Cyber Risk & Compliance β’ Cyber Advisory β’ Cyber Intelligence β’ Cyber Operations β’ Managed Detection and Response
51 - 200
October 20
Cyber Risk & Compliance β’ Cyber Advisory β’ Cyber Intelligence β’ Cyber Operations β’ Managed Detection and Response
51 - 200
β’ Lead the delivery of advanced Managed Extended Detection & Response (MXDR) service processes, including remote incident response, threat event lifecycle management, Threat Hunting, and Threat Intelligence activities β’ Lead and execute escalated remote incident response engagements, including incident triage and containment, forensic artefact analysis, incident reporting, and stakeholder management (customers, internal SOC, legal teams, etc.) β’ Provide proper and intelligent Incident Handling during active Incident Response engagements β’ Actively execute Threat Hunting and other proactive activities in customer environments β’ Support the implementation and maintenance of Threat Intelligence practices, including IOC integration into MDR services and providing customer specific tactical and C-Level threat intelligence briefs β’ Develop, execute, and train staff on MXDR service threat triaging, Threat Hunting, and Threat Intelligence processes β’ Provide technical guidance and mentorship to SecOps Analysts β’ Develop and enforce standards and processes to ensure high quality MXDR service delivery (e.g. case management standards) β’ Work closely with the Cyber Research & Response team members to iteratively enhance MXDR capabilities and other managed security services (e.g. sharing activity results for detection engineering requirements) β’ Support customer service communications, including operational and executive level meetings and reporting β’ Identify, develop, communicate and implement process improvements to streamline C3 practices and enhance the customer experience
β’ Minimum of 5 years of IT security related work experience required β’ College Diploma or University Degree, preferably in technology, required β’ Strong technical experience in the execution of security operations processes, including threat event lifecycle management, Incident Response, Forensic Investigations, Threat Hunting, and Threat Intelligence activities β’ Strong technical expertise with security operations technologies including but not limited to SIEM, EDR, Threat Intelligence, and SOAR platforms β’ Certifications in digital forensics and incident response, such as GIAC GCFA, GCFR, GCIH, GREM strongly preferred β’ Experience with some of the following technologies preferred: Microsoft Sentinel, Microsoft Defender for Endpoint, Microsoft 365 and Azure security services, Azure services and cloud service automation β’ Experience working with security operations teams required β’ Strong background in customer service and communications required β’ Strong presentation development, reporting and delivery skills required β’ Familiarity with Agile methodologies such as Lean, Scrum and Kanban preferred β’ Strong ability to communicate and document clearly and effectively β’ Ability to follow processes and guidelines β’ Ability to work with all levels of staff β’ Ability to take personal initiative and observe confidentiality β’ Ability to work with internal and external vendors in a professional manner β’ Ability to multi-task in a fast-paced environment
Apply NowOctober 20
51 - 200
Develop scalable software solutions for interior dΓ©cor using advanced tech.
October 20
51 - 200
Join Thrive Health to develop technology improving patient care and outcomes.
π¨π¦ Canada β Remote
π° Seed Round on 2020-06
β° Full Time
π‘ Mid-level
π Senior
π§βπ» Full-stack Engineer
October 20
1001 - 5000
Optimize cloud costs as a Cloud FinOps Software Engineer at Sophos.
π¨π¦ Canada β Remote
π΅ $101k - $169k / year
π° Post-IPO Equity on 2021-08
β° Full Time
π‘ Mid-level
π Senior
π§βπ» Full-stack Engineer
October 19
51 - 200
Senior Software Developer at SS&C, a financial services software provider.