRSP)
Partnership with Perkopolis
Discounts
Flexible work hours & location
Paid parental leave options
Employer-paid health & dental premiums
Mental Health $500 in Health Care Spending Account annually
Cybersecurity Operations Analyst developing, implementing, and supporting security program at PCL Constructors. Engage in incident response, security operations, and compliance efforts.
Security Operations Center Specialist responsible for managing cybersecurity incidents at an international iGaming company. Engaging in threat analyses, security assessments, and incident response operations.
Junior Cyber Defender (SOC Analyst) work on detection and response at Ontinue, an AI - powered security company. Collaborating with teams on investigations and internal process improvements in Canada.
Senior Security Operations Engineer managing security for cloud - native environments at an AI research company. Focus on automation, compliance, and operationalizing security tools across platforms.
Security Operations Manager managing cloud security and identity governance at Cohere. Leading a high - performing security team and executing on strategic business goals.
Senior SOC Analyst at Absolute Security responsible for threat monitoring, hunting, and incident response. Utilizing CrowdStrike Falcon and Microsoft Sentinel to secure enterprise assets against advanced threats.
Product Security Incident Response Manager at Autodesk responsible for external security assessments, penetration testing, and team leadership. Balancing technical work with mentorship to improve security posture.