09 Jan
S.i. Systems
Toronto
Senior Security Analyst with Incident Management Experience
Position Overview:
We are seeking a Senior Security Analyst with incident management experience to run 3rd party incident handling for one of our major banking clients.
Location: Hybrid - Scarborough – mostly WFH, coming in for training and ad hoc meetings – 1/month after training period, preference for candidates in GTA.
Contract Duration: 12 months (Possibility of extension & conversion to FTE)
Schedule Hours: 37.5 hrs/week
Reason: New requirement
Story Behind the Need:
- Business group: Threat Monitoring & Response (TMR) team is responsible for detecting, monitoring,
and investigating threats; responsible for the coordination of key programs that impact all divisions within the Cybersecurity Operations (CSOps) organization and all of Information Security & Controls.
- Project: 3rd party cyber security incidents - These roles are responsible for managing critical 3rd party risk events. The Global Threat Responder is responsible for managing the Bank’s response to cybersecurity & data threats and the mitigation of associated risks.
Typical Day in Role:
- Run 3rd party incident handling, refine and improve response playbooks.
- Reporting to Senior Manager, Global Threat Response.
- Monitoring 3rd party events – coordinate general cyber security response to news and intelligence notifications.
- Working with stakeholders around the globe.
- Bridging communication between technical operations teams and globally based business leadership.
- Compiling and contextualizing investigative data for business consumption.
- Guiding team to best practices for incident response.
- Providing security advice to ensure information security risks are mitigated.
Must Have Skills:
1. 10+ years of working experience in IT.
2.
3+ years of prior experience in Cybersecurity with hands-on experience in management of threats.
3. 3+ years of incident management experience.
4. 3+ years’ experience using productivity tools (PowerBI) to produce quantitative/qualitative reports, data flow diagrams & visual presentations.
Nice-To-Have Skills:
1. Bilingual in Spanish is a strong asset; candidates who speak Spanish will be prioritized.
2. Experience building and running a TTP framework methodology.
3. Experience building custom reporting of mitigation status against threats.
4. Experience in red team activities, consulting, SOC and Device Management.
5. Experience building a security program to defend against APT.
6. Experience sizing, deploying, maintaining, and hardening SIEM and NGFW solutions.
7. CISSP and/or CISM certification.
Education:
- Bachelor's degree in a technical field such as computer science, engineering, business, or equivalent work experience.
- Certifications (CISSP, CISM, CCSP, CRISC) are an asset.
Best vs. Average Candidate:
The ideal candidate has strong incident response experience, is fully bilingual in Spanish, can understand supplier relationships, and has the ability to organize and guide information for effective management and response.
Interview Process:
1. 1st round interview – Panel (senior managers) with HM (30 mins).
2. 2nd round interview – with HM, Director (30 mins).
Additional Note: Program is moving into LatAm; hence, Spanish is a strongly desired skill. Candidates need to be fully bilingual in English-Spanish along with the core must-have requirements.
#J-18808-Ljbffr
Impress this employer describing Your skills and abilities, fill out the form below and leave Your personal touch in the presentation letter.