06 Jan
S.i. Systèmes
Toronto
Senior Security Analyst with incident management experience to run 3rd party incident handling with one of our major banking clients- 36332
Location Address: Hybrid - Scarborough - mostly WFH, coming in for training and ad hoc meetings - 1/month after training period, preference for candidates in GTA
Contract Duration: 12 months (Possibility of extension & conversion to FTE)
Schedule Hours: 37.5 hrs/week
Reason: New requirement
Role: Global Threat Responder
Story Behind the Need
- Business group: Threat Monitoring & Response (TMR) team is responsible for detecting, monitoring, and investigating threats; responsible for the coordination of key programs that impact all divisions within the Cybersecurity Operations (CSOps)
organization and all of Information Security & Controls
- Project: 3rd party cyber security incidents - These roles are responsible for managing critical 3rd party risk events - The Global Threat Responder is responsible for managing the Bank’s response to cybersecurity & data threats and the mitigation of associated risks. The Global Threat Responder work with various business and corporate functions on understanding and coordinating risk reduction.
Typical Day in Role:
- Run 3rd party incident handling, refine and improve response playbooks.
- Reporting to Senior Manager, Global Threat Response
- Monitoring 3rd party events - coordinate general cyber security response to news, intelligence notifications
- Working with stakeholders around the globe
- Bridging communication between technical operations teams and globally based business leadership, and demonstrating an understanding of the business risk in doing so
- Compiling and contextualizing investigating data for business consumption
- Guiding team to best practice for incident response
- Solutioning for multiple security domains (Security Management, Security Engineering, Identity and Access Management, etc.).
- Leading complex projects providing security advice to ensure information security risk are mitigated.
Must Have Skills:
1. 10+ years of working experience in IT
2. 3+ years of prior experience in Cybersecurity - hands-on working experience in management of threats and industry
3. 3+ year of incident management experience
4. 3+ years’ experience using productivity tools (PowerBI) to produce quantitative/qualitative reports, data flow diagrams & visual presentations.
Nice-To-Have Skills:
1. Bilingual in Spanish is a strong nice to have, candidates with the requirements who speak Spanish will be prioritized
2. Built and run a TTP framework methodology for pattern and behaviour-based content development
3.
Built custom reporting of mitigation status against threats
4. Experience involving red team (Vulnerability Assessments, Web app assessments), consulting (Compliance, policy creation), SOC and Device Management
5. Built a security program to defend against APT
6 Experience having sized, deployed, maintained, and hardened SIEM and NGFW solutions
7. CISSP and/or CISM certification
Education:
• Bachelor's degree in a technical field such as computer science, engineering, business, or equivalent work experience
• Certifications (CISSP, CISM, CCSP, CRISC) are an asset
Best VS. Average Candidate:
Ideal candidate has strong incident response experience, is fully bilingual in Spanish, can understand supplier relationships; has ability to organize and guide and interpret for purpose of managing and response, when receiving disparately organized information
Candidate Review & Selection
2 rounds - MS Teams Video Interviews
• 1st round interview - Panel (senior managers) with HM (30 mins)
• 2nd round interview - with HM, Director (30 mins)
Additional Note: Program is moving into LatAm hence Spanish is a strongly desired skill here (candidates need to be fully bilingual English-Spanish along with the core must have requirements)
Apply
Impress this employer describing Your skills and abilities, fill out the form below and leave Your personal touch in the presentation letter.