Amazon Web Services (AWS), Analysis Skills, Application Programming Interface (API), Automation, Best Practices, Cloud Computing, Communication Skills, Computer Security, Continuous Improvement, Cyber Threat Hunting, Develop and Maintain Customers, Establish Priorities, Hunting, Identify Issues, Information/Data Security (InfoSec), Internet Security, Leadership, Malware Analysis, Microsoft Windows Azure, Network Traffic Analysis, Office Suites, Penetration Testing, Problem Solving Skills, Project Estimates, Python Programming/Scripting Language, Regulatory Requirements, Reporting Dashboards, Reporting Skills, Risk Management, Security Analysis, Security Information and Event Management (SIEM), Security Monitoring, Simulation, Team Player, Telecommunications, Testing, Trend Analysis, Validation Testing, Windows PowerShell
Info Security Analyst IV
Location: Toronto, ON / Hybrid
Duration: 6 months with possible extension
Description:
Scope of project:
Recurring project, validate security, mature the platform that they have and validate the security checks year after year.
Team size/culture:
Pod structure 20 team members HM and contractor are going to be working together
Candidate profile details:
Degree/Certifications Required:
Degree, computer area - foc
Years of Overall Experience:
5+ years of experience cyber security, with a focus on breach and attack simulation or other offensive security discipline.
8-10 yrs overall experience
Ideal Candidate Background:
Cyber security, thread hunting in the domain, hunting operations, attacker tactics, , techniques, and procedures (TTPs) and coding, PowerShell and python purple teaming, thread hunting, preforming validation checks
Summary of day-to-day responsibilities:
Must-have hard skills:
Advanced knowledge of security incident and event management, log analysis, Network traffic analysis, Malware investigation and remediation.
Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure is preferred.
Familiarity with Breach and Attack Simulation (Client) solutions
Excellent problem-solving and analytical skills.
Good communication
phyton or PowerShell
thread hunting, incident response, Digital Forensics and purple teaming
Nice-To-Have
Banking or financial institution
Any engineering exp
Job Description:
Develop and implement a controls assurance strategy structured around the MITRE Telecommunication&CK framework
Creating realistic attack scenarios based on attacker tactics, techniques, and procedures (TTPs) to test the effectiveness of security controls across various systems and networks.
Collaboratively identify key security controls, monitor gaps in their implementation, and work closely with relevant teams to remediate identified issues.
Staying current with industry best practices, emerging threats, and relevant regulatory requirements to ensure a comprehensive understanding of the evolving cybersecurity landscape.
Collaborate with cyber threat intelligence, threat hunting, and threat detection engineering groups to identify and prioritize key security controls, and gaps, and ensure appropriate alerting feedback.
Generating comprehensive reports detailing simulation findings, including actionable recommendations for remediation and security posture improvement to relevant stakeholders.
Collaborate with other members of the cybersecurity team to analyze and interpret the results of simulated attacks.
Continuously improve and refine the breach and attack simulation process to enhance its effectiveness.
Make recommendations for security posture improvements based on analysis of breach and attack simulation trends.
Work with senior analysts and leadership to develop relevant Client dashboards to represent program value.
Quantify risk reduction due to breach and attack simulation program
Leverage APIs and automation techniques to integrate Client with other security tools.
Job Requirements:
What can you bring to client:
Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. It helps if you have:
5+ years of experience cyber security, with a focus on breach and attack simulation or other offensive security discipline.
Advanced knowledge of security incident and event management, log analysis, Network traffic analysis, Malware investigation and remediation.
Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure is preferred.
Strong software development skills, with proficiency in Python, PowerShell, and other relevant languages.
Familiarity with Breach and Attack Simulation (Client) solutions (e.g., AttackIQ, Atomic Red Team, etc.) and the MITRE Telecommunication&CK framework
Offensive security skills such as penetration testing or vulnerability assessment.
Familiarity with MITRE Telecommunication&CK, SIEM, EDR, and security control validation
Knowledge of common security controls, best practices, and attacker techniques.
Excellent problem-solving and analytical skills.
I
Iconma
ICONMA is a global information consulting management firm providing Professional Staffing Services and Project-Based Solutions for organizations in a broad range of industries.
- Corporate Headquarters in Troy, Michigan; 20+ locations worldwide.
- Certified Woman-Owned Business Enterprise (WBE); certified by Women’s Business Enterprise National Council, National Women Business Owners Corporation (NWBOC); and California Public Utilities Commission (CPUC).
- Founded in 2000
- 2000+ Employees
The company was founded on the principle that success is derived from delivering high quality service and resources in the most responsive, flexible, and innovative way. ICONMA invests in people and resources with a single goal: To provide our customers with the highest quality service in the most responsive manner. Through its network of offices, ICONMA provides the resources to help clients maintain their competitive advantage.
2,000 to 2,499 employees
Management Consulting Services
401K, Employee Referral Program, Life Insurance