SOC Analyst

Brampton, Ontario, Canada

Apply now Apply later

Charger Logistics is a world class asset-based carrier. We specialize in delivering assets, on time and on budget. With the diverse fleet of equipment, we can handle a range of freight, including dedicated loads, specialized hauls, temperature-controlled goods and HAZMAT cargo.

Charger logistics invests time and support into its employees to provide them with the room to learn and grow their expertise and work their way up. We are entrepreneurial-minded organization that welcomes and support individual idea and strategies. Charger Logistics is seeking a well-rounded individual able to work in a fast-paced environment to join our team at the company’s office in Brampton, Ontario.

Responsibilities:

  • Proactive threat hunting activities, developing hypotheses and executing hunts to detect unknown threats.
  • Manage and respond to security incidents when escalated and report findings.
  • Develop and enhance detection content mapped to frameworks like MITRE ATT&CK.
  • Analyze data from SIEM platforms (e.g., DataDog, Darktrace ) to identify anomalies and improve detection coverage.
  • Monitor incoming alert and event queues for potential security incidents.  
  • Threat Analysis, Threat Hunting & Digital Forensics, malware analysis and network and system monitoring.
  • Security Awareness: Promote a culture of security awareness through training programs for employees.
  • Prevent incidents before they happen by threat hunting, proactive threat modelling, incident trend analysis, and developing detection and monitoring strategies.

Requirements

  • Experience in Managed Security Services, or complex Security Operations Centers is preferred.
  • Hands-on exposure to SOC operations, threat hunting, or incident response.
  • Strong understanding of security principles, authentication, authorization, and access control mechanisms.
  • Strong understanding of Endpoint Detection and Response (EDR) tools like CrowdStrike or Microsoft Defender for Endpoint.
  • Solid knowledge of cyber-attack tactics, techniques, and procedures (TTPs) and detection use case development aligned with MITRE ATT&CK.
  • Bonus: Experience with scripting languages (Python, PowerShell, Bash) and industry certifications.

Benefits

  • Competitive Salary
  • Healthcare Benefit Package
  • Career Growth
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  4  0  0

Tags: Bash CrowdStrike EDR Forensics Incident response Malware MITRE ATT&CK Monitoring PowerShell Python Scripting SIEM SOC TTPs

Perks/benefits: Career development Competitive pay

Region: North America
Country: Canada

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.