Info Security Analyst II

at  Robertson and Company

Toronto, ON M5V 3A4, Canada -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate23 Apr, 2025USD 56 Hourly24 Jan, 20255 year(s) or aboveNids,It Security,Firewall,Operating Systems,Siem,EdrNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

Our client is a top financial institution with significant North American holdings. They have operations across most major verticals, including institutional & corporate, wealth management, private client, commercial banking, treasury, and retail banking.
Introduction: Robertson is seeking a skilled Info Security Analyst to join our client.
Contract Dates: 3 months with potential to extend or convert
Pay Range: $56.48 to $64.34 per hour
Business Hours: Monday to Friday (Hybrid)

Job Responsibilities:

  • Support learning and growth of our team members as a guide in Threat Defense Operations with a focus on mitigating risks to protect the client/bank.
  • May also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
  • Moderate to advanced hands-on experience on all modern operating systems, roles base access, internal files structures, registries, and data storage.
  • Moderate to advanced experience as an Incident Manager working on complex information security and cybercrime-related incidents, requiring coordination with internal and external enterprise teams, as well as third parties, vendors, partners, etc.
  • Moderate experience working cybersecurity events and incidents related to network layer 7/application and internet facing attacks.
  • Moderate to advanced experience briefing executives related to cybercrime and information security incident triage, incident containment, and incident recovery.
  • Moderate to advanced experience authoring complex communications related to cybercrime and information security incident triage, incident containment, and incident recovery.
  • Moderate to advanced experience authoring and maintaining playbooks and other process/governance documentation.

Experience & Qualification Requirements:

  • 5+ years of practical or relevant experience and knowledge of IT security and Incident
  • Management practices across multiple domains
  • Possess moderate to strong hands-on experience in all modern Operating Systems (Window/NIX/Cloud/Mobile)
  • Possess strong hands-on experience with traditional incidents response detection tools such as SIEM, EDR, XDR, Firewall, WAF, email proxies, NIDS, and equivalent
  • Advanced knowledge of organization, technology controls, cybersecurity, and risk assessment issues

Personal Attributes:

  • Strong leadership and people building skills within IT and Cybersecurity
  • Demonstrated ability to participate in complex, comprehensive or large projects and initiatives
  • Ability to serve as a lead expert resource in technology controls and information security for project teams, the business, organization, and outside vendors

Responsibilities:

  • Support learning and growth of our team members as a guide in Threat Defense Operations with a focus on mitigating risks to protect the client/bank.
  • May also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
  • Moderate to advanced hands-on experience on all modern operating systems, roles base access, internal files structures, registries, and data storage.
  • Moderate to advanced experience as an Incident Manager working on complex information security and cybercrime-related incidents, requiring coordination with internal and external enterprise teams, as well as third parties, vendors, partners, etc.
  • Moderate experience working cybersecurity events and incidents related to network layer 7/application and internet facing attacks.
  • Moderate to advanced experience briefing executives related to cybercrime and information security incident triage, incident containment, and incident recovery.
  • Moderate to advanced experience authoring complex communications related to cybercrime and information security incident triage, incident containment, and incident recovery.
  • Moderate to advanced experience authoring and maintaining playbooks and other process/governance documentation


REQUIREMENT SUMMARY

Min:5.0Max:10.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

IT

Graduate

Proficient

1

Toronto, ON M5V 3A4, Canada