Enable job alerts via email!

Information Security Analyst

ProViso Staffing

Toronto

On-site

CAD 80,000 - 100,000

Full time

2 days ago
Be an early applicant

Job summary

A staffing firm is looking for an information security expert in Toronto for a 6-month contract. The ideal candidate will have over 5 years of experience, specifically in SIEM content development and a solid understanding of security analytics. Responsibilities include developing detection strategies, analyzing security data, and enhancing organizational security capabilities. Strong communication skills are essential for this role.

Qualifications

  • Minimum 5 years of information security experience, preferably engineering or development.
  • Experience in SIEM content development.
  • Ability to effectively communicate technical and non-technical information.

Responsibilities

  • Define, develop and implement detection strategies.
  • Analyze security data and create monitoring use cases.
  • Participate in incident support and projects for reporting and data analysis.

Skills

Experience in SIEM content development
Understanding of various log formats
Strong incident handling skills
Ability to communicate effectively
Deep understanding of networking concepts
Solid background with Windows and Linux platforms

Education

Bachelor’s Degree in Computer Science / Information Security

Tools

Splunk
Azure Sentinel
Logscale

Job description

Candidate profile details :

Degree / Certifications Required : Bachelor’s Degree in Computer Science / Information Security or similar discipline is preferred.

Years of experience : 5 years

Reason for request / why opened : Short term leave

Interaction with Stakeholders : 25%

Project Scope : BAU support

Team Size : 12 people

Selling Points of Position : Working within a leading FI organization

Background :

Minimum 5 years of information security experience, preferably engineering or development.

Summary of day to day responsibilities :

  • Define, develop and / or implement detection strategies, analyze security data, and create monitoring use cases to ensure timely responses to potential threats.
  • Enhance organization’s ability to detect and respond to security breaches.
  • Develop advanced detection logics and algorithms to efficiently spot and alert on suspicious activity or potential threats.
  • Perform detection gap assessments to ensure coverage across identity, network, endpoint, cloud, and application layers.
  • Align with CSOC, CSIRT, threat hunting, threat intelligence, red team, risk management, etc., to build a threat-informed defense system.
  • Participate in incident support and / or projects to provide reporting, data analysis, and assessments.
  • Develop security monitoring rules / use cases on SIEM platforms (Splunk, Azure Sentinel, Logscale).
  • Identify cyber threats, anomalies, and risks from security-relevant data (e.g., login / logoff events, persistent outbound data transfers, firewall allows / denies, etc.).
  • Analyze alerts and investigate indicators of compromise (IOCs like file hashes, IP addresses, domains, etc.).
  • Research and develop new threat detection use cases based on threat research findings, threat intelligence, analyst feedback, and available log data.
  • Perform activities within the content life cycle, including creating new use cases, testing content, tuning, and maintaining associated documentation.
  • Work with other security functions and product SMEs to identify gaps within existing analytical capabilities.
  • Participate in root cause analysis on security incidents and provide recommendations for remediation.
  • Act as the liaison to business units to fulfill audit, regulatory compliance, and corporate security policy requirements.
  • Create and maintain documentation for detection processes.
  • Continuously improve detection capabilities based on emerging threats.

Must Have :

  • Experience in SIEM content development (Splunk, Azure Sentinel, Logscale, or similar SIEM platform).
  • Understanding of various log formats and source data for SIEM analysis.
  • Minimum 5 years of information security experience, preferably engineering or development.
  • Ability to effectively communicate with anyone, from end users to senior leadership – facilitating technical and non-technical communication.
  • Strong incident handling / incident response / security analytics skills.
  • Deep understanding of technical concepts including networking and various cyber-attacks.
  • Solid background with Windows and Linux platforms (security or system administration).
  • Job Details

    Job ID : 13166

    Contract Duration : 6 months

    Location : Toronto

    J-18808-Ljbffr

    Get your free, confidential resume review.
    or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

    Similar jobs