thank you for subscribing to your personalised job alerts.

    4 jobs found for siem

    filter1
    clear all
      • Québec, Québec
      • Contract
      Profile and specialtyIn addition to the criteria of the Framework Agreement, the operational security analyst must have:Significant experience in the operation of a SIEM and new generation firewalls (Checkpoint an asset).Knowledge of the security of Windows, Linux and Azure environments.Knowledge of anti-spam solutionsThe following professional skills are required:Have an excellent team spirit and collaboration;Show leadership;Demonstrate a good tolerance for ambiguity and stress;Be autonomous, rigorous and methodical.The resource will have to go through the process in order to have level 2 security clearance from the Ministry of Public Security.Specific mandate requirementsGood knowledge of the IBM Qradar solutionGood knowledge of firewall managementExperience in response and investigation of IT security incidents (Incident Response)DESCRIPTION OF THE MANDATEContextThe Authority needs a cybersecurity analyst (operational security) in its operational security center (SOC) toreplace a resource on temporary absence and to help the SOC team move forward with certain cybersecurity projects. The resourcewill be required to provide cybersecurity surveillance services outside normal business hours on a periodic basis.Scope and activities requested for a specific mandateMaintenance and operation of cybersecurity tools (NGFW, IDS, IPS, SIEM, Antivirus, EDR etc.)Implementation of security controls in support of the Authority's IT projectsParticipate in the implementation of an X / EDR / SOAR solutionDeliverables requested for a specific mandateThreat huntImplementation of new proactive security controlsSupport to infrastructure teams in systems securityProvide incident response during network monitoring activitiesAdvantages_____________________________________________________________________________________________Responsibilities_____________________________________________________________________________________________Qualifications_____________________________________________________________________________________________Summary_____________________________________________________________________________________________
      Profile and specialtyIn addition to the criteria of the Framework Agreement, the operational security analyst must have:Significant experience in the operation of a SIEM and new generation firewalls (Checkpoint an asset).Knowledge of the security of Windows, Linux and Azure environments.Knowledge of anti-spam solutionsThe following professional skills are required:Have an excellent team spirit and collaboration;Show leadership;Demonstrate a good tolerance for ambiguity and stress;Be autonomous, rigorous and methodical.The resource will have to go through the process in order to have level 2 security clearance from the Ministry of Public Security.Specific mandate requirementsGood knowledge of the IBM Qradar solutionGood knowledge of firewall managementExperience in response and investigation of IT security incidents (Incident Response)DESCRIPTION OF THE MANDATEContextThe Authority needs a cybersecurity analyst (operational security) in its operational security center (SOC) toreplace a resource on temporary absence and to help the SOC team move forward with certain cybersecurity projects. The resourcewill be required to provide cybersecurity surveillance services outside normal business hours on a periodic basis.Scope and activities requested for a specific mandateMaintenance and operation of cybersecurity tools (NGFW, IDS, IPS, SIEM, Antivirus, EDR etc.)Implementation of security controls in support of the Authority's IT projectsParticipate in the implementation of an X / EDR / SOAR solutionDeliverables requested for a specific mandateThreat huntImplementation of new proactive security controlsSupport to infrastructure teams in systems securityProvide incident response during network monitoring activitiesAdvantages_____________________________________________________________________________________________Responsibilities_____________________________________________________________________________________________Qualifications_____________________________________________________________________________________________Summary_____________________________________________________________________________________________
      • Toronto, Ontario
      • Permanent
      The Information Security Analyst will implement the information security program initiatives, administer information security systems, and assist with monitoring information security policy compliance. Major focus of this role is on GRC ! The Analyst along with the Information Security team will be developing the information security maturity of the organization as well as performing operational activities on implemented information security controls to ensure information security policies are being followed. The role will be responsible for various activities to build information security including developing appropriate documentation, building awareness, implementing technologies, and identifying information security weaknesses with the objective of protection of information assets.AdvantagesAside from joining an industry leader in security; successful candidates will receive great compensation and enjoy working with an amazing team.ResponsibilitiesWith a large focus on GRC ......-Work with the Information Security team, businesses, vendors, and IT teams to ensure that corporate policies and procedures are being understood and followed-Write procedures and technical standards to meet corporate policies and industry best practices-Evolve corporate security policies and procedures to stay aligned with the security industry best practices-Develop and improve internal processes to manage information security corporate-wide-Lead initiatives related to the remediation of security weaknesses or information security solution implementation while working with corporate-wide businesses, vendors, and the IT team as needed-Review technical configurations from various operating systems and security solutions (Windows, Linux, AD, VMware, IDS/IPS, FIM, SIEM, WAF, AV, endpoint encryption, etc.) to determine/enhance the parameters to meet industry-accepted hardening standards such as NIST, CIS, SANS, etc.-Review security reports from various security technologies (vulnerability assessment reports, cybersecurity reports, audit reports, access privileges, etc.) to identify violations, intrusion attempts, or security weaknesses-Provide recommendations and guide development and operations team to address security weaknesses and identify potential new security solutions-Monitor the information security industry and be proactive with implementing appropriate information protection controls to mitigate risks on the latest types of vulnerabilities-Conduct security product research and assess their appropriateness for the organization-Produce report and presentation deliverables with attention to content as well as format-Perform security incident investigations and document findings/root causes-Perform Identity and Access management tasks-Respond to alerts and notifications from users/vendors related to information security-Develop and improve internal team processes to effectively manage information security corporate-wide-Review potential new service provider or outsourcing relationships for business units and provide advisory services for information security due diligence-Evolve corporate security policies, procedures, and standards to align with the security industry best practices-Review new IT implementations and identify security risks in network design and configurationQualifications-Post-secondary degree or equivalent education in computer science, computer engineering, or similar studies-Information security certifications such as CISSP, GIAC, CRISC, etc.-Previous experience of 4-6 years specifically in the information security industry preferred-Knowledge of current network and endpoint security technologies important (next-generation tools, APT tools, and tools utilizing heuristics analysis for protection)-Strong knowledge of technical configurations from various operating systems and security solutions (Windows, Linux, VMware, IDS/IPS, HIPS, FIM, SIEM, WAF, Cyber Security, encryption, etc.)-Working knowledge of industry security standards such as ISO27001/ISO27002, NIST, etc.-Demonstrated experience working with security technologies-Demonstrated experience with implementing internal processes to manage information security initiatives-Working knowledge of network architecture with multiple layers of defense-Working knowledge of application security vulnerabilitiesMUST HAVE QUALIFICATIONSInformation Security 5-8 yearsIDS/IPS, HIPS, FIM, SIEM, WAF, Cyber Security, encryption, etc. 5-8 yearsKnowledge of Application Security 3-5 yearsKnowledge of Network Security 3-5 yearsNICE TO HAVE QUALIFICATIONSKnowledge of security standards such as ISO27001/ISO27002, NIST, etc. 2-3 yearsInformation security certifications such as CISSP, GIAC, CRISC, etc. 2-3 yearsSummaryFor immediate consideration please send your resume to Samia Hussaini at : samia.hussaini@randstad.ca,
      The Information Security Analyst will implement the information security program initiatives, administer information security systems, and assist with monitoring information security policy compliance. Major focus of this role is on GRC ! The Analyst along with the Information Security team will be developing the information security maturity of the organization as well as performing operational activities on implemented information security controls to ensure information security policies are being followed. The role will be responsible for various activities to build information security including developing appropriate documentation, building awareness, implementing technologies, and identifying information security weaknesses with the objective of protection of information assets.AdvantagesAside from joining an industry leader in security; successful candidates will receive great compensation and enjoy working with an amazing team.ResponsibilitiesWith a large focus on GRC ......-Work with the Information Security team, businesses, vendors, and IT teams to ensure that corporate policies and procedures are being understood and followed-Write procedures and technical standards to meet corporate policies and industry best practices-Evolve corporate security policies and procedures to stay aligned with the security industry best practices-Develop and improve internal processes to manage information security corporate-wide-Lead initiatives related to the remediation of security weaknesses or information security solution implementation while working with corporate-wide businesses, vendors, and the IT team as needed-Review technical configurations from various operating systems and security solutions (Windows, Linux, AD, VMware, IDS/IPS, FIM, SIEM, WAF, AV, endpoint encryption, etc.) to determine/enhance the parameters to meet industry-accepted hardening standards such as NIST, CIS, SANS, etc.-Review security reports from various security technologies (vulnerability assessment reports, cybersecurity reports, audit reports, access privileges, etc.) to identify violations, intrusion attempts, or security weaknesses-Provide recommendations and guide development and operations team to address security weaknesses and identify potential new security solutions-Monitor the information security industry and be proactive with implementing appropriate information protection controls to mitigate risks on the latest types of vulnerabilities-Conduct security product research and assess their appropriateness for the organization-Produce report and presentation deliverables with attention to content as well as format-Perform security incident investigations and document findings/root causes-Perform Identity and Access management tasks-Respond to alerts and notifications from users/vendors related to information security-Develop and improve internal team processes to effectively manage information security corporate-wide-Review potential new service provider or outsourcing relationships for business units and provide advisory services for information security due diligence-Evolve corporate security policies, procedures, and standards to align with the security industry best practices-Review new IT implementations and identify security risks in network design and configurationQualifications-Post-secondary degree or equivalent education in computer science, computer engineering, or similar studies-Information security certifications such as CISSP, GIAC, CRISC, etc.-Previous experience of 4-6 years specifically in the information security industry preferred-Knowledge of current network and endpoint security technologies important (next-generation tools, APT tools, and tools utilizing heuristics analysis for protection)-Strong knowledge of technical configurations from various operating systems and security solutions (Windows, Linux, VMware, IDS/IPS, HIPS, FIM, SIEM, WAF, Cyber Security, encryption, etc.)-Working knowledge of industry security standards such as ISO27001/ISO27002, NIST, etc.-Demonstrated experience working with security technologies-Demonstrated experience with implementing internal processes to manage information security initiatives-Working knowledge of network architecture with multiple layers of defense-Working knowledge of application security vulnerabilitiesMUST HAVE QUALIFICATIONSInformation Security 5-8 yearsIDS/IPS, HIPS, FIM, SIEM, WAF, Cyber Security, encryption, etc. 5-8 yearsKnowledge of Application Security 3-5 yearsKnowledge of Network Security 3-5 yearsNICE TO HAVE QUALIFICATIONSKnowledge of security standards such as ISO27001/ISO27002, NIST, etc. 2-3 yearsInformation security certifications such as CISSP, GIAC, CRISC, etc. 2-3 yearsSummaryFor immediate consideration please send your resume to Samia Hussaini at : samia.hussaini@randstad.ca,
      • Montréal, Québec
      • Contract
      You develop security architectures as part of various complex and transversal projects.You design and implement technological solutions aimed at meeting the evolving needs and technological targets of the organization.You represent the unit to various decision-making bodies and assume the functional supervision, coordination and coaching of professionals in his unit.Your role is to design detailed architectures, software, and testing and implementation strategies for very large-scale, cross-functional and highly innovative projects and files. You analyze, develop and recommend solutions and directions at the functional, organic or technological level. The importance of mastering technology and anticipating innovations as well as your ability to optimize work processes then become essential skills. You play an advisory role with customers and various stakeholders in integration and linkage, requiring you to know how to communicate effectively and demonstrate a detailed understanding of the needs of the various interlocutors. The nature of the files requires extensive and in-depth expertise in your field. The files and projects under your responsibility are strategic in nature and involve very high operational and conceptual complexity. These require a comprehensive and in-depth analysis and understanding of the business field and the organization. There are many tie-downs. You are called upon to interact with a large number of stakeholders working in various fields of expertise. You act as a consultant and exercise a leadership and influencing role with senior management, authorities and your unit.Additional Responsibilities:- Design the secure technological solutions necessary for the advancement of projects under his responsibility and develop detailed architectures in his field of expertise, configurations and implementation plans for solutions meeting the evolving needs and technological targets of the 'organization.- Act as a security consultant in his field of specialty with various stakeholders and authorities.- Carry out analyzes of needs, performance capacity, production costs and determine the appropriate strategies.- Represent his unit to various committees and departments in connection with the mandates entrusted to him.- Coordinate a team of professionals during construction projects and perform the required tie-downs.- Participate in the development of operating targets and their transition strategy.- Ensure a watchdog role in order to understand and anticipate current trends and best practices in his field of expertise- Ensure the quality of the deliverables of the projects under his responsibility.Required profile :- Bachelor's degree in an appropriate discipline- A minimum of eight years of relevant experience- Experience in agile and squad mode (an asset)Specific knowledge- Knowledge of best practices in identity management, authentication and authorization of access to IT assets- Knowledge of products and technologies enabling the efficient application of authentication and authorization in a large enterprise- Knowledge of card payment systems, applicable regulations and related security and compliance features- Knowledge of application security and applicable methodologies- Knowledge of network security and applicable solutions, including firewalls, IPS, IDS, SIEM, NGFW, proxies, gateways, WiFi, segmentation, micro-segmentation, etc.- Knowledge of cloud computing security and applicable solutions- Knowledge of systems security, including operating systems, database management systems,- the concepts of hardening, deployment of global policies, BYOD, NGAV, EDR, update evaluation, etc.- Intermediate level knowledge of EnglishAdvantages__________________________________________________________________________________Responsibilities__________________________________________________________________________________Qualifications__________________________________________________________________________________Summary__________________________________________________________________________________
      You develop security architectures as part of various complex and transversal projects.You design and implement technological solutions aimed at meeting the evolving needs and technological targets of the organization.You represent the unit to various decision-making bodies and assume the functional supervision, coordination and coaching of professionals in his unit.Your role is to design detailed architectures, software, and testing and implementation strategies for very large-scale, cross-functional and highly innovative projects and files. You analyze, develop and recommend solutions and directions at the functional, organic or technological level. The importance of mastering technology and anticipating innovations as well as your ability to optimize work processes then become essential skills. You play an advisory role with customers and various stakeholders in integration and linkage, requiring you to know how to communicate effectively and demonstrate a detailed understanding of the needs of the various interlocutors. The nature of the files requires extensive and in-depth expertise in your field. The files and projects under your responsibility are strategic in nature and involve very high operational and conceptual complexity. These require a comprehensive and in-depth analysis and understanding of the business field and the organization. There are many tie-downs. You are called upon to interact with a large number of stakeholders working in various fields of expertise. You act as a consultant and exercise a leadership and influencing role with senior management, authorities and your unit.Additional Responsibilities:- Design the secure technological solutions necessary for the advancement of projects under his responsibility and develop detailed architectures in his field of expertise, configurations and implementation plans for solutions meeting the evolving needs and technological targets of the 'organization.- Act as a security consultant in his field of specialty with various stakeholders and authorities.- Carry out analyzes of needs, performance capacity, production costs and determine the appropriate strategies.- Represent his unit to various committees and departments in connection with the mandates entrusted to him.- Coordinate a team of professionals during construction projects and perform the required tie-downs.- Participate in the development of operating targets and their transition strategy.- Ensure a watchdog role in order to understand and anticipate current trends and best practices in his field of expertise- Ensure the quality of the deliverables of the projects under his responsibility.Required profile :- Bachelor's degree in an appropriate discipline- A minimum of eight years of relevant experience- Experience in agile and squad mode (an asset)Specific knowledge- Knowledge of best practices in identity management, authentication and authorization of access to IT assets- Knowledge of products and technologies enabling the efficient application of authentication and authorization in a large enterprise- Knowledge of card payment systems, applicable regulations and related security and compliance features- Knowledge of application security and applicable methodologies- Knowledge of network security and applicable solutions, including firewalls, IPS, IDS, SIEM, NGFW, proxies, gateways, WiFi, segmentation, micro-segmentation, etc.- Knowledge of cloud computing security and applicable solutions- Knowledge of systems security, including operating systems, database management systems,- the concepts of hardening, deployment of global policies, BYOD, NGAV, EDR, update evaluation, etc.- Intermediate level knowledge of EnglishAdvantages__________________________________________________________________________________Responsibilities__________________________________________________________________________________Qualifications__________________________________________________________________________________Summary__________________________________________________________________________________
      • Saint-Laurent, Québec
      • Contract
      Job title : Cloud Security SpecialistOverview Of The Role:we are looking for a Cloud Security Specialist in Montreal. Reporting to the IT Manager Security and Compliance. The position is a key role responsible to elevate our security posture with the Microsoft Azure environment. The main responsibility of the role will be to manage the cloud access security broker (CASB) from Microsoft to take control of your cloud environment and perform vendor evaluation and assessment to validate compliance.Other important responsibilities are in regards with securing the Azure environment and combat cyberthreats.The role will be equally exposed to operation and project activities, and will contribute in defining the safeguards needed, and to influence the evolution of the company’s standards and controls.How You Will Make Contributions That Matter:Cloud security analysis, recommendations and configurations of our Microsoft Azure environment such as 0365 security and compliance, MCAS, PIM, Intune, SharePoint, One Drive, Teams, Exchange, AAD, 0365 DLP, Azure Information Protection (AIP) and Exchange Online Protection, Microsoft MFA, SSO, Conditional Access, B2B and B2C;Performing security technical health checks for these Cloud platforms/environments prior to broader deployments;Assisting with configuration and delivery of cloud security and compliance reports;Designing and developing cloud-specific security policies, standards and procedures e.g., O365/EMS tenant management and configuration;Identify management and access control, firewall management;Cloud Cyber Security – Incident response and investigation;Auditing and monitoring, security incident and event management, data protection (DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management;Acting as a subject matter expert on cloud cyber risk for the Microsoft AAD, O365 and EMS platforms;Documenting platform technical issues, analysis and resolution as part of cyber risk mitigation steps;Familiarity with some of all of Microsoft Security set of technology and depth experience in at least 1 one of the following : Microsoft Cloud App Security (MCAS) / Office 365 Cloud App Security (OCAS) / Office365 / Azure Advanced Threat Protection;Experience with modern security related subjects and trends : Phishing, threat hunting, and pen testing.You Are Best Suited for The Role If You Have the Following Qualifications:1+ years of hands-on technical experience enterprise-level security incident and event management (SIEM);1+ years of hands-on CASB/DLP systems implementation or operations;Experience with Web proxy Zscaler, a strong asset;Undergraduate degree in Information Management, Computer Science, Computer Engineering, Cyber Security, Information Security or related field;Overall 8+ years of information security consulting, security operations or advisory;Strong interpersonal and communication skills;Demonstrable understanding of how to network and develop working relationships with various key stakeholders;Ability to work with teams to achieve goals and meet deadlines in a fast-paced environment;Works well under pressure and time constraints and can prioritize competing priorities appropriately;An understanding of regulatory and Controls requirements: NIST CSF, MITRE Frameworks, ISO 2700X, PCI-DSS) and cybersecurity and data privacy laws/regulations (e.g. PIPEDA, GDPR);Can work independently with minimal supervision and direction;C ertifications such as: CCSP, CCSK, CISSP, MCSE, MCSA , CCNP, CCNA, certification a strong asset;Broad understanding of Cybersecurity framework (NIST Cybersecurity Framework, ISO27002);Knowledge of information security and risk mitigation principles, theories and techniques;Excellent French and English written and verbal communication skills. Spanish an asset.Advantages________________________________________________________________________________________________Responsibilities________________________________________________________________________________________________Qualifications________________________________________________________________________________________________Summary________________________________________________________________________________________________
      Job title : Cloud Security SpecialistOverview Of The Role:we are looking for a Cloud Security Specialist in Montreal. Reporting to the IT Manager Security and Compliance. The position is a key role responsible to elevate our security posture with the Microsoft Azure environment. The main responsibility of the role will be to manage the cloud access security broker (CASB) from Microsoft to take control of your cloud environment and perform vendor evaluation and assessment to validate compliance.Other important responsibilities are in regards with securing the Azure environment and combat cyberthreats.The role will be equally exposed to operation and project activities, and will contribute in defining the safeguards needed, and to influence the evolution of the company’s standards and controls.How You Will Make Contributions That Matter:Cloud security analysis, recommendations and configurations of our Microsoft Azure environment such as 0365 security and compliance, MCAS, PIM, Intune, SharePoint, One Drive, Teams, Exchange, AAD, 0365 DLP, Azure Information Protection (AIP) and Exchange Online Protection, Microsoft MFA, SSO, Conditional Access, B2B and B2C;Performing security technical health checks for these Cloud platforms/environments prior to broader deployments;Assisting with configuration and delivery of cloud security and compliance reports;Designing and developing cloud-specific security policies, standards and procedures e.g., O365/EMS tenant management and configuration;Identify management and access control, firewall management;Cloud Cyber Security – Incident response and investigation;Auditing and monitoring, security incident and event management, data protection (DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management;Acting as a subject matter expert on cloud cyber risk for the Microsoft AAD, O365 and EMS platforms;Documenting platform technical issues, analysis and resolution as part of cyber risk mitigation steps;Familiarity with some of all of Microsoft Security set of technology and depth experience in at least 1 one of the following : Microsoft Cloud App Security (MCAS) / Office 365 Cloud App Security (OCAS) / Office365 / Azure Advanced Threat Protection;Experience with modern security related subjects and trends : Phishing, threat hunting, and pen testing.You Are Best Suited for The Role If You Have the Following Qualifications:1+ years of hands-on technical experience enterprise-level security incident and event management (SIEM);1+ years of hands-on CASB/DLP systems implementation or operations;Experience with Web proxy Zscaler, a strong asset;Undergraduate degree in Information Management, Computer Science, Computer Engineering, Cyber Security, Information Security or related field;Overall 8+ years of information security consulting, security operations or advisory;Strong interpersonal and communication skills;Demonstrable understanding of how to network and develop working relationships with various key stakeholders;Ability to work with teams to achieve goals and meet deadlines in a fast-paced environment;Works well under pressure and time constraints and can prioritize competing priorities appropriately;An understanding of regulatory and Controls requirements: NIST CSF, MITRE Frameworks, ISO 2700X, PCI-DSS) and cybersecurity and data privacy laws/regulations (e.g. PIPEDA, GDPR);Can work independently with minimal supervision and direction;C ertifications such as: CCSP, CCSK, CISSP, MCSE, MCSA , CCNP, CCNA, certification a strong asset;Broad understanding of Cybersecurity framework (NIST Cybersecurity Framework, ISO27002);Knowledge of information security and risk mitigation principles, theories and techniques;Excellent French and English written and verbal communication skills. Spanish an asset.Advantages________________________________________________________________________________________________Responsibilities________________________________________________________________________________________________Qualifications________________________________________________________________________________________________Summary________________________________________________________________________________________________

    thank you for subscribing to your personalised job alerts.

    It looks like you want to switch your language. This will reset your filters on your current job search.