Sr. Info Security Analyst - 54874
S.i. Systèmes
Toronto, ON-
Nombre de poste(s) à combler : 1
- Salaire À discuter
-
Emploi Contrat
- Publié le 17 avril 2025
-
Date d'entrée en fonction : 1 poste à combler dès que possible
Description
Business Unit: 4 - Protect Platform - Operations
Duration: 6 months
Extension possible: TBC
Interview Process: Virtual 1 round potential 2nd round depending on outcome
Work Location (Remote, Hybrid ): Hybrid 310-320 Front Street West Corporate, Toronto, Ontario ( In office 4 days a week )
CANDIDATE PROFILE DETAILS:
Degree/Certifications Required: · Bachelor’s Degree in Computer Science/Information Security or similar discipline is preferred.
Years of experience: 5yrs
Reason for request/why opened: Short term leave
% Interaction with Stakeholders: 25%
Project Scope: BAU support
Team Size: 12 ppl
Selling Points of Position: Working within a leading FI organization
Background: Minimum 5 years of information security experience, preferably engineering or development.
SUMMARY OF DAY TO DAY RESPONSIBILITIES:
Define, develop and/or implement detection strategies, analyze security data, and create monitoring use cases to ensure timely responses to potential threats. The primary goal is to enhance organization’s ability to detect and respond to security breaches. Develop advanced detection logics and algorithms which can efficiently spot and alert of any suspicious activity or potential threats. Perform detection gap assessments to ensure coverage across identity, network, endpoint, cloud, and application layers. This role aligns with CSOC, CSIRT, threat hunting, threat intelligence, red team, risk management, and so forth, to build a threat-informed defense system. May participate in incident support and/or projects to provide reporting, data analysis, and assessments.
· Develop security monitoring rules/use cases on SIEM platforms (Splunk, Azure Sentinel, Logscale)
· Identify cyber threats, anomalies and risks from security-relevant data (e.g. login/logoff events, persistent to outbound data transfers, firewall allows/denies, etc.).
· Find suspicious or malicious activity by analyzing alerts; investigating indicators of compromise (IOCs like file hashes, IP addresses, domains, etc.)
· Researching and developing new threat detection use cases based on threat research findings, threat intelligence, analyst feedback and available log data.
· Performing activities within the content life cycle, including creating new use cases, testing content; tuning, and removing content; and maintain associated documentation.
· Working with the other security functions and product SMEs to identify gaps within the existing analytical capabilities.
· Participating in root cause analysis on security incidents and provide recommendations for remediation.
· Acting as the liaison to business units to fulfill audit, regulatory compliance as well as corporate security policy requirements.
· Create and maintain documentation for detection processes.
· Continuously improve detection capabilities based on emerging threats.
Must Have
· Experience in SIEM content development (Splunk, Azure Sentinel, Logscale, or similar SIEM platform).
· Understanding of various log formats and source data for SIEM Analysis.
· Minimum 5 years of information security experience, preferably engineering or development.
· Ability to effectively communicate with anyone, from end users to senior leadership - facilitating technical and non-technical communication.
· Strong incident handling/incident response/security analytics skills.
· Deep understanding of technical concepts including networking and various cyber-attacks.
· Solid background with Windows and Linux platforms (security or system administration).
Exigences
non déterminé
non déterminé
non déterminé
non déterminé
D'autres offres de S.i. Systèmes qui pourraient t'intéresser