Info Security Analyst IV
Location : Toronto, ON / Hybrid
Duration : months with possible extension
Description : Scope of project :
Recurring project, validate security, mature the platform that they have and validate the security checks year after year.
Team size / culture :
Pod structure team members HM and contractor are going to be working together
Candidate profile details :
Degree / Certifications Required :
Degree, computer area - foc
Years of Overall Experience :
Ideal Candidate Background :
Cyber security, thread hunting in the domain, hunting operations, attacker tactics, , techniques, and procedures (TTPs) and coding, PowerShell and python – purple teaming, thread hunting, preforming validation checks
Summary of day-to-day responsibilities :
Must-have hard skills :
Advanced knowledge of security incident and event management, log analysis, Network traffic analysis, Malware investigation and remediation.
Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office , and Azure is preferred.
Familiarity with Breach and Attack Simulation (Client) solutions
Excellent problem-solving and analytical skills.
Good communication
phyton or PowerShell
thread hunting, incident response, Digital Forensics and purple teaming
Nice-To-Have
Banking or financial institution
Any engineering exp
Job Description :
Develop and implement a controls assurance strategy structured around the MITRE Telecommunication&CK framework
Creating realistic attack scenarios based on attacker tactics, techniques, and procedures (TTPs) to test the effectiveness of security controls across various systems and networks.
Collaboratively identify key security controls, monitor gaps in their implementation, and work closely with relevant teams to remediate identified issues.
Staying current with industry best practices, emerging threats, and relevant regulatory requirements to ensure a comprehensive understanding of the evolving cybersecurity landscape.
Collaborate with cyber threat intelligence, threat hunting, and threat detection engineering groups to identify and prioritize key security controls, and gaps, and ensure appropriate alerting feedback.
Generating comprehensive reports detailing simulation findings, including actionable recommendations for remediation and security posture improvement to relevant stakeholders.
Collaborate with other members of the cybersecurity team to analyze and interpret the results of simulated attacks.
Continuously improve and refine the breach and attack simulation process to enhance its effectiveness.
Make recommendations for security posture improvements based on analysis of breach and attack simulation trends.
Work with senior analysts and leadership to develop relevant Client dashboards to represent program value.
Quantify risk reduction due to breach and attack simulation program
Leverage APIs and automation techniques to integrate Client with other security tools.
Job Requirements :
What can you bring to client :
Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. It helps if you have :
Advanced knowledge of security incident and event management, log analysis, Network traffic analysis, Malware investigation and remediation.
Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office , and Azure is preferred.
Strong software development skills, with proficiency in Python, PowerShell, and other relevant languages.
Familiarity with Breach and Attack Simulation (Client) solutions (, AttackIQ, Atomic Red Team, etc.) and the MITRE Telecommunication&CK framework
Offensive security skills such as penetration testing or vulnerability assessment.
Familiarity with MITRE Telecommunication&CK, SIEM, EDR, and security control validation
Knowledge of common security controls, best practices, and attacker techniques.
Excellent problem-solving and analytical skills.
Security Analyst • Toronto, ON