Jobs
>
St. John's

    Incident Handler - Saint John, Canada - GoSecure

    GoSecure
    GoSecure Saint John, Canada

    Found in: beBee S2 CA - 4 weeks ago

    Default job background
    Full time
    Description

    GoSecure is recognized as a leader and innovator in cybersecurity solutions. The company is the first and only to integrate an Endpoint and Network threat detection platform, Managed Detection and Response services, and Cloud/SaaS delivery. Together, these capabilities provide the most effective response to the increased sophistication of continuously evolving malware and malicious insiders that target people, processes and systems. With focus on innovation quality, integrity, and respect, GoSecure has become the trusted provider of cybersecurity products and services to organizations of all sizes, across all industries globally. To learn more, please visit:

    GoSecure offers a creative and challenging work environment, a competitive benefit package, and a great atmosphere to foster career growth. Come put your career on the leading-edge and bring your talents to a much sought-after high growth opportunity in technology- GoSecure

    Summary

    The Incident Handler plays a key, strategic and operational role in the development, management, and continuous improvement of IR Service Delivery. This role also serves as an escalation point for significant security incidents and must be able to perform the necessary technical and managerial tasks to summarize incident related data. The Incident Handler has the responsibility to perform technical analysis, document findings and recommendations, provide timelines and deliver updates and other communications to audiences ranging from internal teams and executives to our most discerning customers. The Incident Handler is part of a team of security professionals whose core function is to provide continuous cybersecurity incident intake, triage, investigative response, and data analysis services for new and existing clients.

    Duties and Responsibilities


    • Analyze technical information to determine impact and action plans, triage incidents and events for direct action.


    • Participate in response activities across teams or directly with stakeholders to identify and remediate potential threats.


    • Stay up to date and evaluate security trends, evolving threats, risks and vulnerabilities and apply tools and subject matter expertise to evaluate the risk in the context of the enterprise to mitigate risk. Coordinate activities with other security teams including threat intelligence, penetration testers, and product groups.


    • Deliver cyber incident response processes and procedures and provide routine updates.


    • Maintain technical documentation including standard operating procedures and incident response processes/procedures.


    • Some after-hours responsibilities and escalations including weekends and holidays in support of incidents or other events.

    Requirements and Experience


    • 3+ year experience in incident response or similar information security operations role.


    • This position requires 24x7 on call rotation as per the predetermined schedule.


    • Some evenings, weekends, and possibly holidays will be required to be worked.


    • Bilingual (French and English) both written and spoken is preferred.


    • 30% of travel on short notice will be required.

    Preferred Qualifications


    • One or more of the following certifications: GCIH, GCFE, GNFA, GREM


    • Knowledgeable about modern security related subjects and trends, for example, Advanced Persistent Threat (APT), rootkits, Spear Phishing, and credential compromise techniques.


    • Experience in security technologies (i.e. incident case management, SIEM, SOAR, EDR, Intrusion Prevention, Digital Forensics).


    • Proven ability to participate in large scale projects with high collaboration.


    • Excellent written and oral communications.


    • Excellent judgement, decision-making skills, and the ability to work under pressure.


    • Excellent presentation skills and experience of presenting to senior management and senior leaders.


    • Experience with Cloud Computing and technology.


    • Experience with Unix/Linux, or work relating to OS internals and file-level forensics.