Overview
Location: Hybrid - Scarborough (1 day onsite per week)
Contract Duration: 6 months | Possibility of extension | Number of Positions: 1
Schedule: 9am-5pm Monday-Friday; standard 37.5 hrs/week (Possible OT in evenings)
Reason: Additional Workload
Story Behind the Need
Business group: Security Operations Centre – main activities for CSOC are data loss monitoring activities, EQRs (email quarantine releases).
Project: As part of the Data Loss Monitoring program within the Cyber Security Operations Centre (CSOC) the incumbent is responsible for protecting the bank’s assets and data globally through the Security Operation Center (SOC) – ensuring that customer information continues to be protected as expected. Specifically, contractors will work on Email Quarantine Releases (Mexico) and help manage review and release of backlog of EQRs.
Candidate Value Proposition
The successful candidates will have the opportunity to work in a fast-paced and dynamic challenging environment; exposure to different teams in CSOC operations; a lot of opportunity for learning, training and networking – will be set up for success in the space of cybersecurity.
Typical Day in Role
- Protect the bank’s assets and data globally through the Security Operation Center (SOC).
- Analyze emails in quarantine and request approvals for release – working with Email Quarantine Releases (Mexico).
- Release emails in quarantine that are in the Mexico console; help manage review and release of backlog of EQRs.
- Report to the GCDI IB Manager.
- Respond to Data Loss security events generated by the SIEM platform and events reported by employees, customers, and Threat Intelligence.
- Use technical knowledge to perform cybersecurity investigations using various analytical methods and technologies.
- Utilize solutions to enhance the company’s global security monitoring and threat intelligence programs for DLM.
- Leverage intrusion detection infrastructure to detect and remediate threats.
- Investigate and review suspicious activities (e.g., phishing) reported by customers or other employees of the bank.
- Contribute to the strategic direction for security-related technologies or controls to reduce threat levels.
- Explain complex technical concepts to non-technical people.
- 24/7 support is provided for the Data Loss Monitoring team on a rotational basis.
Candidate Requirements / Must Have Skills
- 5+ years hands-on technical experience in network security, information security, network and IT support, or related fields.
- 1+ years’ experience with various network principles, cybersecurity concepts, investigation procedures, and adversary techniques.
- 1+ years of experience conducting investigations across multiple security technologies.
- Bilingual in Spanish (written & oral) required.
Nice-To-Have Skills
- SOC experience and familiarity with SIEM solutions.
Soft Skills Required
- Advanced communication (verbal/written/presentation) in English and Spanish.
- Ability to prioritize and complete tasks in a timely manner; provide oversight and training to less experienced team members.
- Strong analytical and problem-resolution skills.
- Strong organizational skills.
Education
Post-secondary education in Computer Science or related technical field.
- Certifications (GSEC, CompTIA Security+, CCNA, CompTIA Networking+, ITIL CEH, OSCP) are nice to have.
Best vs. Average Candidate
Ideal candidate is willing to go above and beyond, has critical and analytical thinking skills, can prioritize tasks, understands how to action tasks in an organized way, and has good communication skills in addition to required experience in network security.
Note
Candidates need to be flexible to work outside of regular working hours (evenings).
Candidate Review & Selection
- 2 rounds – MS Teams Video Interviews.
- 1st panel interview – HM and peers – 30 minutes.
- 2nd interview with Director – 30 minutes.