Talent.com
Security Analyst - Vulnerability Management (GCS)

Security Analyst - Vulnerability Management (GCS)

RBC - Royal BankToronto, ON
30+ days ago
Salary
CAD80000–CAD90000 yearly
Job description

Job Summary

Job Description

What is the opportunity?

RBC's enterprise Vulnerability Management team is undertaking multiple complex enterprise-wide initiatives as part of RBC's ongoing plan to accelerate and transform vulnerability management across the organization. In this role you will be responsible for planning and managing successful implementation of the vulnerability management program's strategic objectives. The role will coordinate, develop, communicate and execute technical activities to ensure objectives are accomplished on time. The ideal candidate will have a foundation in IT with a passion for cybersecurity, including strong relationship management skills with the ability to support and partner with stakeholders.

What will you do?

Manage vulnerabilities across asset domains including applications, infrastructure, cloud, network devices, penetration tests and third-party assets.

Continually develop new innovative vulnerability management solutions and strategies to ensure RBC's cyber security defenses remain effective, relevant and are equipped for evolving attack surfaces in addition to emerging threats.

Manage the implementation of multiple concurrent vulnerability management initiatives of varying complexity in a timely and efficient manner.

Work in collaboration as a trusted partner to ensure that request tickets are managed and executed in alignment with the program strategy and goals.

Continuously identify potential issues, conflicts, and risks. Analyze, mitigate and escalate where appropriate

Establish strong working relationships across business units and platforms to build influence and impact with key business partners. Collaborate with groups to define and achieve deliverables and ensure initiatives are effectively integrated into RBC standards, procedures and processes.

Research and assess emerging security threats and vulnerabilities.

What do you need to succeed?

Must-have

Background in Information Technology, experience ideally in a large enterprise environment

Curiosity and passion for cyber security & vulnerability management.

Strong organizational, project management and time management capabilities.

Deadline-driven and results-oriented; able to meet consistently high quality standards while handling a variety of tasks and deadlines simultaneously.

Knowledge or experience with application development, developer tools (IDEs, GitHub, Jenkins) and enterprise network environments (Cloud, On-Prem, Hybrid)

Demonstrated ability to analyze complex security vulnerabilities and ability to communicate effectively

Understanding of key security concepts and analytical techniques.

Nice-to-have

Vulnerability management tools such as Tenable, Aqua, Xpanse.

Hands-on experience with JIRA, Confluence, Tableau

Experience with application development

Cyber Security or other IT related certifications

Knowledge of SQL databases

What's in it for you?

We thrive on the challenge to be our best, progressive thinking to keep growing, and working together to deliver trusted advice to help our clients thrive and communities prosper. We care about each other, reaching our potential, making a difference to our communities, and achieving success that is mutual.

A comprehensive Total Rewards Program including bonuses and flexible benefits, competitive compensation, commissions, and stock where applicable

Leaders who support your development through coaching and managing opportunities

Ability to make a difference and lasting impact

Work in a dynamic, collaborative, progressive, and high-performing team

A world-class training program in financial services

Flexible work / life balance options

Opportunities to do challenging work

techpj

li-hybrid

li-post

Job Skills

Confidentiality, Cyber Security Management, Decision Making, Detail-Oriented, Encryption Software, Group Problem Solving, High Impact Communication, Information Security Management, Information Technology Security