Information Security Specialist | Spécialiste en sécurité de linformation

Montreal 2 days agoFull-time External
Negotiable
What could be your next challenge? Join Hitachi Cyber, a global leader in cybersecurity, and become part of a dynamic team of experts dedicated to protecting organizations across various industries. As an Information Security Specialist, you’ll play a key role in delivering cutting-edge security services, leveraging tools like Microsoft Sentinel and Google SecOps (Chronicle) to detect, respond, and prevent threats. You’ll play a key role in quality assurance, vulnerability management coordination, reporting, and proactive threat analysis and helping clients strengthen their security posture and stay ahead of emerging threats. Your mission: • Perform quality assurance reviews of SOC-generated incidents to ensure alerts from Microsoft Sentinel, Google SecOps, and other SIEM platforms are accurately captured, classified, and escalated. • Collaborate with SOC analysts and engineering teams to improve alert fidelity, rule tuning, and incident-handling procedures. • Prepare monthly operational and security performance reports and deliver presentations to clients, summarizing key metrics, incident trends, and improvement actions. • Schedule and track vulnerability scans, ensuring scans are completed on time and results are communicated to relevant stakeholders. • Support the onboarding and validation of new log sources, ensuring they are properly integrated into SIEM platforms for effective monitoring. • Maintain and update documentation for alert flows, incident management procedures, and escalation paths. • Conduct threat hunting activities and recommend new correlation rules or detections based on emerging threats, attack trends, or recent incidents. • Contribute to continuous improvement efforts by identifying recurring issues, false positives, or detection gaps and recommending corrective actions. • Provide expert guidance and support to clients on security-related issues. • Lead complex incident response cases and provide post-incident recommendations. • Mentor and coach junior analysts in technical and procedural areas. • Participate in on-call rotations and security investigations. What we’re looking for • 3–5 years of experience in a security operations environment (SOC). • A strong customer service mindset and ability to communicate clearly with both technical and non-technical audiences. • Bachelor’s degree or equivalent professional experience in a related field. • Hands-on experience with SIEM tools, especially Microsoft Sentinel and Google SecOps / Chronicle. • Proven skills in incident response and security analysis. • Deep understanding of packet capture and network protocols. • Familiarity with vulnerability management and scanning tools. • Cloud experience is considered a strong asset, particularly with Google Cloud and Microsoft Azure. • Relevant certifications include in any of: • Google Cloud Professional Cloud Security Engineer. • Google Cybersecurity Professional Certificate. • Microsoft Certified: Security Operations Analyst Associate (SC-200). • Microsoft Certified: Azure Security Engineer Associate (AZ-500). • Other Certifications such as GCIA, CEH, CISM, or CISSP (asset). • Excellent communication skills in English and French. #J-18808-Ljbffr