Together with our thirteen provincial and territorial partners, we form Canada’s National Research and Education Network (NREN). This ultra-high-speed network connects Canada’s researchers, educators, and innovators to each other and to global data, technology, and colleagues.
To strengthen the security of Canada’s research and education sector, we collaborate with our partners in the NREN, government, academia, and the private sector to fund, implement, and support cybersecurity initiatives. We also provide identity management services to the academic community, boost Canada’s startups with cloud resources and expertise in emerging technologies and fund the development of software for research.
Established in 1993, CANARIE is a non-profit corporation, with most of our funding provided by the Government of Canada.
Who We Are
We’re a small team of dedicated thinkers, innovators, and problem-solvers. Our team is positive, passionate, and collaborative.
We work with Canada’s higher-ed community, private sector, and government partners to ensure that Canada’s bright researchers and entrepreneurs benefit from the technologies and tools that are critical to their success. Together with our partners across the country, we work to ensure that Canada leads in research and innovation.
The Position: Cybersecurity Analyst
The Cybersecurity Analyst will be accountable for monitoring and delivering timely, relevant threat intelligence investigating events and incidents and providing technical guidance and support to partners.
This is a full-time, permanent position that reports to the Director, Cybersecurity Operations.
- Collaborating with partners to analyze security events and incidents, providing incident response support, risk management, proposing mitigations, and supporting user awareness.
- Identifying and prioritizing vulnerabilities and collaborating with stakeholders to ensure they are understood and triaged effectively
- Reviewing threat intelligence to provide effective threat reporting to partner organizations
- Reviewing log data and alerts from various security platforms and providing analysis, trending, and insights.
- Onboarding new academic institutions as members to relevant platforms and initiatives, conducting health-checks, and proactively alerting customers to impending operational issues.
- Providing recommendations for future projects, security tools, applications, along with associated benefits of the solution
- Developing training material and process documentation on relevant security platforms and processes
- Domestic and international travel may occasionally be required
- Other related duties and responsibilities, as required
The Ideal Candidate
To excel at CANARIE, you have a demonstrated capacity to work collaboratively on teams and are also an energetic self-starter with the self-motivation to work independently. You have excellent oral and written communication skills, and can count time management, problem solving, and managing multiple priorities as your strengths. You also share a dedication to CANARIE’s core values: service, teamwork, innovation, quality, and integrity.
Relevant experience in publicly funded not-for-profit organizations is desirable. Bilingualism is preferred.
What You Bring
Education and Experience
- College diploma or university degree, or a suitable combination of education, experience, or other relevant training
- Minimum of 5 years of relevant work experience in a Security Operations Centre (SOC) environment (which could include: incident response, investigations, computer forensics, network forensics, threat intelligence, or threat hunting)
- Minimum of 2 years of exposure to threat intelligence practices
- Experience documenting cybersecurity processes and playbooks
- CISSP or other relevant technical certifications are an asset
- Understanding of cybersecurity risks to the academic sector
- Ability to identify, analyze, document and report on relevant threats (threat intelligence)
- Experience in identifying and mitigating network and end-point security issues
- Demonstrated understanding of patch and vulnerability management
- Demonstrated ability to gain trust and credibility from internal and external stakeholders
- Strong working knowledge of the Microsoft Office Suite
- Working knowledge of the following:
- MITRE ATT&CK Framework
- Security of cloud and on-prem environments
- Security platforms such as (Firewalls, SIEM, EDR, SOAR, sandboxing, etc.)
- Frameworks such as NIST, ISO etc.
- Demonstrated understanding of attack activities such as network probing/scanning, DDOS, APT, malicious code activity, reverse engineering, malware analysis etc.
If you may be interested in this opportunity, please apply using this link.
Come Work with Us
We welcome and encourage applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process.