Conseiller.ère sénior en cybersécurité - Risque, et technologie
Job in
Montreal, Montréal, Province de Québec, Canada
Listing for:
Richter
Full Time
position
Listed on 2025-12-30
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Data Security
Job Description & How to Apply Below
Position: Conseiller.ère sénior en cybersécurité - Risque, performance et technologie
Location: MontrealRichter Montreal Office
The Role:
The Richter Cybersecurity Team is looking for a Senior Cybersecurity Advisor to join our team. The candidate must be highly organized, proactive, enthusiastic and results-oriented.
They will have a foundational understanding and willingness to learn more about:
cyber threat intelligencesecurity monitoringincident response and handlingsecurity operations processesthreat managementstandard industry technologiesThey will support the delivery and execution of white-glove cyber security services to an exclusive set of clients. Maturity, professionalism, and patience will be essential in dealing with these exclusive clients.
The candidate will also be instrumental in building cutting-edge security operations capabilities that align with Richter's overall vision to provide world-class cybersecurity concierge services.
Responsibilities:
Support the development, implementation and enhancement of Richter's Cybersecurity concierge solutionAnalyze activity trends in the environment and associated client environments using various analytics tools and methodologies for hunting for threats not otherwise detected by configured security alerts.Contribute to developing, implementing, and fine-tuning SIEM use cases/associated rules and other security control configurations to enhance threat detection capabilities.Perform in-depth investigation of events of interest (EOI) or indicators of compromise (IOC) identified during threat hunt activities or security alerts received from various security technologies as per defined investigation and incident response procedures.Conduct threat scenario analysis to develop new use cases with relevant attack vectors and create attack scenarios to formulate hunting strategies to identify the presence of threats that are going undetected by existing security controls.Liaise with appropriate internal stakeholders and external clients during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate recommendations for remediation.Collaborate with the senior team to develop hunt tactics based on threat intelligence information, attacker techniques, and procedures.Develop and build knowledge of and stay current on developments in the cyber threat landscape to adapt investigation techniques and provide recommendations to the client on responding to and remediating related incidents.Create monthly cybersecurity reports for all internal and external clients.Maintain an up-to-date document repository/knowledgebase/Wiki site.Required Qualifications
A recent Bachelor's Degree / Diploma in a relevant area of study with a preference for Computer Science, Information Security or Computer EngineeringFoundational knowledge of threat intelligence and threat huntingStrong analytical and investigative skillsKnowledge of technical security controls and mitigations9-5 availability for high severity incidentsGood working knowledge of one or more of the following topics:Common security threats, industry best practices, security technologiesGood working knowledge of advanced endpoint analyticsExperience with Cyber Kill ChainOperating systems (UNIX, Linux, Windows)Must have a solid working knowledge of NetworkingMust have experience in DLP, IPS/IDS, Firewalls, Content Filtering, End-Point ProtectionKnowledge of digital forensics and malware reverse engineeringPenetration testing and ethical hackingMalware analysis (dynamic and static)Experience with SIEM technologies such as Splunk, Bro, Elasticsearch, Logstash, and Kibana.Experience with Regular Expressions (Reg Ex)Perfect French, spoken and writtenPreference will be given to candidates with:
At least 3-years of working experience with incident responder or threat hunter, ideally working in a CIRT.At least 2-years of working experience as a SOC analystDesirable Qualifications
Industry certifications (CISSP, GIAC – GPEN, GCFE, GSE) are an assetProficiency in scripting languages (Python, shell, etc.)Knowledge of analytics and machine learning modelsSome experience with security orchestration tools and analyticsPrevious luxury retail or private banking…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here: