Enable job alerts via email!

IT Advisor (Threat Intelligence Analyst)

T-Net British Columbia

Vancouver

On-site

CAD 80,000 - 110,000

Full time

11 days ago

Job summary

A regional utility provider seeks a cybersecurity expert to join their Threat & Vulnerability Management team. This hybrid role demands 5+ years of experience in threat intelligence and vulnerability management. Responsibilities include monitoring threats, assessing vulnerabilities, and collaborating with technical teams. A Bachelor's degree in Cybersecurity or IT and relevant certifications are preferred. The position offers a competitive benefits package and flexible work options.

Benefits

Comprehensive benefits package
Paid vacation days
Pension plan
Training and development courses

Qualifications

  • 5+ years in cybersecurity with a focus on threat intelligence.
  • Strong verbal and written communication skills.
  • Experience with vulnerability assessment and management tools.

Responsibilities

  • Monitor and analyze threat intelligence sources.
  • Identify and assess vulnerabilities across enterprise systems.
  • Work collaboratively with technical support teams for remediation.

Skills

Threat Intelligence Analysis
Vulnerability Management
Problem Solving
Communication
Collaboration

Education

Bachelor's degree in Cybersecurity or IT
CISSP
CEH

Tools

Vulnerability Assessment Tools
Threat Intelligence Platforms
Job description
Overview

BC Hydro

Job Overview

Number of positions: 1

Employment type: Permanent

Hours of work: Full-time (37.5 hrs/wk)

Flexible Work Role: Hybrid

What you'll do

As a member of the Threat & Vulnerability Management team, you will play a critical role in safeguarding the organization's digital infrastructure. While your primary focus will be on threat intelligence, the nature of our team requires a strong understanding of vulnerability management as well. You will be responsible for identifying, analyzing, and disseminating high-severity threat intelligence—particularly zero-day vulnerabilities under active exploitation and activity linked to high-priority threat actors—to drive timely remediation efforts and inform the implementation or enhancement of security controls. This is a dynamic, cross-functional role that requires collaboration with asset owners, technical teams, and leadership to ensure a proactive and risk-informed cybersecurity posture.

Key Responsibilities
  • Threat Intelligence: Monitor and analyze threat intelligence sources to stay ahead of emerging threats. Disseminate critical and high-severity threat alerts, with a focus on zero-day vulnerabilities and activity from high-impact threat actors. Track and assess threat actor campaigns and TTPs using structured frameworks to inform defensive strategies. Apply tactical, operational, and strategic intelligence principles to support both day-to-day security operations and longterm risk reduction planning. Maintain and evolve the organization's threat profile, including threat actor tracking and sector-specific threat landscape assessments. Collaborate with SOC, incident response, and vulnerability management teams to ensure threat intelligence is actionable and operationalized. Provide context and enrichment to threat intelligence to sharpen its relevance to the organization. Support the development and maintenance of threat intelligence dashboards and reporting for both technical and executive audiences. Contribute to the continuous improvement of intelligence validation, dissemination, and escalation processes.
  • Vulnerability Management: Identify and assess vulnerabilities across enterprise systems in both IT and OT environments. Oversee vulnerability scanning and ensure findings are shared with responsible teams. Prioritize remediation by correlating threat intelligence with internal vulnerability data. Collaborate with technical support teams for patching, while ensuring asset owners remain accountable. Track remediation efforts and support risk-based prioritization. Contribute to threat-informed patching strategies based on real-world exploitation trends. Enhance and maintain regular vulnerability management reports and dashboards for leadership, highlighting trends, remediation status, and risk posture. Establish, document, and continuously improve vulnerability management processes, standards, and policies aligned with industry best practices (e.g., NIST, NERC CIP, CIS). Evaluate vulnerabilities associated with third-party vendors and cloud services to manage external risks.
What you bring
  • Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence analysis or related disciplines.
  • Strong written and verbal communication skills, with the ability to clearly convey complex information to both technical and non-technical audiences.
  • Solid understanding of cyber threat intelligence frameworks and methodologies.
  • Familiarity with the full spectrum of threat intelligence—tactical, operational, and strategic—and how each supports different layers of defense and decision-making.
  • Experience with vulnerability assessment, scanning, and management tools and processes.
  • Experience using a threat intelligence platform to manage, enrich, and operationalize threat data.
  • Experience creating and delivering hunt packages to support proactive threat detection and threat-informed defense.
  • Experience with Operational Technology (OT), Industrial Control Systems (ICS), or operational processes, including technologies such as SCADA, PLCs, or DCS in industrial or critical infrastructure environments.
  • Proven ability to collaborate effectively across IT, security, and business unit teams in a cross-functional environment.
  • Strong problem-solving and critical thinking skills, with a proactive and analytical mindset.
  • Technical knowledge and practical experience in the following areas:
    • IT processes and infrastructure
    • Threat and risk assessments
    • Vulnerability scanning and management
    • Penetration testing fundamentals
    • Network architecture and security
    • Log management and analysis
    • Security auditing and compliance
    • Configuration and asset management
Preferred Education & Certifications
  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.
  • Certificated in at least one of the following areas, is considered an asset:
    • CISSP
    • CTIA
    • CEH
    • GCTI
    • CySA+
    • GCIH
    • GPEN
What we offer
  • A comprehensive benefits package
  • A minimum of 15 paid vacation days
  • A lifetime pension
  • Flexible work model, depending on your role type
  • Training and development courses
What else you should know

Don't forget to update your Candidate Profile with your current resume and copies of your certifications. If applicable, include your Trades Qualification. This will ensure we have all the necessary information to assess your application without any delays.

Response Information

To apply for this position, please click the appropriate "Apply" button (or follow the application instructions listed in the Job Description above). If more than one Apply button appears below, please select the option you prefer.

Post your resume on T-Net and let employers come to you.

  • Upload, Copy and Paste or Create your resume easily.
  • Save Time Applying For Future Positions.
  • Make "Searchable" or "Confidential" (optional) and BC Tech and IT employers can search our database and contact you.

Registration on or use of this website constitutes acceptance of our Terms of Use.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.