Cybersecurity Threat & Vulnerability Analyst

Corus EntertainmentToronto, ON
Hybrid

About The Position

The Cybersecurity and Threat Analyst is responsible for identifying, assessing, and helping mitigate cyber risks through effective vulnerability management, threat intelligence analysis, and close collaboration with security operations and technology teams. This role translates raw security data into actionable insights, enabling risk‑based decision‑making aligned with organizational objectives and risk appetite. The position plays a critical role in improving the organization’s cyber resilience by correlating vulnerabilities, threats, and business context to proactively reduce exposure and support incident response and governance activities.

Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent practical experience.
  • 3–7+ years of experience in cybersecurity, with hands‑on exposure to vulnerability management, threat intelligence, or security operations.
  • Strong understanding of vulnerability scanning technologies (e.g., network, application, cloud, and endpoint scanning).
  • Solid knowledge of common attack techniques, exploitation methods, and defensive controls across modern enterprise environments.
  • Experience working with cross‑functional technology teams to drive remediation and risk treatment outcomes.
  • Familiarity with SIEM, EDR/XDR, SOAR, and threat intelligence platforms.
  • Working knowledge of cloud security concepts and shared responsibility models (AWS, Azure, GCP).
  • Ability to analyze and correlate large volumes of security data from multiple sources.
  • Strong written and verbal communication skills, with the ability to influence without direct authority.

Nice To Haves

  • Industry certifications such as GCED, GCIA, GCIH, CISSP, CISM, CRISC, Security+, or equivalent are an asset.

Responsibilities

  • Serve as the subject matter expert for the end‑to‑end vulnerability management lifecycle across infrastructure, applications, cloud platforms, and endpoints.
  • Analyze vulnerability scan results from multiple tools, validate findings, and distinguish false positives from material risk.
  • Assess exploitability, threat relevance, asset criticality, and potential business impact to determine true risk exposure.
  • Prioritize vulnerabilities using a risk‑based approach, incorporating threat intelligence, known exploitation, compensating controls, and business context.
  • Coordinate with infrastructure, application, cloud, and endpoint teams to drive remediation efforts and risk treatment plans.
  • Validate remediation activities through re‑scanning, configuration review, or other technical verification methods.
  • Track vulnerabilities against defined SLAs, risk thresholds, and exception processes, escalating systemic or overdue risks as required.
  • Continuously monitor, analyze, and contextualize internal and external threat intelligence sources, including commercial feeds, open‑source intelligence (OSINT), ISAC information, and vendor advisories.
  • Identify emerging threats, active exploitation campaigns, and adversary techniques relevant to the organization’s technology stack and industry.
  • Translate threat intelligence into actionable insights, alerts, and briefings that inform vulnerability prioritization, detection engineering, and defensive controls.
  • Maintain strong working knowledge of industry‑standard threat and risk assessment frameworks (e.g., MITRE ATT&CK, NIST, CVSS, threat modeling methodologies).
  • Correlate vulnerability data, threat activity, asset criticality, and business context to identify material cyber risk exposure.
  • Provide input into cyber risk assessments and support informed decision‑making by recommending prioritized remediation, compensating controls, or justified risk acceptance aligned with organizational risk appetite.
  • Support Security Operations and Incident Response teams by providing vulnerability, threat, and adversary context during investigations and active incidents.
  • Assist with alert triage by identifying linkages between observed activity, known vulnerabilities, and current threat campaigns.
  • Contribute to the development, tuning, and refinement of detection use cases to improve coverage against high‑risk vulnerabilities and attacker techniques.
  • Support the creation and continuous improvement of incident response playbooks, informed by observed threat trends and post‑incident lessons learned.
  • Produce clear, accurate vulnerability and threat reporting, metrics, dashboards, and trend analysis for technical, management, and executive audiences.
  • Communicate complex technical risk in business‑relevant terms, highlighting potential impact, urgency, and recommended actions.
  • Support vulnerability and threat management governance through contributions to policies, standards, procedures, and control definitions.
  • Continuously evaluate and improve tools, data sources, processes, and automation to increase program maturity, scalability, and operational effectiveness.
  • Identify gaps in visibility, coverage, or controls and recommend enhancements to reduce risk and improve resilience over time.

Benefits

  • Diversity, Equity and Inclusion Action Plan
  • Sustainability Report
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service