Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Information Security Analyst V – Cybersecurity Incident Response (Contract)
Position Type: Contract – 12 months (possibility of extension or conversion based on performance and business needs)
Start Date: ASAP
Location: Hybrid (Toronto ). Currently 2 days onsite, moving to 4 days starting Nov 3.
Schedule: Monday to Friday, core business hours (37.5 hours per week)
About the Role
We are seeking an Information Security Analyst V to join the Cyber Security Incident Response Team (CSIRT) within the Chief Information Security Office. This role will focus on strengthening incident response capabilities, developing security playbooks, and optimizing Microsoft E5 security tools to support a large-scale modernization initiative.
The team is collaborative and cross-functional, with 11 professionals working toward building more advanced security operations and incorporating AI-driven solutions.
Key Responsibilities
- Define, develop, and implement information security policies, programs, and tools.
- Assess risks, identify potential gaps, and recommend security solutions.
- Lead or contribute to containment and recovery efforts for cybersecurity incidents.
- Develop incident response playbooks, runbooks, and documentation.
- Conduct threat detection, hunting, and complex investigations.
- Collaborate with cross-functional teams to strengthen response readiness.
- Provide reporting, analysis, and assessments on security initiatives.
- Contribute to reviews of internal processes and identify opportunities for improvement.
Required Qualifications
- 7+ years of experience in information security.
- Proven expertise with the Microsoft security ecosystem (E5 or E3, XDR, Sentinel).
- Experience implementing or optimizing the Microsoft E5 security suite.
- Strong background in developing and maintaining incident response playbooks and runbooks.
- Excellent written and verbal communication skills.
- Ability to create professional decks, reports, and documentation.
- Strong initiative and problem-solving skills with a creative approach.
Nice to Have
- Experience with XSOAR and contributing to automation tasks.
- Scripting knowledge (Python, APIs, custom integrations).
- Strategic experience in optimizing a Security Operations Center from traditional to modern platforms.
- Background with consulting firms (e.g., KPMG, Deloitte) is highly valued.
Why Join
- Be part of a forward-looking security initiative with opportunities to shape modern operations.
- Work in a collaborative team environment with exposure to advanced AI-driven security tools.
- Gain experience building enterprise-level incident response frameworks and modernizing security capabilities.
Key Skills
Ranked by relevanceReady to apply?
Join Infotek Consulting Inc. and take your career to the next level!
Application takes less than 5 minutes