Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Location Address: Scarborough
Hybrid/ Remote: Hybrid 2 for now could go up to 4
Contract Duration: 1 Year
Possibility of extension & conversion to FTE: Possibility of FTE
Number of Positions: 3
Typical Day in Role:
• Monitoring & response of Data Loss Prevention rules and policies
• Thrives in a fast-paced environment coordinating multiple issues and threats that can be occurring simultaneously
• Collaborates with various business lines, IT support functions and IS&C Control function
• You are passionate about utilizing your technical knowledge to perform cybersecurity investigations using various analytical methods.
• You excel in using available intrusion detection infrastructure to detect and remediates threats.
• You enjoy investigating and reviewing suspicious activities (E.g. Phishing) reported by customers or other employees of the bank.
• You enjoy taking part in initiatives to contribute to the strategic direction for security related technologies or other controls that need to be put in place to reduce the threat levels to the company.
• You thrive in effectively breaking down complex technology knowledge & communicating same to non-technical people.
Candidate Requirements/Must Have Skills:
1) 5+ year of hands-on technical working experience in performing any of network security, information security, network and IT support or any other related fields.
2) 1+years’ experience of Data Loss Prevention methodologies, rules and policy creation
3) 2+ Experience building and running a TTP framework methodology for pattern and behavior-based content development
4) 2+ years’ combined experience with involving red team (Vulnerability Assessments, Web app assessments), consulting (Compliance, policy creation), SOC and Device Management
Nice-To-Have Skills:
• You possess advanced communication (verbal/written/presentation) skills in English. The same in Spanish is a strong asset.
Soft Skills Required:
• You have developed capabilities in prioritizing and completing assigned tasks in a timely manner and provide oversight and training to other less experienced team members.
• You have a working knowledge of various network principles, cyber security concepts, investigation procedures, and adversary techniques.
• You have a strong analytical and problem resolution skills.
You can demonstrate ability to conduct investigations across multiple security technologies
Education:
• Post-secondary education in Computer Science or in a related field
• Certifications (Sec+, CySA+, Net+, A+, CISSP Associate) are nice to have.
Best VS. Average Candidate:
Ideal candidate has experience merging all the requirement: developing security use cases, DLP rules and policy creation management to detect security events and has the right working attitude
Candidate Review & Selection
MS Teams
Format: 2 interview rounds
Panel Composition: Minimum 2 people
Duration: 0.5-1 hour
Key Skills
Ranked by relevanceReady to apply?
Join Delpath and take your career to the next level!
Application takes less than 5 minutes

