Cybersecurity Analyst – Incident Response
--Markham--
Job Description:
We are seeking an experienced Cybersecurity Incident Responder to join our cybersecurity operations team. The ideal candidate will be capable of managing incidents at a Tier 3 level and conducting investigations using advanced incident response tools. This role will also contribute to internal fraud and financial crime investigations where a cyber component is present. The position includes participation in an on-call rotation to ensure a prompt response to mitigate impact in a 24/7 environment.
Key Responsibilities:
- Take full ownership of cybersecurity incident response activities and produce summary reports for management and internal stakeholders.
- Analyse escalated alerts from managed security service providers to assess impact, determine appropriate containment and remediation strategies, and ensure thorough recovery.
- Continuously enhance the effectiveness of incident response tools such as EDR, SIEM, and SOAR by optimizing configurations and alert rules.
- Conduct in-depth technical investigations of cybersecurity incidents, including root cause analysis, threat vectors, and adversary tactics and techniques.
- Respond swiftly and diligently during shifts and while on-call to address cybersecurity alerts and time-sensitive incidents.
- Collaborate with internal departments, including Information Security, Privacy, and Fraud Investigation teams, on cyber-related cases.
- Stay current and adaptive in a fast-paced and evolving threat environment.
Qualifications:
- Minimum 2 years of direct experience in cybersecurity incident response, preferably in a financial service or similarly regulated environment.
Strong understanding of:
- Incident response procedures and techniques
- Network protocols and communication principles
- Common vulnerabilities and remediation approaches
- Experience analysing cybersecurity alerts and selecting appropriate containment/remediation actions based on business impact.
- Skilled in investigating incident root causes, including threat vectors and attacker methodologies (TTPs).
- Proven ability to work collaboratively with internal and external stakeholders across functions.
- Strong communication and documentation skills; able to clearly explain technical issues and findings to diverse audiences.
Experience or familiarity with any of the following areas is considered an asset:
- Threat hunting
- Threat intelligence
- Digital forensics
Education & Certifications:
- A degree in Computer Science, Computer Engineering, or a related field is an asset.
- Recognized certifications in cybersecurity incident response or related domains (e.g., CISSP, OSCP, CIH, CHFI, GCFA, GCIH) are preferred or actively being pursued.
- Experience or knowledge of the insurance industry is considered a plus.