×
Register Here to Apply for Jobs or Post Jobs. X

Sr Manager, Cyber Threat Intelligence; CTI

Job in Brampton, Ontario, Canada
Listing for: Rogers Communications
Full Time position
Listed on 2026-02-20
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security, Systems Analyst
Job Description & How to Apply Below
Position: Sr Manager, Cyber Threat Intelligence (CTI)

Our Technology team wakes up every day with one goal in mind - connecting Canadians to the people and things that matter most. Together, we are proud to support 30 million Canadians each month through managing a robust portfolio that champions leading-edge technology. We drive large-scale, complex, and high-visibility technology projects and programs that shape the future of technology in Canada and expand connectivity from coast to coast.

If you are interested in being a part of this, consider applying for the following opportunity:

We are seeking a visionary and technically seasoned Senior Manager of Cyber Threat Intelligence (CTI) to evolve and operationalize our advanced threat intelligence and hunting program. The successful candidate will play a critical role in enhancing our organization's ability to anticipate, detect, and pre-empt sophisticated cyber threats, especially those targeting the telecommunications infrastructure and financial services landscape. This role will guide the integration of CTI across key business functions, advance our threat hunting capabilities, and help safeguard sensitive customer data and sector-critical infrastructure from nation-state actors, financially motivated adversaries, and third-party supply chain threats.

What you'll be doing:

Threat Intelligence Operations

  • Oversee daily intelligence operations including adversary tracking, threat actor attribution, IOC/IOA analysis, and geopolitical threat monitoring relevant to telecom and financial ecosystems.
  • Guide the production of actionable threat intelligence reports and executive briefings that map to business risks across both sectors.
  • Ensure intelligence feeds are prioritized, validated, and actionable—enhancing use cases in SIEM, EDR, Dark Web Monitoring and SOAR/Threat Intel platforms.
  • Translate highly technical threat findings into clear and concise insights for business, risk, and leadership audiences.
  • Maintain updated Priority Intelligence Requirements (PIRs) aligned with business risk assessments, fraud intelligence, telecom, and financial attack surfaces.
  • Integrate CTI workflows with threat detection to enhance automation and reduce time-to-detection and time-to-inform stakeholders
  • Continuously refine PIRs with stakeholder feedback loops from internal business units.

Leadership & Strategy

  • Evolve and enhance an established Cyber Threat Intelligence program by refining existing workflows, intelligence lifecycle practices, and stakeholder engagement models.
  • Drive the strategic and operational maturity of the Threat Hunting program by identifying coverage gaps, integrating intelligence-led hunting, and developing advanced detection playbooks.
  • Take a learderhip role on across-functional team of CTI professionals and threat hunters and support in establish a clear vision, expectations, and professional development tracks.
  • Collaborate with senior leaders across Governance, Risk, Compliance, SOC, IR, and Technology as well as with key external partners and intelligence to ensure CTI insights directly inform executive decision-making, enterprise-wide detection strategy, and sector regulatory alignment.
  • Represent the CTI function in industry ISACs (FS-ISAC, CTIA, Telecom ISAC) and other threat-sharing partnerships, enabling collaborative defense against sector-specific threats.
  • Manage CTI performance metrics (KPIs/KRIs), aligning outputs with evolving threat models and board-level risk themes to strengthen the relevance and impact of CTI on critical nosiness functions.

Collaboration & Integration

  • Collaborate with the SOC, Vulnerability , and Incident Response to ensure threat intel drives detection use cases and post-incident reviews.
  • Support threat modeling and cyber risk assessments for critical telecom infrastructure and financial services.
  • Work closely with Third-Party Risk Management and Supply Chain teams to monitor and assess external risk dependencies (e.g., vendors, partners, MSSPs).
  • Facilitate and participate in cross-functional threat simulations and tabletop exercises informed by real-world threat intelligence.
  • Promote a culture of intelligence sharing and threat awareness across all lines of business

What you…

Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary