Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
What is in it for you:
- Hourly salary of $30-35.
- 5-month contract.
- Full-time position: 37.50 hours per week.
- Hybrid flexible work model.
- Take ownership of incident response activities and create summary reports for management and internal stakeholders.
- Analyze escalated cybersecurity alerts from managed service providers to determine impact, select containment and remediation activities, and ensure recovery.
- Maintain and improve the effectiveness of incident response tools such as EDR, SIEM, and SOAR.
- Conduct detailed technical investigations of cybersecurity incident root causes including threat vectors, techniques, and tactics.
- Respond promptly to cybersecurity alerts during shifts and on-call rotations.
- Support internal fraud and financial crime investigations with cyber-related elements.
- Collaborate with cross-functional teams, including Privacy Office and Financial Crime teams.
- Adapt to a fast-paced, evolving cybersecurity landscape.
- University Degree in Computer Science or Computer Engineering would be an asset.
- Certifications in cybersecurity incident response (e.g., CISSP, OSCP, CIH, CHFI).
- 5+ years of direct experience in cybersecurity incident response, preferably within the financial services sector.
- Strong technical knowledge of incident response, network protocols, communication principles, vulnerabilities, and remediation.
- Proven ability to analyze cyber alerts, determine business impact, and implement effective containment and remediation.
- Experience improving alerting rules and configurations within EDR, SIEM, and SOAR tools.
- Demonstrated ability to perform root cause analysis and document findings.
- Effective interpersonal and communication skills with the ability to handle multiple incidents simultaneously.
- Preferred experience in at least one of the following: threat hunting, threat intelligence, or forensics.
- Insurance industry background is considered an asset.
Recruit Action (agency permit: AP-2504511) provides recruitment services through quality support and a personalized approach to job seekers and businesses. Only candidates who match hiring criteria will be contacted.
# AVICJP00002785
Key Skills
Ranked by relevanceReady to apply?
Join Recruit Action inc. and take your career to the next level!
Application takes less than 5 minutes

