This recruiter is online.

This is your chance to shine!

Apply Now

Sr. Info Security Analyst - 54874

Toronto, ON
  • Number of positions available : 1

  • To be discussed
  • Contract job

  • Starting date : 1 position to fill as soon as possible

Business Unit: 4 - Protect Platform - Operations

Duration: 6 months

Extension possible: TBC


Interview Process: Virtual 1 round potential 2nd round depending on outcome

Work Location (Remote, Hybrid ): Hybrid 310-320 Front Street West Corporate, Toronto, Ontario ( In office 4 days a week )

CANDIDATE PROFILE DETAILS:

Degree/Certifications Required: · Bachelor’s Degree in Computer Science/Information Security or similar discipline is preferred.

Years of experience: 5yrs

Reason for request/why opened: Short term leave

% Interaction with Stakeholders: 25%

Project Scope: BAU support

Team Size: 12 ppl

Selling Points of Position: Working within a leading FI organization

Background: Minimum 5 years of information security experience, preferably engineering or development.

SUMMARY OF DAY TO DAY RESPONSIBILITIES:

Define, develop and/or implement detection strategies, analyze security data, and create monitoring use cases to ensure timely responses to potential threats. The primary goal is to enhance organization’s ability to detect and respond to security breaches. Develop advanced detection logics and algorithms which can efficiently spot and alert of any suspicious activity or potential threats. Perform detection gap assessments to ensure coverage across identity, network, endpoint, cloud, and application layers. This role aligns with CSOC, CSIRT, threat hunting, threat intelligence, red team, risk management, and so forth, to build a threat-informed defense system. May participate in incident support and/or projects to provide reporting, data analysis, and assessments.

· Develop security monitoring rules/use cases on SIEM platforms (Splunk, Azure Sentinel, Logscale)

· Identify cyber threats, anomalies and risks from security-relevant data (e.g. login/logoff events, persistent to outbound data transfers, firewall allows/denies, etc.).

· Find suspicious or malicious activity by analyzing alerts; investigating indicators of compromise (IOCs like file hashes, IP addresses, domains, etc.)

· Researching and developing new threat detection use cases based on threat research findings, threat intelligence, analyst feedback and available log data.

· Performing activities within the content life cycle, including creating new use cases, testing content; tuning, and removing content; and maintain associated documentation.

· Working with the other security functions and product SMEs to identify gaps within the existing analytical capabilities.

· Participating in root cause analysis on security incidents and provide recommendations for remediation.

· Acting as the liaison to business units to fulfill audit, regulatory compliance as well as corporate security policy requirements.

· Create and maintain documentation for detection processes.

· Continuously improve detection capabilities based on emerging threats.

Must Have

· Experience in SIEM content development (Splunk, Azure Sentinel, Logscale, or similar SIEM platform).

· Understanding of various log formats and source data for SIEM Analysis.

· Minimum 5 years of information security experience, preferably engineering or development.

· Ability to effectively communicate with anyone, from end users to senior leadership - facilitating technical and non-technical communication.

· Strong incident handling/incident response/security analytics skills.

· Deep understanding of technical concepts including networking and various cyber-attacks.

· Solid background with Windows and Linux platforms (security or system administration).

Apply

Requirements

Level of education

undetermined

Work experience (years)

undetermined

Written languages

undetermined

Spoken languages

undetermined