Info Security Analyst II
at Robertson and Company
Toronto, ON M5V 3A4, Canada -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 23 Apr, 2025 | USD 56 Hourly | 24 Jan, 2025 | 5 year(s) or above | Nids,It Security,Firewall,Operating Systems,Siem,Edr | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
Our client is a top financial institution with significant North American holdings. They have operations across most major verticals, including institutional & corporate, wealth management, private client, commercial banking, treasury, and retail banking.
Introduction: Robertson is seeking a skilled Info Security Analyst to join our client.
Contract Dates: 3 months with potential to extend or convert
Pay Range: $56.48 to $64.34 per hour
Business Hours: Monday to Friday (Hybrid)
Job Responsibilities:
- Support learning and growth of our team members as a guide in Threat Defense Operations with a focus on mitigating risks to protect the client/bank.
- May also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
- Moderate to advanced hands-on experience on all modern operating systems, roles base access, internal files structures, registries, and data storage.
- Moderate to advanced experience as an Incident Manager working on complex information security and cybercrime-related incidents, requiring coordination with internal and external enterprise teams, as well as third parties, vendors, partners, etc.
- Moderate experience working cybersecurity events and incidents related to network layer 7/application and internet facing attacks.
- Moderate to advanced experience briefing executives related to cybercrime and information security incident triage, incident containment, and incident recovery.
- Moderate to advanced experience authoring complex communications related to cybercrime and information security incident triage, incident containment, and incident recovery.
- Moderate to advanced experience authoring and maintaining playbooks and other process/governance documentation.
Experience & Qualification Requirements:
- 5+ years of practical or relevant experience and knowledge of IT security and Incident
- Management practices across multiple domains
- Possess moderate to strong hands-on experience in all modern Operating Systems (Window/NIX/Cloud/Mobile)
- Possess strong hands-on experience with traditional incidents response detection tools such as SIEM, EDR, XDR, Firewall, WAF, email proxies, NIDS, and equivalent
- Advanced knowledge of organization, technology controls, cybersecurity, and risk assessment issues
Personal Attributes:
- Strong leadership and people building skills within IT and Cybersecurity
- Demonstrated ability to participate in complex, comprehensive or large projects and initiatives
- Ability to serve as a lead expert resource in technology controls and information security for project teams, the business, organization, and outside vendors
Responsibilities:
- Support learning and growth of our team members as a guide in Threat Defense Operations with a focus on mitigating risks to protect the client/bank.
- May also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
- Moderate to advanced hands-on experience on all modern operating systems, roles base access, internal files structures, registries, and data storage.
- Moderate to advanced experience as an Incident Manager working on complex information security and cybercrime-related incidents, requiring coordination with internal and external enterprise teams, as well as third parties, vendors, partners, etc.
- Moderate experience working cybersecurity events and incidents related to network layer 7/application and internet facing attacks.
- Moderate to advanced experience briefing executives related to cybercrime and information security incident triage, incident containment, and incident recovery.
- Moderate to advanced experience authoring complex communications related to cybercrime and information security incident triage, incident containment, and incident recovery.
- Moderate to advanced experience authoring and maintaining playbooks and other process/governance documentation
REQUIREMENT SUMMARY
Min:5.0Max:10.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
IT
Graduate
Proficient
1
Toronto, ON M5V 3A4, Canada