Info Security Analyst IV Location: Toronto, ON / Hybrid Duration: 6 months with possible extension Description: Scope of project: Recurring project, validate security, mature the platform that they have and validate the security checks year after year. Team size/culture: Pod structure 20 team members HM and contractor are going to be working together Candidate profile details: Degree/Certifications Required: Degree, computer area - foc Years of Overall Experience: 5+ years of experience cyber security, with a focus on breach and attack simulation or other offensive security discipline. 8-10 yrs overall experience Ideal Candidate Background: Cyber security, thread hunting in the domain, hunting operations, attacker tactics, , techniques, and procedures (TTPs) and coding, PowerShell and python - purple teaming, thread hunting, preforming validation checks Summary of day-to-day responsibilities: Must-have hard skills: Advanced knowledge of security incident and event management, log analysis, Network traffic analysis, Malware investigation and remediation. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure is preferred. Familiarity with Breach and Attack Simulation (Client) solutions Excellent problem-solving and analytical skills. Good communication phyton or PowerShell thread hunting, incident response, Digital Forensics and purple teaming Nice-To-Have Banking or financial institution Any engineering exp Job Description: Develop and implement a controls assurance strategy structured around the MITRE Telecommunication&CK framework Creating realistic attack scenarios based on attacker tactics, techniques, and procedures (TTPs) to test the effectiveness of security controls across various systems and networks. Collaboratively identify key security controls, monitor gaps in their implementation, and work closely with relevant teams to remediate identified issues. Staying current with industry best practices, emerging threats, and relevant regulatory requirements to ensure a comprehensive understanding of the evolving cybersecurity landscape. Collaborate with cyber threat intelligence, threat hunting, and threat detection engineering groups to identify and prioritize key security controls, and gaps, and ensure appropriate alerting feedback. Generating comprehensive reports detailing simulation findings, including actionable recommendations for remediation and security posture improvement to relevant stakeholders. Collaborate with other members of the cybersecurity team to analyze and interpret the results of simulated attacks. Continuously improve and refine the breach and attack simulation process to enhance its effectiveness. Make recommendations for security posture improvements based on analysis of breach and attack simulation trends. Work with senior analysts and leadership to develop relevant Client dashboards to represent program value. Quantify risk reduction due to breach and attack simulation program Leverage APIs and automation techniques to integrate Client with other security tools. Job Requirements: What can you bring to client: Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. It helps if you have: 5+ years of experience cyber security, with a focus on breach and attack simulation or other offensive security discipline. Advanced knowledge of security incident and event management, log analysis, Network traffic analysis, Malware investigation and remediation. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure is preferred. Strong software development skills, with proficiency in Python, PowerShell, and other relevant languages. Familiarity with Breach and Attack Simulation (Client) solutions (e.g., AttackIQ, Atomic Red Team, etc.) and the MITRE Telecommunication&CK framework Offensive security skills such as penetration testing or vulnerability assessment. Familiarity with MITRE Telecommunication&CK, SIEM, EDR, and security control validation Knowledge of common security controls, best practices, and attacker techniques. Excellent problem-solving and analytical skills.