Enable job alerts via email!

Senior IT Consultant, Audit and Compliance

Richter

Toronto

On-site

CAD 70,000 - 90,000

Full time

11 days ago

Job summary

A leading business advisory firm in Toronto is looking for a Mid-Senior Cybersecurity Analyst to enhance their cybersecurity solutions. The ideal candidate should possess a Bachelor's Degree in Computer Science or a related field and have foundational knowledge in threat intelligence with strong analytical skills. Responsibilities include threat scouting, client onboarding, and developing security reports. Opportunities for continuous learning and a full-time position are offered.

Qualifications

  • Strong analytical and investigative skills are essential.
  • Experience in balancing security features and user adoption is preferred.
  • Knowledge of advanced endpoint analytics and threat hunting is crucial.

Responsibilities

  • Support the improvement of Richter's Cybersecurity concierge solution.
  • Analyze activity trends to hunt for threats not detected by security alerts.
  • Collaborate on developing tactics based on threat intelligence.

Skills

Analytical skills
Foundational knowledge of threat intelligence
Knowledge of technical security controls
Experience with Cyber Kill Chain
Networking knowledge
Knowledge of digital forensics
Penetration testing
Malware analysis
Experience with SIEM technologies

Education

Bachelor's Degree in Computer Science or related field

Tools

Splunk
Kibana
Regular Expressions (RegEx)
Job description
Overview

Richter is a Business | Family Office that provides strategic advice on business matters and on families’ financial and personal objectives across generations. With close to 100 years of experience advising at the intersection of family and business, Richter has developed an integrated approach to help business owners find sustainable success. Whether business, personal, or both, Richter is uniquely positioned to address the needs of Canada’s most successful entrepreneurs, private clients, business owners and business families and help them chart a clear path to shape their legacy for the future. Founded in 1926, Richter’s 600-person multidisciplinary team continuously innovates to create value for our people, clients, and community in Canada and in the US.

Responsibilities
  • A Bachelor’s Degree / Diploma in a relevant area of study with a preference for Computer Science, Information Security or Computer Engineering
  • Foundational knowledge of threat intelligence and threat hunting
  • Strong analytical and investigative skills
  • Knowledge of technical security controls and mitigations
  • Demonstrating experience with balancing security features and user adoption
  • Occasional after hours availability for high-severity incidents
  • Good working knowledge of one or more of the following topics :
  • Common security threats, industry best practices, security technologies
  • Good working knowledge of advanced endpoint analytics
  • Experience with Cyber Kill Chain
  • Operating systems (UNIX, Linux, Windows)
  • Must have a solid working knowledge of Networking
  • Must have experience in DLP, IPS / IDS, Firewalls, Content Filtering, End-Point Protection
  • Knowledge of digital forensics and malware reverse engineering
  • Penetration testing and ethical hacking
  • Malware analysis (dynamic and static)
  • Experience with SIEM technologies such as Splunk, Bro, Elasticsearch, Logstash, and Kibana
  • Experience with Regular Expressions (RegEx)
  • Support the continued improvement, implementation and enhancement of Richter's Cybersecurity concierge solution
  • Analyze activity trends in the environment and associated client environments using various analytics tools and methodologies for hunting for threats not otherwise detected by configured security alerts
  • Assist with onboarding clients in a professional and thoughtful way
  • Contribute to developing, implementing, automating and fine-tuning client reporting
  • Perform in-depth investigation of events of interest (EOI) or indicators of compromise (IOC) identified during threat hunt activities or security alerts received from various security technologies as per defined investigation and incident response procedures
  • Conduct threat scenario analysis to develop new use cases with relevant attack vectors and create attack scenarios to formulate hunting strategies to identify the presence of threats that are going undetected by existing security controls
  • Liaise with appropriate internal stakeholders and external clients during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate remediation recommendations
  • Collaborate with the senior team to develop hunt tactics based on threat intelligence information, attacker techniques, and procedures
  • Develop and build knowledge of and stay current on developments in the cyber threat landscape to adapt investigation techniques and provide recommendations to the client on responding to and remediating related incidents
  • Create quarterly cybersecurity reports for all internal and external clients
  • Maintain an up-to-date document repository / knowledgebase / Wiki site, covering cyber threat intelligence, security monitoring, incident response and handling, security operations processes, threat management, cybersecurity training, and standard industry technologies
Required Qualifications
  • A Bachelor’s Degree / Diploma in a relevant area of study with a preference for Computer Science, Information Security or Computer Engineering
  • Foundational knowledge of threat intelligence and threat hunting
  • Strong analytical and investigative skills
  • Knowledge of technical security controls and mitigations
  • Demonstrating experience with balancing security features and user adoption
  • Occasional after hours availability for high-severity incidents
  • Good working knowledge of one or more of the following topics :
  • Common security threats, industry best practices, security technologies
  • Good working knowledge of advanced endpoint analytics
  • Experience with Cyber Kill Chain
  • Operating systems (UNIX, Linux, Windows)
  • Must have a solid working knowledge of Networking
  • Must have experience in DLP, IPS / IDS, Firewalls, Content Filtering, End-Point Protection
  • Knowledge of digital forensics and malware reverse engineering
  • Penetration testing and ethical hacking
  • Malware analysis (dynamic and static)
  • Experience with SIEM technologies such as Splunk, Bro, Elasticsearch, Logstash, and Kibana
  • Experience with Regular Expressions (RegEx)
Desirable Qualifications
  • Industry certifications (CISSP, GIAC - GPEN, GCFE, GSE) are an asset
  • Knowledge of analytics and machine learning models
  • Experience with security orchestration tools and analytics
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Accounting / Auditing
Industries
  • Accounting
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.