Overview
BC Hydro
Job Overview
Number of positions: 1
Employment type: Permanent
Hours of work: Full-time (37.5 hrs/wk)
Flexible Work Role: Hybrid
What you'll do
As a member of the Threat & Vulnerability Management team, you will play a critical role in safeguarding the organization's digital infrastructure. While your primary focus will be on threat intelligence, the nature of our team requires a strong understanding of vulnerability management as well. You will be responsible for identifying, analyzing, and disseminating high-severity threat intelligence—particularly zero-day vulnerabilities under active exploitation and activity linked to high-priority threat actors—to drive timely remediation efforts and inform the implementation or enhancement of security controls. This is a dynamic, cross-functional role that requires collaboration with asset owners, technical teams, and leadership to ensure a proactive and risk-informed cybersecurity posture.
Key Responsibilities
- Threat Intelligence: Monitor and analyze threat intelligence sources to stay ahead of emerging threats. Disseminate critical and high-severity threat alerts, with a focus on zero-day vulnerabilities and activity from high-impact threat actors. Track and assess threat actor campaigns and TTPs using structured frameworks to inform defensive strategies. Apply tactical, operational, and strategic intelligence principles to support both day-to-day security operations and longterm risk reduction planning. Maintain and evolve the organization's threat profile, including threat actor tracking and sector-specific threat landscape assessments. Collaborate with SOC, incident response, and vulnerability management teams to ensure threat intelligence is actionable and operationalized. Provide context and enrichment to threat intelligence to sharpen its relevance to the organization. Support the development and maintenance of threat intelligence dashboards and reporting for both technical and executive audiences. Contribute to the continuous improvement of intelligence validation, dissemination, and escalation processes.
- Vulnerability Management: Identify and assess vulnerabilities across enterprise systems in both IT and OT environments. Oversee vulnerability scanning and ensure findings are shared with responsible teams. Prioritize remediation by correlating threat intelligence with internal vulnerability data. Collaborate with technical support teams for patching, while ensuring asset owners remain accountable. Track remediation efforts and support risk-based prioritization. Contribute to threat-informed patching strategies based on real-world exploitation trends. Enhance and maintain regular vulnerability management reports and dashboards for leadership, highlighting trends, remediation status, and risk posture. Establish, document, and continuously improve vulnerability management processes, standards, and policies aligned with industry best practices (e.g., NIST, NERC CIP, CIS). Evaluate vulnerabilities associated with third-party vendors and cloud services to manage external risks.
What you bring
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence analysis or related disciplines.
- Strong written and verbal communication skills, with the ability to clearly convey complex information to both technical and non-technical audiences.
- Solid understanding of cyber threat intelligence frameworks and methodologies.
- Familiarity with the full spectrum of threat intelligence—tactical, operational, and strategic—and how each supports different layers of defense and decision-making.
- Experience with vulnerability assessment, scanning, and management tools and processes.
- Experience using a threat intelligence platform to manage, enrich, and operationalize threat data.
- Experience creating and delivering hunt packages to support proactive threat detection and threat-informed defense.
- Experience with Operational Technology (OT), Industrial Control Systems (ICS), or operational processes, including technologies such as SCADA, PLCs, or DCS in industrial or critical infrastructure environments.
- Proven ability to collaborate effectively across IT, security, and business unit teams in a cross-functional environment.
- Strong problem-solving and critical thinking skills, with a proactive and analytical mindset.
- Technical knowledge and practical experience in the following areas:
- IT processes and infrastructure
- Threat and risk assessments
- Vulnerability scanning and management
- Penetration testing fundamentals
- Network architecture and security
- Log management and analysis
- Security auditing and compliance
- Configuration and asset management
Preferred Education & Certifications
- Bachelor's degree in Cybersecurity, Information Technology, or a related field.
- Certificated in at least one of the following areas, is considered an asset:
- CISSP
- CTIA
- CEH
- GCTI
- CySA+
- GCIH
- GPEN
What we offer
- A comprehensive benefits package
- A minimum of 15 paid vacation days
- A lifetime pension
- Flexible work model, depending on your role type
- Training and development courses
What else you should know
Don't forget to update your Candidate Profile with your current resume and copies of your certifications. If applicable, include your Trades Qualification. This will ensure we have all the necessary information to assess your application without any delays.
Response Information
To apply for this position, please click the appropriate "Apply" button (or follow the application instructions listed in the Job Description above). If more than one Apply button appears below, please select the option you prefer.
Post your resume on T-Net and let employers come to you.
- Upload, Copy and Paste or Create your resume easily.
- Save Time Applying For Future Positions.
- Make "Searchable" or "Confidential" (optional) and BC Tech and IT employers can search our database and contact you.
Registration on or use of this website constitutes acceptance of our Terms of Use.