Senior Cybersecurity Analyst - Risk, Performance and Technology

Toronto, Ontario, Canada

Richter

Richter’s two-platform approach helps owners make the best decisions for their businesses, themselves, and their families, creating value for generations.

View all jobs at Richter

Apply now Apply later

Senior Cybersecurity Analyst - Risk, Performance and Technology 

Richter Toronto Office

Overview

Richter is a Business | Family Office that provides strategic advice on business matters and on families’ financial and personal objectives across generations. With close to 100 years of experience advising at the intersection of family and business, Richter has developed an integrated approach to help business owners find sustainable success. Whether business, personal, or both, Richter is uniquely positioned to address the needs of Canada’s most successful entrepreneurs, private clients, business owners and business families and help them chart a clear path to shape their legacy for the future. Founded in 1926, Richter’s 600-person multidisciplinary team continuously innovates to create value for our people, clients, and community in Canada and in the US.

What we offer:

    • A Bachelor's Degree / Diploma in a relevant area of study with a preference for Computer Science, Information Security or Computer Engineering
    • Foundational knowledge of threat intelligence and threat hunting
    • Strong analytical and investigative skills
    • Knowledge of technical security controls and mitigations
    • Demonstrating experience with balancing security features and user adoption
    • Occasional after hours availability for high-severity incidents
    • Good working knowledge of one or more of the following topics:
      • Common security threats, industry best practices, security technologies
      • Good working knowledge of advanced endpoint analytics
      • Experience with Cyber Kill Chain
      • Operating systems (UNIX, Linux, Windows)
      • Must have a solid working knowledge of Networking
      • Must have experience in DLP, IPS/IDS, Firewalls, Content Filtering, End-Point Protection
      • Knowledge of digital forensics and malware reverse engineering
      • Penetration testing and ethical hacking
      • Malware analysis (dynamic and static)
      • Experience with SIEM technologies such as Splunk, Bro, Elasticsearch, Logstash, and Kibana.
      • Experience with Regular Expressions (RegEx)
        • Support the continued improvement, implementation and enhancement of Richter's Cybersecurity concierge solution
        • Analyze activity trends in the environment and associated client environments using various analytics tools and methodologies for hunting for threats not otherwise detected by configured security alerts.
        • Assist with onboarding clients in a professional and thoughtful way
        • Contribute to developing, implementing, automating and fine-tuning client reporting
        • Perform in-depth investigation of events of interest (EOI) or indicators of compromise (IOC) identified during threat hunt activities or security alerts received from various security technologies as per defined investigation and incident response procedures.
        • Conduct threat scenario analysis to develop new use cases with relevant attack vectors and create attack scenarios to formulate hunting strategies to identify the presence of threats that are going undetected by existing security controls.
        • Liaise with appropriate internal stakeholders and external clients during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate recommendations for remediation.
        • Collaborate with the senior team to develop hunt tactics based on threat intelligence information, attacker techniques, and procedures.
        • Develop and build knowledge of and stay current on developments in the cyber threat landscape to adapt investigation techniques and provide recommendations to the client on responding to and remediating related incidents.
        • Create quarterly cybersecurity reports for all internal and external clients.
        • Maintain an up-to-date document repository/knowledgebase/Wiki site.
          • cyber threat intelligence
          • security monitoring
          • incident response and handling
          • security operations processes
          • threat management,
          • cybersecurity training,
          • standard industry technologies.

            The Richter Cybersecurity Team is looking for a Senior Cybersecurity Analyst to join our team. The candidate must be highly organized, proactive, enthusiastic and results-oriented.

            They will support the delivery and execution of white-glove cyber security services to an exclusive set of clients. Maturity, patience, professionalism, communication skills and patience will be essential in dealing with these exclusive clients.

            They will have a foundational understanding, experience and willingness to learn more about:

          The candidate will also be instrumental in deploying and operating cutting-edge security solutions that align with Richter's overall vision to provide world-class cybersecurity concierge services. They will be on the ground floor of establishing this business for Richter and will eventually manage a team of professionals as the business grows.

          Responsibilities

        • Support the continued improvement, implementation and enhancement of Richter's Cybersecurity concierge solution
        • Analyze activity trends in the environment and associated client environments using various analytics tools and methodologies for hunting for threats not otherwise detected by configured security alerts.
        • Assist with onboarding clients in a professional and thoughtful way
        • Contribute to developing, implementing, automating and fine-tuning client reporting
        • Perform in-depth investigation of events of interest (EOI) or indicators of compromise (IOC) identified during threat hunt activities or security alerts received from various security technologies as per defined investigation and incident response procedures.
        • Conduct threat scenario analysis to develop new use cases with relevant attack vectors and create attack scenarios to formulate hunting strategies to identify the presence of threats that are going undetected by existing security controls.
        • Liaise with appropriate internal stakeholders and external clients during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate recommendations for remediation.
        • Collaborate with the senior team to develop hunt tactics based on threat intelligence information, attacker techniques, and procedures.
        • Develop and build knowledge of and stay current on developments in the cyber threat landscape to adapt investigation techniques and provide recommendations to the client on responding to and remediating related incidents.
        • Create quarterly cybersecurity reports for all internal and external clients.
        • Maintain an up-to-date document repository/knowledgebase/Wiki site.

        Required Qualifications

      • A Bachelor's Degree / Diploma in a relevant area of study with a preference for Computer Science, Information Security or Computer Engineering
      • Foundational knowledge of threat intelligence and threat hunting
      • Strong analytical and investigative skills
      • Knowledge of technical security controls and mitigations
      • Demonstrating experience with balancing security features and user adoption
      • Occasional after hours availability for high-severity incidents
      • Good working knowledge of one or more of the following topics:
        • Common security threats, industry best practices, security technologies
        • Good working knowledge of advanced endpoint analytics
        • Experience with Cyber Kill Chain
        • Operating systems (UNIX, Linux, Windows)
        • Must have a solid working knowledge of Networking
        • Must have experience in DLP, IPS/IDS, Firewalls, Content Filtering, End-Point Protection
        • Knowledge of digital forensics and malware reverse engineering
        • Penetration testing and ethical hacking
        • Malware analysis (dynamic and static)
        • Experience with SIEM technologies such as Splunk, Bro, Elasticsearch, Logstash, and Kibana.
        • Experience with Regular Expressions (RegEx)

    Preference will be given to candidates with:

    • At least 5 years of working experience as a customer support analyst in technology

     

    Desirable Qualifications

    • Industry certifications (CISSP, GIAC – GPEN, GCFE, GSE) are an asset
    • Knowledge of analytics and machine learning models
    • Experience with security orchestration tools and analytics
    • Previous customer support experience
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Analytics CISSP Computer Science Cyber Kill Chain Elasticsearch Ethical hacking Firewalls Forensics GCFE GIAC GPEN IDS Incident response IPS Linux Machine Learning Malware Monitoring Pentesting Reverse engineering SIEM Splunk Threat intelligence UNIX Windows

Perks/benefits: Team events

Region: North America
Country: Canada

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.