Job Search and Career Advice Platform

Enable job alerts via email!

Technical Analyst

LanceSoft

Toronto

Hybrid

CAD 80,000 - 100,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology services company in Toronto is looking for a candidate with extensive experience in UNIX, Active Directory, and Windows privilege models. The ideal applicant will possess strong risk management skills and the ability to communicate effectively with various stakeholders. You'll prioritize tasks related to user access and compliance in a hybrid working environment over a 5-6 month contract period. Exceptional communication and auditing experience in cybersecurity are essential for this role.

Qualifications

  • 5-8 years of hands‑on UNIX, AD, and Windows privilege models.
  • 5 years of experience in identity domain (user access, cybersecurity, and risk management).
  • 3 years of auditing experience within cybersecurity.
  • Effective communication tailored to various stakeholders.

Responsibilities

  • Meet with stakeholders to discuss access needs and risks.
  • Review requests for privileged access across various environments.
  • Prioritize tasks daily for remediation and guideline drafting.
  • Assess the UNIX landscape for compliance and security.
  • Refine UNIX sudo configurations for administrative rights.
  • Analyze access models across systems for compliance.
  • Document findings, highlighting risks and remediation paths.

Skills

UNIX privilege models
Active Directory (AD)
Windows privilege models
Communication skills
Auditing in cybersecurity

Education

Bachelor’s Degree in Engineering or Information Sciences

Tools

PowerShell
Shell scripting
Java
Python
Job description
Location Address and Work Arrangement

Location Address: 44 King Street West, or 888 Birchmount Road, 6th Floor
Work arrangement: (Hybrid) 2 days/week in office
Contract Duration: 5-6 months with extension pending
Possibility of extension & conversion to FTE: Extension of contract with approved business case
Schedule Hours: 8:30 am-5pm Monday-Friday (37.5 hrs/week)

Business Group

Business group: GIAM - IAM Governance
Identity and Access Management Governance (GIAM) ensures that the right individuals have appropriate access to systems and data. GIAM provides centralized oversight for access certifications, privileged account management, and secure integration across on-premises, cloud, and hybrid environments.

Project

Root access to Unix servers: entitlements review and challenge.

Value Proposition

We have an inclusive and collaborative working environment that encourages critical thinking and curiosity and celebrates success! We provide you with the tools and technology needed to create meaningful results. You'll get to work with and learn from diverse industry leaders who have hailed from top technology companies around the world.

Typical Day in Role
  • Meetings with stakeholders (business, IT security, compliance teams) to discuss access needs, risks, and exceptions.
  • Review requests for privileged access across UNIX, Active Directory (AD), and Windows environments.
  • Prioritize tasks for the day: remediation efforts, guideline drafting, or urgent escalations.
  • Assess the current UNIX landscape from a privilege perspective, identifying misaligned sudo rules, excessive access, or outdated configurations.
  • Set up or refine UNIX sudo council configurations, ensuring proper delegation of administrative rights.
  • Analyze privilege access models across UNIX, AD, and Windows to ensure consistency and compliance with governance standards.
  • Document findings from assessments, highlighting risks, exceptions, and remediation paths.
Candidate Requirements / Must-Have Skills
  • 5-8 years of hands‑on UNIX, AD, and Windows privilege models.
  • 5 years of hands‑on experience in identity domain (user access, cybersecurity domain, and risk management).
  • Must be able to communicate effectively and present information to different stakeholders in a way that is clear, accessible, and tailored to their needs.
  • 3 years of auditing experience within cybersecurity.
Nice to Have
  • Scripting skills (PowerShell, Shell, Java, Python)
  • Spanish
Best vs Average

The best candidate will have hands‑on experience with Active Directory, Windows, and UNIX within the identity access management domain.
The best candidate is someone who can communicate very well, with the ability to distill complex information.

Education & Certificates

Bachelor’s Degree in Engineering, Information Sciences, or equivalent field.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.