The OpportunityWe are seeking a high-caliber, technically-driven Information Security Analyst (SOC) to join a specialized internal security team. This is not a 'process-only' role; we are looking for a 'hands-on-keyboard' expert who moves beyond triaging alerts to performing deep-dive technical investigations.You will act as the final line of defense, taking high-severity escalations from our MDR (Managed Detection & Response) partner and leading them through full containment and remediation. If you are naturally curious, thrive in a hybrid on-prem/cloud environment, and enjoy the 'hunt' in security logs, this role is designed for you.Key Note & Application InstructionsTO APPLY, send your current CV directly to .Please note: Due to high application volumes, only candidates who meet the outlined requirements will be contacted for further discussion.How Youll Make an ImpactDeep-Dive Investigation: Perform advanced host-based and network forensics. You won't just see an alert; you will dig into the logs to identify the exact infection vector and lateral movement.Incident Response Leadership: Lead the technical response for high-severity incidents, making critical decisions on system isolation and server shutdowns.Tooling & Automation: Optimize and build upon our security stack, including Palo Alto Cortex (XDR) and Microsoft Sentinel (SIEM). You will leverage SOAR technologies to automate manual workflows and streamline operations.Hybrid Environment Mastery: Secure a complex environment that spans a traditional on-prem data center and a rapidly expanding Azure cloud footprint.Threat Hunting: Proactively hunt for unknown cyber threats and anomalous activity that bypasses traditional vendor signatures.Subject Matter Expertise: Advise on security best practices and risk analysis during project engagements and regulatory audits (ISO 27001, SOC 1/2, NIST).What Youll BringExpertise: 57+ years in Security Operations and Incident Response, with a focus on responding to high-stakes security incidents.Technical Breadth: 35+ years of experience in host-based/network forensics and the investigation of security appliance and network logs.The Tech Stack: Deep proficiency with SIEM (Sentinel), EDR/XDR (Cortex), Firewall management, UEBA, and Azure Security Center.Problem Solving: Strong deductive reasoning and the ability to assimilate information quickly in high-demand situations.Education: Bachelors degree in Computer Science, IT, or a related field.Compensation and Work Arrangement Compensation: $81,450 $99,550 Base + 8% AIPHybrid Schedule: To foster collaboration and team synergy, this role requires being in the Oakville office 3 days per week.
Job Title
Information Security Analyst (SOC)