Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Employment Type:Staffing Contract
City:Toronto
State:Ontario
Working Environment: Hybrid
Status:Accepting Candidates
Rate :$55 Per hour on INC
Description:
ROLE SUMMARY
The Security Analyst is responsible for independently managing third-party vulnerability data sources, executing scans using proprietary tools, and collaborating with IT teams to prioritize mitigation efforts. The role involves leveraging vulnerability management tools to generate metrics and reports that track progress and effectiveness. Additionally, the Security Analyst may contribute to reviewing project scopes to recommend security benchmarks, optimizing security tool alerts and policies, and integrating logs and large data sets into existing systems.
ROLE RESPONSIBILITIES
- Analyze vulnerabilities from various sources and input them into the vulnerability management tool using approved methods to ensure a complete overview of exposures.
- Evaluate existing vulnerabilities to find problem areas or opportunities for mass-mitigation.
- Communicate with other teams to explain the opportunities or needs.
- Escalate vulnerabilities that have breached our time-to-resolve limits.
- Configure scanning tools and manage scan schedules.
- Collect a set of metrics and KPIs for our departmental use.
- Consider opportunities for AI to improve all of the above.
TECHNICAL QUALIFICATIONS
Strong familiarity and prior experience with:
- HTTP, PKI and signatures/encryption, SMTP, DNS, CWEs, CVEs, and other frameworks.
- Nessus, NMAP, ZAP, BurpSuite, Invicti, Nuclei or other scanning tools.
- Web application scanning and web application firewalls.
- Containers.
- CIS benchmarks, STIGs, or other security hardening standards.
Additional desirable skills or experience:
- SAML, Kerberos, OAuth, OIDC, LDAP.
- Powershell and Python.
- Jenkins.
- Splunk data onboarding– indexes, sourcetypes, data models, forwarders, apps, HECs.
- Azure event hubs, Kafka, syslog.
- Sentinel, Defender, Crowdstrike, or other EDRs.
GENERAL QUALIFICATIONS
- Able to research independently using available sources, collect data, then document a clear plan of action,
- Systematic thinking and troubleshooting.
- Able to create clear and detailed documentation of designs and processes for a diverse technical audience.
- Provide clear and concise communication of requirements, priorities, and status.
EDUCATION REQUIREMENTS
- Bachelor’s Degree in Information Technology or related field is considered a plus, not mandatory.
How to Apply:
E-mail:
Please email Swetha @ [email protected] with an attached copy of your CV.
We thank all applicants for their interest, however only those candidates selected for interviews will be contacted.
Key Skills
Ranked by relevanceReady to apply?
Join Brainhunter Systems Ltd and take your career to the next level!
Application takes less than 5 minutes

