Security Analyst responsible for investigating security incidents and enhancing awareness programs for ISA Cybersecurity. Collaborating on threat protection initiatives and reporting to stakeholders.
Responsibilities
Conduct in-depth investigations of endpoint protection alerts and events using tools such as SentinelOne, CrowdStrike, and Microsoft Defender.
Participate in an on-call rotation to support incident response outside of standard business hours, as required.
Fully investigate and document security breaches, providing clear and comprehensive incident reports to stakeholders.
Provide ongoing status updates to leadership throughout the incident life cycle to ensure appropriate resources are engaged.
Create, tune, and optimize rules and playbooks to reduce false positives and alert fatigue.
Provide clearly documented procedures that support timely ticket resolution and adherence to SLAs.
Assist in developing and refining SOC processes and procedures to improve investigation quality, response time, and operational efficiency.
Maintain a full understanding of Tier 1 responsibilities to support effective knowledge sharing and playbook development.
Develop and maintain monthly and quarterly security reports in accordance with client requirements.
Provide analysis, insights, and recommendations in areas of concern identified through investigations and reporting.
Enhance client security awareness through platforms such as KnowBe4 and Proofpoint.
Plan and execute simulated phishing, vishing, and smishing campaigns to help clients identify high-risk users and improve training effectiveness.
Provide clients with monthly security awareness reports and post-campaign summaries detailing user performance, phish-prone percentages, and risk scores.
Assist clients with security product implementation, onboarding, and support, ensuring tools are configured to enhance visibility and detection.
Ensure leadership and stakeholders are kept informed of potential risks and impacts introduced by new incidents.
Requirements
2+ Years of information security related experience, in areas such as: security operations, incident analysis, incident handling, and security awareness.
Experience with malware analysis, and the main point of contact for responding to security incidents relevant to major breaches.
IT Security Analyst contract role in Toronto, focusing on cybersecurity metrics, risk reporting, and GRC. Requires 8+ years experience and expertise in BI tools and security domains.
Information Security Analyst managing security operations for Deel, a global payroll and HR platform. Leading incident response, threat detection, and security improvement initiatives.
JR. IAM Analyst contract role at a major Canadian bank. Requires 2 - 4 years in tech/cybersecurity ops, proficiency in Microsoft Office, and strong task management skills.
Offensive Security Analyst responsible for intrusion tests and enhancing security posture at iA Financial Group. Collaborating with teams to document findings and improve detection mechanisms.
Security Analyst enhancing protection of systems and applications at Miovision. Collaborating across teams to improve threat detection and incident response within smart transportation.
SOC Analyst II role at BrokerLink responsible for advanced security event analysis and incident response in Canada. Leading investigations and improving security processes within the organization.
SAP Security Consultant needed for a 3 - month onsite contract in Toronto, ON. Requires strong SAP Security Administration, GRC knowledge, and security tools expertise.
IT Security Analyst role monitoring threats, managing DLP policies, and responding to security events in a hybrid Toronto environment. Requires 5+ years security experience.
Analyste sécurité jouant un rôle clé dans la conformité des produits et services d'EXFO. Collaboration interfonctionnelle pour répondre aux exigences de conformité et sécurité.