Senior Security Advisor at Intact, performing threat modelling and collaborating with cross-functional teams on security solutions. Requires extensive IT experience and security expertise.
Responsibilities
Perform structured threat modelling (e.g., STRIDE, MITRE ATT&CK, kill chain, attack trees, misuse/abuse cases) for applications, systems, and architecture patterns.
Work with data flow diagrams (DFDs), and architecture diagrams for new and existing systems.
Identify assets, trust boundaries, entry points, and potential attack paths.
Assess the likelihood and impact of identified threats, and assign inherent and residual risk ratings.
Translate threat modelling outcomes into clear security requirements and recommended controls.
Document control gaps and track remediation activities through to closure.
Collaborate with product, architect, developers, and engineers to support solution design by reviewing proposed architectures, patterns, and design decisions for security implications and providing recommendations.
Work with stakeholders to integrate threat modelling into product development workflows (e.g., SDLC, Agile, project delivery) across the organization.
Participate in secure code reviews to support security requirements and threat mitigations.
Plan and facilitate threat modelling workshops.
Communicate complex technical risks in clear, business-relevant language to both technical and non-technical stakeholders.
Contribute to the development and continuous improvement of threat modelling methodologies, templates, and tooling.
Support incident response and post-incident reviews by mapping exploited paths back to threat models and identifying improvements.
Maintain an up-to-date understanding of the threat landscape, including tactics, techniques, and procedures (TTPs), including those relevant to AI-related technologies.
Apply the Maestro framework (or similar) to structure and standardize threat modelling activities for use cases involving AI agents.
Requirements
Bachelor’s degree in computer science, or any combination of equivalent education and experience
Minimum ten (10) years of experience in information technology, including at least five (5) years in information security, with demonstrated experience in one or more of the following areas: application/cloud security, security architecture, threat modelling or risk assessment, threat intel, incident response, SOC, SIEM, vulnerability management, and red teaming or penetration testing
Strong knowledge of information security management principles and practices
Strong ethical principles and understanding of business and information security ethics
Good knowledge of common security vulnerabilities of web and cloud applications and operating techniques from sources such as SANS, OWASP Top 10 and Cloud Security Alliance (CSA)
Relevant certifications include (but are not limited to): CISSP, CISA, CISM, CGEIT, CRISC, GSEC, GISP, CCSP, SSCP, CSSLP, OSCP, SABSA, CEH, GCIH, GCTI, GCFE
Excellent oral and written communication skills – Need to interact on a regular basis with colleagues across the country
Positive attitude, team spirit and eagerness to learn
Critical mind
Experience working in a Security Operations Centre
Master the digital investigation concepts such as the chain of custody and the digital evidence
Demonstrated commitment to training, self-learning and maintaining proficiency in the technical cybersecurity domain
Experience with threat modelling tools is an asset (e.g., Microsoft Threat Modeling Tool, IriusRisk, Threat Dragon, in-house tools)
Experience working with diagramming tools is an asset (e.g., draw.io , Lucidchart, Visio) or code-based diagrams (e.g., PlantUML)
Proficiency in English is required; fluency in French is a plus.
No Canadian work experience required however must be eligible to work in Canada.
Benefits
Flexible work arrangements and a hybrid work model
Possibility to purchase up to 5 extra days off per year
Multiple benefits offered to support physical and mental wellbeing, including telemedicine, Wellness account and much more
Share plan & other savings: up to 12% of salary or even more (ask how you could earn guaranteed income for life)
Senior IT Security Engineer at NEAR Foundation leading information security program and compliance initiatives. Partnering with IT teams for secure architectural design and risk management.
Bilingual Security Director for International SOS driving revenue growth of health security subscription services in Canada. Supporting consulting, training, and managed services with trusted client relationships.
Program Manager driving complex engineering projects within the Product Security organization at CrowdStrike. Collaborating cross - functionally to ensure timely delivery of security solutions across product portfolios.
Security Engineer focused on matching technology opportunities with customer business objectives at Tenable. Delivering technical presentations and driving successful customer engagements in cybersecurity solutions.
Business Development & Capture Lead for Global Spatial Technology Solutions driving revenue growth in defence sector. Engaging senior stakeholders and leading proposal development across global markets from a remote location.
IT & Security Specialist managing IT operations, security, and infrastructure for Senstar, a leader in security technology. Hands - on role blending end - user support, cybersecurity, and infrastructure management.
HR Systems Security Specialist responsible for design, configuration, and administration of security within Workday and SAP. Collaborating with HR and stakeholders to ensure effective access design and compliance.
Cybersecurity advisor working within the DCYB to develop IT security measures. Collaborating with teams to fortify cybersecurity posture and ensuring data protection for citizens.
Consultant in remuneration and occupational health and safety at the Quebec Federation of Municipalities. Ensuring employee needs match organizational requirements and promoting a safe work environment.
Cybersecurity Administrator providing operational support for compliance activities in information security. Assisting vendor risk management, audit coordination, and vulnerability tracking.