Information Security Engineer

Toronto, ON, CA

Dentons

Dentons is a global law firm driven to provide you with the competitive edge in an increasingly complex and interconnected marketplace. We were formed by the March 2013 combination of international law firm Salans LLP, Canadian law firm Fraser...

View all jobs at Dentons

Apply now Apply later

Dentons is designed to be different. Our firm leads the way in a rapidly changing legal marketplace. We challenge the status quo and deliver consistent results as well as uncompromising quality and value to our clients. Our global presence is renowned as a firm with over 21,000 individuals in more than 200 offices serving clients across 80+ countries.  


Dentons Canada is committed to its people and communities. We are consistently recognized as an employer of choice having received numerous awards including being selected as one of Canada’s Top 100 Employers (2025); Canada’s Top Employers for Young People (2025), and Canada’s Best Diversity Employers (2025).

 

This role is an opportunity for you to join the world’s largest law firm, a firm that offers opportunities to build your career while growing your skills and deepening your expertise.

 

ROLE

Dentons Canada LLP is currently recruiting for an Information Security Engineer who will be responsible for ensuring the security, integrity, and availability of Dentons Canada information assets. The candidate will contribute to the management and continuous improvement of multiple security programs. The position entails the development, implementation, and maintenance of security controls, through people, processes, and technology, across the organization.


KEY RESPONSIBILITIES & ACCOUNTABILITIES
General

  • Implement, maintain, and improve the security posture of the Microsoft 365.
  • Maintain operational oversight of our security systems and administer secure configurations for both on-premise and cloud environments. 
  • Proactively manage system settings to counter evolving threats and safeguard enterprise systems and accounts.
  • Actively monitor and assess new and emerging security threats. Recommend tactical and strategic initiatives that mitigate risks and keep our security posture ahead of the curve.
  • Prepare and deliver periodic reports that highlight the current security posture of our Information Security Program. 
  • Ensure that all systems and processes comply with industry-recognized frameworks such as ISO 27001, NIST, CIS, and internal policies.
  • Collaborate with IT Infrastructure, Operations, and other stakeholders to design and maintain secure, resilient enterprise-grade processes. 
  • Ensure that security requirements are integrated into IT services, balancing operational needs with risk management.
  • Support regional internal and external audits related to IT security and compliance. 
  • Work with business services to ensure that security measures are effectively represented in client RFP responses and align with global standards.
  • Contribute to the development, evaluation, and implementation of policies, standards, and procedures that meet both business and security requirements. 
  • Continuously refine technical processes to address the latest threats and compliance mandates.

 

Security Engineering

  • Conduct technical architecture assessments to identify and mitigate risks.
  • Translate business requirements into robust technical security controls.
  • Develop, implement and maintain cloud security architectures, ensuring operational compliance (Azure expertise is a must).
  • Leverage advanced Azure security features to architect and secure cloud deployments, ensuring compliance with best practices and regulatory standards.
  • Author technical policies and develop SOPs to support secure architectural practices, with a focus on Azure and hybrid environments.
  • Oversee patch deployment and secure configuration baselines for on-premise and cloud environments (Virtual Machines and Operating Systems).
  • Ensure timely updates while minimizing downtime and risk.
  • Perform regular audits (e.g., CIS, asset management, firewall rule review) to ensure compliance with internal policies and industry best practices.
  • Conduct regular reviews and annual audits of firewall rules to ensure compliance with security policies, identify potential risks, and maintain optimal network protection.
  • Provide recommendations to address audit findings and improve security controls.
  • Develop and maintain secure configuration baselines for servers, endpoints, and network devices.
  • Continuously monitor and remediate configuration drift.
  • Manage and enhance privilege access controls, focusing on SecretServer or similar PAM solutions.
  • Enforce least-privilege principles and monitor privileged accounts.
  • Coordinate internal and external penetration testing efforts.
  • Analyze results, prioritize remediation activities, and track corrective actions to closure.

 

Vulnerability Management Program

  • Analyze threat and vulnerability feeds data for applicability to the environment and perform compensating controls analysis and validate efficacy of existing controls and provide recommendations.
  • Perform security research, analysis, assessments and support with penetration testing and remediation actions.
  • Conduct vulnerability assessments to evaluate attack vectors, identify vulnerabilities, and develop remediation plans.
  • Work with IT stakeholders to guide and assist them during the remediation process.
  • Monitor external security ratings and coordinate improvement efforts.
  • Identify and address high-risk areas to strengthen overall security posture.
  • Lead monthly vulnerability management meetings, assessments, and remediation coordination.
  • Develop metrics and dashboards to track progress and highlight key risk areas.

 

Security Operations and Incident Management Program

  • Assist the SOC team with daily operation of Information Security technologies.
  • Assist with creating detailed runbooks and playbooks for incident response that integrate engineered solutions with operational procedures, ensuring quick and consistent responses to security events.
  • Offer expert insights during and after incidents to identify root causes, recommend immediate fixes, and suggest long-term security improvements to prevent recurrence.
  • Work closely with the security operations team to ensure that engineered systems meet operational needs, participate in incident drills, and provide training on new tools or technologies that enhance incident response capabilities.
  • Handle spam/phishing requests, Mimecast URL exceptions, and data loss alerts.
  • Act as an active participant within Incident Tabletop exercises


SKILLS & COMPETENCIES

  • Strong written and oral communication skills. 
  • Strong stakeholder management skills and experience. 
  • Strong organizational skills with impeccable attention to detail. 
  • Strong situational analysis and decision-making skills, with experience balancing technical trade-offs. 
  • Demonstrates how to Act as One by being a team player across the Firm. 
  • Strong problem solving and analytical skills; can clearly explain and present problems and issues to others and contribute to their resolution. 
  • Ability to work under pressure and think clearly in challenging situations in a logical manner. 
  • Ability to be flexible in approach and be comfortable with a fluid organizational structure that requires both teamwork and self-sufficiency as necessary, with the ability to work under minimal supervision. 
  • Demonstrate initiative and the ability to be proactive, anticipating needs. 
  • Flexibility to accommodate working in multiple time zones. 


EDUCATION, EXPERIENCE & CERTIFICATIONS

  • Post-secondary education with a specialization in Information Technology and / or minimum of 6+ years of Information Technology experience in designing, developing, and maintaining IT cybersecurity solutions
  • 6+ years of experience in an Information Security related role with at least 3 years of experience in cloud technologies, vulnerability and penetration testing.   
  • Advanced knowledge of Azure security features, architecture, and best practices for securing cloud deployments.
  • Expertise in deploying patches and maintaining secure configuration baselines across on-premise and cloud environments.
  • Proficient in coordinating and executing both internal and external vulnerability assessments and penetration tests.
  • Experience in designing secure systems, conducting technical assessments, and translating business requirements into robust security controls.
  • Knowledge in developing secure cloud security architectures.
  • Competence in auditing systems against defined standards (e.g., CIS, NIST, ISO 27001) and preparing compliance reports.
  • Familiarity with ITSM processes for ticket handling and incident response, including developing runbooks and incident playbooks.
  • At least one relevant certification such as CISSP, CISM, or from GIAC/ISACA is required. 


We thank all applicants for their interest, however, only those selected for an interview will be contacted. 

 
At Dentons we are committed to offering equitable and competitive pay, we achieve this by aligning internal salary ranges for specific roles to similar positions in the external market. In the normal course, our practice is to hire, transfer and promote employees within the entry part of our range, adjusting as needed based on the prior experience, skills and competencies required for the role along with any market differentials. 
 
Recognizing our exceptional talent means providing a comprehensive total rewards package beyond a competitive salary. We have curated our employee benefits portfolio to offer inclusive and comprehensive wellbeing and developmental programs for our people. With extended benefits and mental health plans, paid time off, savings plans, fitness subsidy, parental leave top up and more, our benefits are flexible, aligned to our core values and supports the various needs of our people. Additionally, our personal and professional development programs include people networks, mentorships, and leadership series programming to help people grow their career. 

 

Note: Availability of the benefits and perks may be subject to your location and employment type and may have certain eligibility requirements. Dentons reserves the right to alter these programs and offerings in whole or in part at any time without advance notice.

 

 

 

Equal Opportunity Statement

At Dentons Canada, inclusion, diversity, equity and accessibility (IDEA) are not just ancillary values, they are foundational to our business. We believe that IDEA is essential to the shared success of our team and our clients. Our forward-thinking and inclusive culture supports the professional development of all our people, enhances the leading services we offer to our clients, and informs our commitment to make a positive impact in the communities where we live and work. As a testament to our commitment to IDEA, we have been recognized as one of Canada’s Best Diversity Employer’s for 14 consecutive years (2011-2024), as well as one of Canada’s Top Employers for Young People (2024) for the seventh time.

Dentons Canada is an equal opportunity employer, and we welcome your application. All employment decisions, including hiring, will be made without regard to age, ancestry, citizenship, colour, creed, disability, ethnic origin, family status, gender identity, marital status, place of origin, race, sexual orientation, or any other characteristic protected by applicable human rights legislation.

We are committed to providing you with an inclusive, barrier-free, and accessible workplace to support your success. Should you require accommodation during the recruitment process, for example as a result of a disability, please contact us at careers.canada@dentons.com.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Audits Azure CISM CISSP Cloud Compliance Firewalls GIAC Incident response ISACA ISO 27001 IT infrastructure NIST Pentesting RFPs Risk management SOC Vulnerabilities Vulnerability management

Perks/benefits: Career development Competitive pay Equity / stock options Flex hours Flex vacation Health care Parental leave Startup environment Team events

Region: North America
Country: Canada

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.