Information Security Analyst

 

Description:

We are seeking a high-caliber, technically-driven Information Security Analyst (SOC) to join a specialized internal security team. This is not a "process-only" role; we are looking for a "hands-on-keyboard" expert who moves beyond triaging alerts to performing deep-dive technical investigations.

You will act as the final line of defense, taking high-severity escalations from our MDR (Managed Detection & Response) partner and leading them through full containment and remediation. If you are naturally curious, thrive in a hybrid on-prem/cloud environment, and enjoy the "hunt" in security logs, this role is designed for you.

How You’ll Make an Impact

  • Deep-Dive Investigation: Perform advanced host-based and network forensics. You won't just see an alert; you will dig into the logs to identify the exact infection vector and lateral movement.
  • Incident Response Leadership: Lead the technical response for high-severity incidents, making critical decisions on system isolation and server shutdowns.
  • Tooling & Automation: Optimize and build upon our security stack, including Palo Alto Cortex (XDR) and Microsoft Sentinel (SIEM). You will leverage SOAR technologies to automate manual workflows and streamline operations.
  • Hybrid Environment Mastery: Secure a complex environment that spans a traditional on-prem data center and a rapidly expanding Azure cloud footprint.
  • Threat Hunting: Proactively hunt for unknown cyber threats and anomalous activity that bypasses traditional vendor signatures.
  • Subject Matter Expertise: Advise on security best practices and risk analysis during project engagements and regulatory audits (ISO 27001, SOC 1/2, NIST).

 

What You’ll Bring

  • Expertise: 5–7+ years in Security Operations and Incident Response, with a focus on responding to high-stakes security incidents.
  • Technical Breadth: 3–5+ years of experience in host-based/network forensics and the investigation of security appliance and network logs.
  • The Tech Stack: Deep proficiency with SIEM (Sentinel), EDR/XDR (Cortex), Firewall management, UEBA, and Azure Security Center.
  • Problem Solving: Strong deductive reasoning and the ability to assimilate information quickly in high-demand situations.
  • Education: Bachelor’s degree in Computer Science, IT, or a related field.

Organization Randstad Digital
Industry IT / Telecom / Software Jobs
Occupational Category Information Security Analyst
Job Location Toronto,Canada
Shift Type Morning
Job Type Full Time
Gender No Preference
Career Level Experienced Professional
Experience 5 Years
Posted at 2026-05-20 6:16 pm
Expires on 2026-07-04