Support 416-591-6711 option 1 or Email Us

CIOC (SOC) Cybersecurity Analyst Tier 1

ISA is a Canadian Cyber Security Solutions provider that has served Canadian businesses for over 27 years. Our company supports enterprise organizations, governments & healthcare institutions as well as hundreds of commercial business across Canada. We are currently inviting passionate Cybersecurity Tier 1 Analysts who have built a career in Cyber Security to join our Canadian team to support our growth. ISA operates a 24x7x365 SOC Type 2 Cybersecurity Intelligence and Operations Center with offices in Canada and Europe.

Our team of professionals bring a multidisciplinary approach to the Cyber Security landscape and this is manifested in our expertise in delivering a variety of services out of our CIOC (SOC) including:

  • Incident Response and Remediation
  • Forensic Analysis Lab
  • Proactive and Predictive Threat Hunting and Rules Correlation Development
  • Bespoke Custom scripts building for Managed Security into Cloud environments
  • Red Team, Purple Team, Blue Team exercises, playbooks and advisory 
  • Expertise across the hosting and management of numerous SIEM technologies
  • Penetration Testing and Security Assessments 
  • Full service Security Engineering and Architecture expertise across Networks, Endpoints and the latest cloud security gateway solutions

Reporting to the Manager, Cybersecurity Intelligence & Operations Centre, the function of a CIOc Cybersecurity Analyst Tier 1 is to be on the forefront of incident response where they will utilize the latest in network security technology while providing Computer Network Defense and Information Assurance (IA) support to ISA's client base and internal network. 

Ideal candidate for the CIOC (SOC) Cybersecurity Tier 1 Analyst role will have the following responsibilities:

  • Monitor and analyze netowrk traffic and IDS alerts
  • Investigate intrusion attempts and perform in-depth analysis of exploits
  • Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident 
  • Conduct proactive threat research
  • Review security events that are populated in a Security Information and Event Management (SIEM) system
  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident
  • Independently follow procedures to contain, analyze, and eradicate malicious activity
  • Perform Tier 1/2 initial incident triage
  • Document all activities during an incident and providing leadership with status updates during the lice cycle of the incident 
  • Create a final incident report detailing the events of the incident 
  • Provide information regarding intrusion events, security incidents, and other threat indications
  • Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall CIOC functions

The ideal candidate for the Service Delivery Manager role will have the following qualifications:

  • Knowledge of information security event monitoring and detection and NID monitoring and incident response 
  • Familiarity with network security methodologies, tactics, techniques and procedures
  • Experience with IPS/IDS, SIEMs and other CND security tools
  • Ability to read and write Snort IDS signatures
  • Experience reviewing and analyzing network packet captures 
  • Experience performing security/vulnerability reviews of network environments
  • Possess a comprehensive understanding of the TCP/IP protocol, security architecture, network and remote access security techniques/products
  • Experience with enterprise anti-virus solutions, virus outbreak management, and the ability to differentiate virus activity from directed attack patterns
  • Working knowledge of network architecture
  • Strong research background, utilizing an analytical approach
  • Candidate must be able to react quickly , decisively, and deliberately in high stress situations
  • Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
  • Working knowledge of Windows and Linux OS to include experience working in the command line interface
  • Highly motivated individual with the ability to self-start, prioritize, multi-task ad work in a team setting

World class work tools at your disposal and a commitment by the business to help you develop your career where you want it to go. 

‹ Back

  • To apply for this position, please complete the form below.

  • For validation please enter the text shown into the field below. Refresh Image

    CAPTCHA Image


Contact ISA at 416-591-6711or email us