×
Register Here to Apply for Jobs or Post Jobs. X

Specialist Cyber Defence

Job in Toronto, Ontario, C6A, Canada
Listing for: ipss inc.
Full Time position
Listed on 2025-11-21
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security, Information Security
Salary/Wage Range or Industry Benchmark: 113683 - 155216 CAD Yearly CAD 113683.00 155216.00 YEAR
Job Description & How to Apply Below

Division: Office of the Chief Information Security Officer

Reports To: Manager, Cyber Defense

Salary Range: $113,683 to $155,216

Work Location: 55 John Street, Toronto

Job Type: Permanent Full Time

Shift Information: Monday to Friday, 35 hours work week

JOB SUMMARY

To support the execution of the Office of the CISO’s mandate, cyber vision, and strategy by assisting with technical tasks, business support, and services related to Threat Management’s cyber programs and initiatives across all City divisions, agencies, and corporations.

To contribute to the development and delivery of Threat Management’s cyber programs and initiatives by collaborating with teams across the organization and supporting the creation of project plans and execution roadmaps.

To provide operational support and assist with the implementation of Cyber Defense activities within the Threat Management section under the guidance of senior team members.

MAJOR RESPONSIBILITIES
  • SOC Operations Support:
    Assists in the day-to-day activities of the Security Operations Center (SOC) by monitoring alerts, escalating incidents as needed, and supporting threat detection and incident response efforts to help maintain the City’s security posture.
  • Collaborate with Stakeholders to Assist with SOC Security Technologies:
    Supports internal IT teams, external partners, and service providers by helping with the operation, maintenance, and optimization of SOC security tools and technologies. Assists with integration efforts related to enterprise security programs (e.g., SIEM, EDR, NDR, WAAP, SOAR, etc.).
  • Assist with Security Tools Management:
    Works with the Managed Security Services Provider (MSSP) and internal teams to monitor and maintain security tools (SIEM, EDR, NDR, WAAP, SOAR, etc.), ensuring alerts and anomalies are documented escalated appropriately.
  • Support the Application of Cyber Threat Intelligence:
    Supports the Threat Intelligence team by applying basic operational and tactical cyber threat intelligence to security operations, contributing to the organization’s ability to detect, analyze, and respond to security events.
  • Assist in Developing and Supplying Security Metrics:
    Supports the collection and preparation of data to track key security metrics, compliance status, and trends, under the direction of senior team members.
  • Reporting Support:
    Assists in the preparation of security reports and metrics for senior management, contributing to visibility into the efficiency and compliance of security operations.
QUALIFICATIONS / CERTIFICATIONS
  • Post‑secondary degree in Business or Technology or a related discipline.
  • Over 3 years experience in Cyber Operations
  • In‑Depth security monitoring experience with one or more SIEM technologies (i.e. QRadar, Splunk, Azure Sentinel), EDR solutions, and intrusion detection/prevention technologies.
  • Basic knowledge of client‑server applications, multi‑tier web applications, relational databases, firewalls, VPNs, and enterprise Anti‑Virus products.
  • Strong understanding of security incident management, remediation steps and vulnerability management processes.
  • An understanding of a Cloud environment’s Security monitoring components (e.g. Microsoft:
    Defender, Sentinel;
    Amazon:
    Cloud Watch, Cloud Trail, Event Bridge; GCP: Chronicle Security, Event Threat Detection, Security Command Center, etc.)
  • Experience with web content filtering technology – policy engineering and troubleshooting.
  • Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
  • Experience in Incident Response or relevant cyber security field(s)
  • Experience managing cases with enterprise SIEM systems.
  • In depth knowledge of security vulnerabilities, exploits, malware and digital forensics as they relate to Incident Response.
  • Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
  • Strong knowledge of effective security practices in a large, complex environment and awareness of general security‑related training requirements within this environment.
  • Preferred Certifications (any in the list): GCIH, ECIH, CCSP, Azure, AWS or GCP Security Certifications,…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary