Job descriptionE INC is the parent company of EBlock and EDealer, unifying our approach to products, services, and strategies under one Vision and one Mission: to create the best digital auction and retailing platform in the world by connecting the automotive wholesale and retail experiences. Our brands and their technologies make it easy for a vehicle to move between buyers and sellers throughout its entire ownership lifecycle. Learn more at https://e.inc/about
We are seeking an experienced, detail-oriented
Cybersecurity Engineer
to strengthen our organization’s information security posture across endpoints, networks, cloud services, and applications.
In this role, you will:
Own
threat and vulnerability management , driving remediation of misconfigurations and weaknesses across our environment.
Manage and tune our
security monitoring and incident response
capabilities using SIEM and observability tools (for example,
Datadog
and log pipelines).
Administer our
endpoint, web, and Zero Trust security stack , including
SentinelOne
for EDR/CNAPP,
Zscaler
for secure access and DLP, and
Cloudflare
for WAF, DNS, and Zero Trust web security.
Support
compliance and governance
efforts (with a focus on
SOC 2 , and exposure to frameworks like ISO 27001 and NIST).
Work closely with development and cloud teams to
secure workloads in AWS
and
fix vulnerable packages and dependencies in existing applications , not just new builds.
You’ll collaborate closely with IT, infrastructure, and application teams to design, implement, and continuously improve security controls that are practical, measurable, and audit‑ready.
We offer a competitive salary ($120,000.00 - $140,000.00); a competitive bonus plan; paid time off; participation in our benefits, RRSP, and life insurance programs; continuous learning; an amazing culture; and so much more!
What You Will Do
Threat & Vulnerability Management
Identify, assess, and prioritize vulnerabilities and misconfigurations across endpoints, networks, cloud environments, and applications.
Work with infrastructure and application owners to define and maintain
secure configuration baselines
and ensure timely remediation.
Use vulnerability management and configuration assessment tools (including data from platforms like
SentinelOne , cloud‑native security services, and code‑repository/package alerts) to track progress and risk reduction over time.
Partner with development teams to
review and remediate vulnerable third‑party packages and libraries
in existing applications (e.g., upgrading dependencies, adjusting configurations, and validating fixes).
Security Monitoring & Incident Response
Configure, manage, and tune
SIEM / security monitoring solutions
(for example,
Datadog , cloud logs, and other telemetry sources) to ensure high‑quality, actionable alerts.
Act as an escalation point for
high‑severity security incidents , including triage, containment, investigation, and recovery.
Maintain and improve
Incident Response (IR) runbooks
and procedures, including playbooks for phishing, malware, account compromise, and data exfiltration.
Participate in and help design
Disaster Recovery (DR)
and
Business Continuity Planning (BCP)
tabletop exercises, ensuring security scenarios are built into testing.
Administer and optimize
SentinelOne
for endpoint detection and response, ensuring policies, detections, and exclusions are well‑tuned.
Configure and manage
Zscaler
(Internet, Private Access, and DLP modules) to enforce secure internet and application access and prevent data loss.
Oversee
Cloudflare
security configurations for web applications and network services (including
Zero Trust, WAF, DNS, and related controls ).
Work with cloud and infrastructure teams to
secure AWS workloads
(e.g., IAM, security groups, network segmentation, logging, and encryption) and to integrate security controls into existing services running on AWS.
Collaborate with network and infrastructure teams to ensure
Zero Trust and defense‑in‑depth
principles are consistently applied across offices, remote users, and auction environments.
Application & Change Security
Collaborate with developers and product teams to understand application architectures and
remediate security findings in existing services , including:
Updating or replacing vulnerable packages and libraries,
Adjusting application and container configurations,
Validating fixes with follow‑up testing and monitoring.
Provide security input into
change management processes , ensuring significant changes consider security impact and include an appropriate rollback and validation plan.
Contribute to secure coding and dependency management guidance that is practical for teams maintaining existing systems.
Compliance, Governance & Audit Support
Support
SOC 2
and related compliance programs by maintaining and providing
technical evidence of security controls
(e.g., logs, reports, screenshots, and configuration exports).
Work with internal stakeholders and external auditors to ensure security measures align with
SOC 2, ISO 27001, and NIST‑aligned
controls where applicable.
Enhance, document, and automate security controls to ensure
continuous audit readiness , leveraging systems such as
FreshService
(for tickets, changes, and asset records) and
Trelica
(for SaaS visibility and contract mapping).
Email & Data Security
Manage and improve
email security
configurations (phishing protection,
DKIM/SPF/DMARC , impersonation protection, safe links/attachments).
Implement and tune
data loss prevention (DLP)
and encryption controls across endpoints, email, and web traffic (for example, via
Zscaler ,
Cloudflare , and endpoint agents).
Partner with
Hexnode MDM
and IT operations to enforce device posture and encryption requirements for managed endpoints.
Work closely with Infrastructure, IT, Application, and Compliance teams to ensure security is embedded into technical and business processes.
Provide security guidance during new technology evaluations, deployments, and changes, especially those impacting AWS‑hosted services and existing applications.
Travel up to
25%
(including occasional visits to offices or auction sites) to support assessments, deployments, training, and incident/BCP exercises.
What You Will Need
Required:
3–5 years of experience in
cybersecurity
or a similar technical security role.
Hands‑on experience managing and securing
workloads in AWS
(e.g., IAM, security groups, CloudTrail, VPC/networking, Security Hub, Inspector, logging/monitoring, and encryption).
Strong understanding of
SIEM , endpoint protection, and network security principles.
Hands‑on experience with
Zscaler, SentinelOne, and Cloudflare
(or comparable technologies) for secure access, endpoint protection, and web application security.
Practical experience
remediating vulnerabilities in existing applications , including updating or replacing vulnerable endpoint/application packages and libraries and validating fixes with monitoring and logs.
Knowledge of
incident response frameworks
and
playbook/runbook development .
Experience providing, organizing, or managing
SOC 2 technical evidence
and working with auditors or external assessors.
Excellent troubleshooting, analytical, and problem‑solving skills.
Ability to work independently in fast‑paced environments with minimal supervision.
Valid driver’s license and ability to travel as required.
Languages: English (required), French (an asset)
Preferred:
Experience with additional
cloud platforms
(e.g.,
AWS, GCP ) and multi‑cloud security patterns.
Background supporting
compliance programs
such as
SOC 2 ,
ISO 27001 , and
NIST -based frameworks.
Experience working with
ITSM and asset management tools
(e.g.,
FreshService ),
MDM platforms
(e.g.,
Hexnode ), and
SaaS / cost management tools
(e.g.,
Trelica ).
What We Offer
Competitive pay
401k/RSP programs
Paid time off
Flexible working environment
And an amazing culture to top it all off!
At E INC, in the spirit of pay transparency, we are excited to share our base pay as it is one part of our total compensation package and is determined within a range. The base pay range for this full‑time position is $120,000.00 - $140,000.00, and this role may be eligible for discretionary bonuses or commission payments. Your base pay will depend on your skills, qualifications, experience, and location. In addition, our ranges are determined by role, level, and location.
E INC is committed to providing employment accommodation in accordance with the Ontario Human Rights Code and the Accessibility for Ontarians with Disabilities Act. If contacted for an employment opportunity, please advise Human Resources if you require accommodation.
E INC is an equal opportunity employer and affirmatively seeks diversity in its workforce. E INC recruits qualified applicants and advances in employment its employees without regard to race, color, religion, gender, sex (including pregnancy), sexual orientation, gender identity, gender expression, age, disability, genetic information, ethnic or national origin, marital status, veteran status, or any other categories protected by law.
E INC takes cybersecurity seriously. E INC will reach out to candidates via our Application Tracking System Rippling, LinkedIn, and Indeed, through company accounts. E INC does not require bank information, date of birth, social identification information, or upfront fees as part of our application process.
As part of our recruitment and hiring process, E INC may use automated tools including artificial intelligence (AI) to support the screening and evaluation of applicants. AI tools support human decision‑making and do not replace individualized review by our hiring team. E INC is committed to using these technologies responsibly and in compliance with applicable laws and regulations, and we regularly assess our processes to promote fairness, objectivity, and data protection.
#J-18808-Ljbffr