Sr. Security Analyst at OpenText
Richmond Hill, ON L4B 4N8, Canada -
Full Time


Start Date

Immediate

Expiry Date

24 Apr, 25

Salary

0.0

Posted On

25 Jan, 25

Experience

0 year(s) or above

Remote Job

No

Telecommute

No

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

Hiring Manager: Kulvinder Gohlar
Talent Acquisition Advisor: Carrol Isaacs
Job Code Level: IYP3
Refer Your Friends!
Incident Response Security Analyst - Hybrid opportunity (In-office Tues/Wed/Thurs)
Global Information Security (GIS) leverages our people, processes and technology to develop new digitalization efforts that ensure our enterprise systems’ reliability, minimize staff interaction, and most importantly, protect our customers’ data. Companies recognize the need to digitize information and manage alternative work scenarios in today’s changing reality. With this in mind, we work tirelessly to drive improvements across our security services and accelerate our customers’ digital journey in a safe and trusted environment.
Security Operations is the team that handles day to day protection of our environment and the tools that support them. This team takes care of identifying security weaknesses and facilitates remediation efforts. Additionally, this team monitors networks to assesses abnormal behaviors and manages security incidents to allow for execution of response processes.

Responsibilities
  • Managing the lifecycle of a security incident from detection to resolution
  • Coordinating with IT operations, engineering teams, and stakeholders to execute containment, eradication, and remediation activities inresponse to incidents
  • Performingdigital forensic investigations, able to collect and analyze digital evidence in a forensically sound and defensible manner and familiar with associated legal concepts
  • Communicating up or down, technical and non-technical report writing, prioritizing information, and presenting findings to technical teams and senior management in a clear and precise manner
  • Understanding the current regulatory environment in most major geographies and how to identify data privacy issues and potential reporting requirements during incidents and investigations
  • Researching and understandingCybersecurity threats andthreat actors
  • Running After Action Reviews to make improvements to existing detection and response capabilities
  • Developing and testing Incident Response plans.
  • Developing and implementing processes and procedures, identifying improvements, and driving efficiencies
  • Compiling and analyzing response data for management reporting and metrics.
Loading...