Our Technology team wakes up every day with one goal in mind - connecting Canadians to the people and things that matter most. Together, we are proud to support 30 million Canadians each month through managing a robust portfolio that champions leading-edge technology. We drive large-scale, complex, and high-visibility technology projects and programs that shape the future of technology in Canada and expand connectivity from coast to coast. If you are interested in being a part of this, consider applying for the following opportunity:
The Rogers Information and Cyber Security Unit is seeking a highly motivated Senior Cyber Security Specialist to join our Cyber Protection Center. Reporting to the Sr. Manager, Cyber Forensics at the Rogers Park Brampton campus, this role is responsible for maintaining and advancing our existing cyber security program through the continual review and development of Rogers cyber security strategy and security incident response procedures. This role is equivalent to a SOC Tier 2 or 3 level specialist as the incumbent will be tasked to Rogers’ cyber–Incident Response, Forensic function, which includes the identification and application of threat intelligence information, building automation capabilities and leading continuous security improvement programs (SIP).
We are open to hire for our Calgary or Greater Toronto Area Location .
Who we're looking for:
Providing first-line response and initial management of any new or developing cyber security related issues including participation in on-call rotation.
Enhanced level triage and assessment of security events to determine risk to business.
Lead, contribute to security projects, meetings, and ad-hoc requests.
Performing gap assessments, oversee development of automation scripts, correlation rules, tuning of systems & security tools.
Contribute to security projects and ad-hoc requests.
Demonstrate strong leadership in challenging environments, maintaining a professional, calm, and expert manner always.
Utilizing “kill chain” methodologies, effectively determine risk prioritized response, investigate security events and make clear recommendations on mitigation.
Review and interpret alerts, events and system alarms using SIEM, other tools, behavioral analytics, and network analysis while providing evolved emergency response services, incident management and analysis.
Respond to service provider network attacks affecting critical network infrastructure and the cloud environments.
Produce detailed incident reports and technical briefs on security incidents and preparing executive risk based metrics reports based on the MITRE ATT&CK model.
Participate and contribute to post incidents reviews and documentation.
Identify and report on threat intelligence from external resources and use to apply risk based assessments.
Day-to-day threat hunting, monitoring and analysis of risk-based threat intelligence.
Conduct digital forensic examinations of digital media from a variety of sources, using industry's best practices and standard tools.
Being proficient in the latest forensic response and reverse engineering skills, along with astute interest in the latest exploit methodologies.
Responsible for developing and evolving SOC response procedures based on MITRE ATT&CK.
Performing gap assessments, develop automation scripts and correlation rules, tuning of systems & security tools.
Maintain knowledge of adversary Tactics, Techniques, and Procedures (TTP).
What you bring:
Undergraduate degree in computer science, engineering, information science, or a related technical discipline
5+ years of related experience in cybersecurity or computer network defense or incident response
CISSP, GIAC, GREM accompanied by a Forensics certification preferred
Strong knowledge of Clouds, Service provider/ Telecom infrastructure, virtual environments, web applications and APIs
Experience with forensic tools and methodologies is required
Scripting (Powershell, Bash, Perl, Python) knowledge/experience a bonus.
Working knowledge of TCP/IP networking, including routing and common ports/protocols.
Demonstrated relevant experience as a key member of a threat intel, incident response, malware analysis, or similar role.
Strong knowledge of malware families and network attack vectors.
Strong knowledge of Linux, Windows system internals.
Understanding of payment card processing, related fraud and carding techniques.
Ability to clearly articulate risk & findings to internal clients both verbally and in written form.
Excellent communication, interpersonal, and documentation skills.
Strong organizational, time management, and multi-tasking skills.
Ability to work well both independently and in a team environment.
Proficiency with Microsoft-based computer programs, Outlook, Word, Excel, and PowerPoint.
What’s in it for you?
We believe in investing in our people and helping them reach their potential as valuable members of our team. As part of our team, you’ll have access to a wide range of incredible resources, growth opportunities, discounts, and perks, including:
Competitive salary & annual bonus
Competitive & flexible health and dental benefits, pension plan, RRSP, TFSA, and Stock matching programs.
Discounts: Enjoy up to 50% off Rogers Services and Blue Jays Tickets, 25% off TSC items, and a 20% discount on all wireless accessories sold in Rogers stores.
Paid time off for volunteering
Company matching contributions to charities you support
Rogers First: priority in applying to internal roles of interest
Wellness Programs: Homewood employee & family assistance program
Cognitive Behavioural Therapy (CBT) & Virtual therapy sessions
Low or no-cost fitness membership with access to virtual classes
Our commitment to the environment and diversity: Work for an organization committed to environmental protection
Strong commitment to diversity and inclusion with employee resource groups supporting equity-deserving groups including groups representing People of Colour, 2SLGBTQIA+, Indigenous Peoples, Persons with Disabilities and Women. We all bring something different, and we know what makes us different makes us great.
To protect our people, brand and assets, a pre-employment background check will be conducted. As part of our selection process, all candidates must clear a criminal background check. Additionally, a credit check and drivers abstract may be required depending on the role.
Schedule: Full time
Shift: Day
Length of Contract: Not Applicable (Regular Position)
Work Location: 8200 Dixie Road (101), Brampton, ON
Travel Requirements: Up to 10%
Posting Category/Function: Technology & Information Technology
Requisition ID: 315135
At Rogers, we believe the key to a strong business, is a diverse workforce where equity and inclusion are core to making everyone feel like they belong. We do this by embracing our diversity, celebrating our different perspectives, and working towards creating environments that empower our people to bring their whole selves to work. Everyone who applies for a job will be considered. We recognize the business value in creating a workplace where each team member has the tools to reach their full potential by removing any barriers for equal participation. We work with our candidates who are experiencing a disability throughout the recruitment process to ensure that they have what they need to be at their best. You matter to us! For any questions, please visit the Recruitment Process FAQ .
#J-18808-Ljbffr