We are looking for candidates who thrive in dynamic, high-stakes environments and demonstrate a deep commitment to operational excellence in cybersecurity. The ideal person is curious, analytical, and solutions-driven, able to rapidly assess complex situations and collaborate across teams to drive impactful security improvements.
- Analytical Mindset: Excels at deconstructing incidents to uncover patterns and root causes, with an instinct for cross-referencing diverse intelligence feeds to add context and clarity.
- Proactive and Resourceful: Demonstrates initiative in identifying potential vulnerabilities, proposing solutions, and supporting development teams in remediation efforts.
- Strong Communicator: Communicates effectively in both English and French with technical teams and business stakeholders in an international setting.
- Team Player: Enjoys collaborative problem solving with SOC, DevOps, and infrastructure teams, embracing knowledge sharing and continuous learning.
- Technically Versatile: Possesses hands-on skills in security operations and incident analysis, with significant exposure to cloud technologies, web application security, and infrastructure security tools (SIEM, EDR, CSPM, WAF, NAC, ZTNA, etc.).
- Scripting and Automation Enthusiast: Demonstrates the ability (or eagerness to deepen expertise) in scripting and automation (Python, PowerShell), recognizing their value in security monitoring and process improvement.
- Adaptable and Continuous Learner: Keeps pace with evolving threats and industry best practices, readily adapting approaches to new contexts such as DevSecOps or OT security.
- Methodical and Reliable: Handles incident response and vulnerability management processes with rigor and a keen eye for detail, ensuring consistent delivery quality in a high-performance culture.
- Advantageous Experience: Experience with PAM solutions, technical architecture of networked environments (such as AD, Citrix), and offensive security techniques will distinguish the strongest candidates.
- Client-Focused: Prioritizes the business impact of technical recommendations, customizing security measures to fit both risk posture and operational constraints.
We place a premium on intellectual curiosity, professional integrity, and the drive to achieve tangible improvements in organizational cybersecurity maturity. If you are energized by complex challenges, cross-functional collaboration, and the pursuit of security excellence, you will excel in this role.