Sr. Cyber Security Specialist
Brampton, ON, CA
Rogers Communications
Choose a cell phone or plan for your needs. At Rogers, count on more mobile, Internet, TV, Home Security and Home Phone options.
Our Technology team wakes up every day with one goal in mind - connecting Canadians to the people and things that matter most. Together, we are proud to support 30 million Canadians each month through managing a robust portfolio that champions leading-edge technology. We drive large-scale, complex, and high-visibility technology projects and programs that shape the future of technology in Canada and expand connectivity from coast to coast. If you are interested in being a part of this, consider applying for the following opportunity:
The Rogers Information and Cyber Security Unit is seeking a highly motivated Senior Cyber Security Specialist to join our Cyber Protection Center. Reporting to the Sr. Manager, Cyber Forensics at the Rogers Park Brampton campus, this role is responsible for maintaining and advancing our existing cyber security program through the continual review and development of Rogers cyber security strategy and security incident response procedures. This role is equivalent to a SOC Tier 2 or 3 level specialist as the incumbent will be tasked to Rogers’ cyber–Incident Response, Forensic function, which includes the identification and application of threat intelligence information, building automation capabilities and leading continuous security improvement programs (SIP).
We are open to hire for our Calgary or Greater Toronto Area Location.
Who we're looking for:
- Providing first-line response and initial management of any new or developing cyber security related issues including participation in on-call rotation.
- Enhanced level triage and assessment of security events to determine risk to business.
- Lead, contribute to security projects, meetings, and ad-hoc requests.
- Performing gap assessments, oversee development of automation scripts, correlation rules, tuning of systems & security tools.
- Contribute to security projects and ad-hoc requests.
- Demonstrate strong leadership in challenging environments, maintaining a professional, calm, and expert manner always.
- Utilizing “kill chain” methodologies, effectively determine risk prioritized response, investigate security events and make clear recommendations on mitigation.
- Review and interpret alerts, events and system alarms using SIEM, other tools, behavioral analytics, and network analysis while providing evolved emergency response services, incident management and analysis.
- Respond to service provider network attacks affecting critical network infrastructure and the cloud environments.
- Produce detailed incident reports and technical briefs on security incidents and preparing executive risk based metrics reports based on the MITRE ATT&CK model.
- Participate and contribute to post incidents reviews and documentation.
- Identify and report on threat intelligence from external resources and use to apply risk based assessments.
- Day-to-day threat hunting, monitoring and analysis of risk-based threat intelligence.
- Conduct digital forensic examinations of digital media from a variety of sources, using industry's best practices and standard tools.
- Being proficient in the latest forensic response and reverse engineering skills, along with astute interest in the latest exploit methodologies.
- Responsible for developing and evolving SOC response procedures based on MITRE ATT&CK.
- Performing gap assessments, develop automation scripts and correlation rules, tuning of systems & security tools.
- Maintain knowledge of adversary Tactics, Techniques, and Procedures (TTP).
What you bring:
- Undergraduate degree in computer science, engineering, information science, or a related technical discipline
- 5+ years of related experience in cybersecurity or computer network defense or incident response
- CISSP, GIAC, GREM accompanied by a Forensics certification preferred
- Strong knowledge of Clouds, Service provider/ Telecom infrastructure, virtual environments, web applications and APIs
- Experience with forensic tools and methodologies is required
- Scripting (Powershell, Bash, Perl, Python) knowledge/experience a bonus.
- Working knowledge of TCP/IP networking, including routing and common ports/protocols.
- Demonstrated relevant experience as a key member of a threat intel, incident response, malware analysis, or similar role.
- Strong knowledge of malware families and network attack vectors.
- Strong knowledge of Linux, Windows system internals.
- Understanding of payment card processing, related fraud and carding techniques.
- Ability to clearly articulate risk & findings to internal clients both verbally and in written form.
- Excellent communication, interpersonal, and documentation skills.
- Strong organizational, time management, and multi-tasking skills.
- Ability to work well both independently and in a team environment.
- Proficiency with Microsoft-based computer programs, Outlook, Word, Excel, and PowerPoint.
What’s in it for you?
We believe in investing in our people and helping them reach their potential as valuable members of our team. As part of our team, you’ll have access to a wide range of incredible resources, growth opportunities, discounts, and perks, including:
- Competitive salary & annual bonus
- Competitive & flexible health and dental benefits, pension plan, RRSP, TFSA, and Stock matching programs.
- Discounts: Enjoy up to 50% off Rogers Services and Blue Jays Tickets, 25% off TSC items, and a 20% discount on all wireless accessories sold in Rogers stores.
- Paid time off for volunteering
- Company matching contributions to charities you support
- Growth & Development Opportunities:
- My Path: self-driven career development program
- Rogers First: priority in applying to internal roles of interest
- Wellness Programs:
- Homewood employee & family assistance program
- Cognitive Behavioural Therapy (CBT) & Virtual therapy sessions
- Low or no-cost fitness membership with access to virtual classes
- Our commitment to the environment and diversity:
- Work for an organization committed to environmental protection
- Strong commitment to diversity and inclusion with employee resource groups supporting equity-deserving groups including groups representing People of Colour, 2SLGBTQIA+, Indigenous Peoples, Persons with Disabilities and Women. We all bring something different, and we know what makes us different makes us great.
To protect our people, brand and assets, a pre-employment background check will be conducted. As part of our selection process, all candidates must clear a criminal background check. Additionally, a credit check and drivers abstract may be required depending on the role.
Schedule: Full time
Shift: Day
Length of Contract: Not Applicable (Regular Position)
Work Location: 8200 Dixie Road (101), Brampton, ON
Travel Requirements: Up to 10%
Posting Category/Function: Technology & Information Technology
Requisition ID: 315135
At Rogers, we believe the key to a strong business, is a diverse workforce where equity and inclusion are core to making everyone feel like they belong. We do this by embracing our diversity, celebrating our different perspectives, and working towards creating environments that empower our people to bring their whole selves to work. Everyone who applies for a job will be considered. We recognize the business value in creating a workplace where each team member has the tools to reach their full potential by removing any barriers for equal participation. We work with our candidates who are experiencing a disability throughout the recruitment process to ensure that they have what they need to be at their best. Please reach out to our recruiters and hiring managers to begin a conversation about how we can ensure that you deliver your best work. You matter to us! For any questions, please visit the Recruitment Process FAQ.
Posting Notes: Technology
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics APIs Automation Bash CISSP Cloud Computer Science Exploit Forensics GIAC GREM Incident response Linux Malware MITRE ATT&CK Monitoring Perl PowerShell Python Reverse engineering Scripting Security strategy SIEM SOC Strategy TCP/IP Threat intelligence Windows
Perks/benefits: Career development Competitive pay Equity / stock options Fitness / gym Flex hours Flex vacation Health care Salary bonus Startup environment Team events Wellness
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.