logo

View all jobs

Senior Information Security Analyst

Toronto, ON
Here’s the job opportunity…
The Senior Information Security Analyst, is a senior technical team member who will be fully
accountable for the day-to-day delivery of the Security Operations for ivari. You will be
responsible for the operational oversight of technology, processes, procedures, and overall
delivery of the Security Operations Program.
As a member and good team player of the Security Operations Team, you will be part of Cyber
Security Incident Response (CSIR) and coordination of responses to incidents, as well as
communicating with other stakeholders, investigative teams, management, and system/application
and business owners. You have accumulated experience and knowledge
 Handling the response and escalation of events that have been identified through various
sources and security technologies and controls as well as our internal Help Desk
notifications of security type events,
 Investigate data loss type incidents, network intrusion incidents as well as endpoint malware
infections including Ransomware type attacks,
 Managing response to alerts from various monitoring systems and platforms to address
potentially malicious events in a timely manner,
 Providing user support and troubleshooting security technology related incidents.
What we are looking for…
 5+ years of broad Cyber Security Experience, of which minimum 1 years should be as a Sr.
Security Analyst or similar role
 Bachelor’s degree in Computer science, Computer Engineering or equivalent.
 Accumulated Knowledge and hands-on experience of
o AD, OU, GPO, ADFS, Azure AD, MFA
o Azure Cloud Application Security, Microsoft Defender (for Identify, Endpoint,
O365 and Cloud App Security), Conditional Access Control, InTune, MAM
o Exchange online Protection, mail flow rules, SPF, DKIM, DMARC
o SEIM (MSSP, TIBCO LogLogic), Audit log, incident response and investigations
o IDS/IPS, Symantec Endpoint Protection
 Capable of work independently or as member of a team on
o Responding, investigating, and escalating alerted events and incidents from
various security technologies
o Maintaining continuous monitoring of network and end point activities,
 Certifications desired are: CISSP, GIAC Forensics, Incident Handling are all assets but
not mandatory
Powered by