We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role and a management role.
As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase.
In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment as well as collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies.
Additionally, you will serve as the reporting manager for the SOC Analysts in your geographic region.
What is in it for you?
Be able to work with a global team with a company with a strong brand and strong results to match.
Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology
Grow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations.
Competitive pay (salary and bonus potential), Full benefits package starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.)
Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays.
We will count on you to :
Act as the reporting manager for the Tier1 and Tier2 analysts in your geographic region
Provide technical and professional guidance for analysts on your team
Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations
Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs
Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic
Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations
Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies
Collaborating on Security Operation Center team training opportunities and other cross training opportunities as well as operating as a subject matter expert on various security topics across multiple domains
Supporting 24x7 operations by participating in an on-call rotation and assisting in ongoing incidents during non-standard hours
What you need to have?
Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience
2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role
Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively
Demonstrated leadership ability of technical teams.
Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences
Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies
Knowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography
What makes you stand out
Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously
Knowledge of common attacks, current threats, threat actors, and industry trends
Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework
Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications
Why join our team:
We help you be your best through professional development opportunities, interesting work and supportive leaders.
We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities.
Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being.
Job Classification
Industry: InsuranceFunctional Area / Department: IT & Information SecurityRole Category: IT SecurityRole: Cyber SecurityEmployement Type: Full time