logoAcabeta Jobs
Back to Jobs

Information Security Analyst

Numeris

Full-time

Remote

Summary:

Type: Fulltime

Location: Remote

Company

Numeris Canada’s most trusted and authoritative source for broadcast measurement and consumer behaviour data. As well, the industry leading intelligence provider to broadcasters, advertisers, and agencies. We have been recognized for over 75 years as providing the gold standard in audience intelligence.

Role Summary

The Information Security Analyst plays a pivotal role in promoting a culture of security awareness and ensuring the protection of organizational assets against cyber threats.

Key responsibilities include providing training sessions to fellow associates, actively listening to their concerns, and problem-solving collaboratively.

Additionally, the role involves offering guidance to the IT leadership team on security-related matters and serving as a trusted advisor in aligning security objectives with overall business goals. Through knowledge sharing and continuous improvement initiatives, the Information Security Analyst contributes to enhancing the organization's security posture and resilience against evolving cybersecurity challenges.

What you will do

  • Monitoring Security Systems: Continuously monitor various security systems, including firewalls, intrusion detection systems, antivirus software, and others, to promptly detect and respond to any security incidents.
  • Security Incident Response: Take the lead in investigating security breaches and incidents, pinpointing their root causes, and developing strategies to prevent similar occurrences in the future. Collaborate closely with IT and business teams to ensure coordinated and effective response efforts.
  • Vulnerability Management: Identify and assess vulnerabilities present in systems and networks, collaborating with technical teams to mitigate risks through patch management and configuration changes. Thoroughly document findings and facilitate clear communication across teams to promptly address security weaknesses.
  • Security Policy Enforcement: Ensure the enforcement of robust security controls, policies, and procedures throughout the organization, guaranteeing compliance with relevant regulations, standards, and best practices.
  • Security Awareness Training: Develop and implement security awareness training programs aimed at educating employees on the best practices for maintaining information security, fostering a culture of security consciousness within the organization.
  • Security Risk and Vendor Assessments: Conduct comprehensive assessments of security risks and evaluate third-party vendor security measures to gauge the effectiveness of existing security controls and identify areas for enhancement.
  • Security Tool Evaluation: Assess and evaluate the suitability of new security tools and technologies to bolster the organization's overall security posture, ensuring that chosen solutions align with the organization's security objectives and requirements.

What you have

  • Proficient in various security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM (Security Information and Event Management) systems, and antivirus software.
  • Knowledgeable about networking protocols and operating systems.
  • Extensive working knowledge of information security, vulnerabilities, and threats.
  • Expertise in information security best practices, tools, and techniques, including encryption methods.
  • Familiarity with relevant security and privacy legislation.
  • An excellent understanding of the software development lifecycle.
  • Proven communication, presentation, and negotiation skills, with the ability to convey complex information to various audiences.
  • Excellent judgment and strong decision-making skills.
  • Proven critical thinking abilities.
  • Proven detail-oriented approach to work.
  • Product research, penetration testing co-ordination and review experience
  • This role will require some on-call requests with incident response and security operations

What you need

  • At least 3 years of experience in information security or a related field with specific experience in areas such as incident response, vulnerability management, or security operations.
  • A bachelor's degree (or higher/equivalent) in computer science, information technology, cybersecurity, or a related field
  • Relevant certifications, such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+

Values

Data-driven, Conscious transparency, Collaboration through trust, People first, Commitment to the best