SOC Analyst

Montreal 1 days agoFull-time External
329.8k - 355.1k / yr
Security Operations Center (SOC) Analyst Position Overview The Security Operations Center (SOC) Analyst plays a critical role in protecting Calian customers nationwide by monitoring, detecting, and responding to cybersecurity threats. As a key member of the cybersecurity incident response team, the SOC Analyst serves as the first line of defense against security incidents. This role offers hands‑on experience with advanced network and endpoint detection technologies, SIEM platforms, and incident response tools, supporting a comprehensive and evolving cybersecurity program. The SOC Analyst is responsible for analyzing, identifying, and resolving security alerts and events in a fast‑paced, mission‑driven environment. Responsibilities Perform real‑time, proactive security monitoring, detection, and response to cybersecurity events Conduct incident response activities including triage, analysis, containment, remediation, and recovery Investigate security alerts generated by SIEM, IDS/IPS, antivirus, endpoint tools, and customer escalations Identify indicators of compromise and recognize successful or attempted intrusions Differentiate false positives from genuine security incidents Launch, track, and manage investigations through resolution Respond to security alerts and escalations in a timely and effective manner Communicate investigation findings clearly to technical and non‑technical stakeholders Maintain situational awareness of emerging threats, vulnerabilities, and mitigation strategies Participate in the Computer Security Incident Response Team (CSIRT) Provide on‑call support for after‑hours security‑related events Perform other duties as assigned and support team objectives Qualifications Bachelor’s degree in Engineering, Computer Science, Information Security, Information Systems, or equivalent work experience Experience working with security tools such as SIEM, IDS/IPS, antivirus, and endpoint detection platforms Understanding of network architecture, TCP/IP, and network traffic capture and analysis Experience reviewing Windows and Linux ( • nix) system and audit logs Knowledge of vulnerability management and risk‑based security models Familiarity with penetration testing tools, techniques, and methodologies Programming or scripting experience preferred Understanding of syslog functionality Strong analytical, investigative, and problem‑solving skills Excellent communication skills at both technical and business levels Ability to work collaboratively in a team‑oriented, customer‑focused environment Additional Requirements Willingness to participate in an on‑call rotation for after‑hours incident response Demonstrated commitment to customer satisfaction and respectful collaboration Ability to perform essential job functions with or without reasonable accommodation Experience in a customer‑service–oriented role preferred Compensation $65,000 - $70,000 Vacancy We have 1 available position. #J-18808-Ljbffr