Security Analyst (Cyber Threat Intelligence)

Independent Electricity System Operator
1d$97,708 - $139,568Hybrid

About The Position

The IESO is committed to ensuring Ontario’s electricity system meets the province’s needs today and into the future. We are charged with purpose, delivering reliable, affordable, and sustainable electricity for homes, businesses, and communities across the province. We are energized to grow, embracing opportunities to shape the future of a dynamic and evolving energy sector while advancing our careers. We are powered by teamwork, supported by diverse and passionate colleagues who foster respect, celebrate successes, and thrive on shared achievements. At the IESO, it’s not just what we do—it’s who we are! Our central role includes managing the provincial power grid in real-time, overseeing and evolving Ontario’s electricity market, engaging with government, municipalities and Indigenous communities, and planning for Ontario’s future electricity needs. Our employees play a key role in driving grid innovation, protecting the system from threats, advancing the province’s energy conservation programs, and forecasting and procuring the electricity resources we’ll need in the decades to come. Coordinate, plan and/or organize the response to a detected cybersecurity issue within the IESO and the Ontario electricity industry. This function will work with the Security Operations Management Analyst and the Security Technology Lead, and other security operations providers including our government security partners. This function is the first point of technical contact in the organization around cyber security operations. This is a critical role in the identification of cyber incidents.

Requirements

  • Requires a sound knowledge of computer science, information technology and telecommunications systems.
  • Good written and oral communication skills, in order to deal with end-users, review/input on procedures, standards and/or methods; and design/deliver training.
  • Bachelor's Degree in Computer Science, Information Technology, or a degree in an intelligence-related field (Political Science, Public Safety, Law Enforcement, etc.).
  • Requires experience coordinating/analyzing enterprise security systems on a diverse set of computing platforms, operating systems and applications, especially Windows NT and UNIX.
  • Experience with networking products, large package and systems implementation. Previous experience as part of a large multi-disciplined project, and with systems vendors, which requires having sound project management skills.
  • A period of over 4 years, up to and including 6 years is considered necessary to gain this experience.

Responsibilities

  • Oversee/monitor access logs and privileges.
  • Contribute to the development of Information Security standards and procedures for business units consistent with corporate security objectives and generally accepted and leading edge Information Security practices and professional security standards and in coordination with IT Process Development Leaders and the Information Security Manager.
  • Support the delivery of the Information Security Operations and Technology programs for applications, tools, anti-virus, encryption and fire walls, implementation support, identification of system vulnerabilities, system assessments, Information Security advice and consultation, business resumption planning and disaster recovery planning.
  • Provide input to supervision on all areas of Information Security.
  • Contribute to the development/delivery of awareness training and general Information Security education.
  • Provide strategic, operational, and technical insight to ensure the IESO Security program is adequately prepared to detect current and future threats
  • Review and modify, in conjunction with the Threat Intelligence & Analysis Advisor, the security technology rules and filters to better detect and prevent security incidents. As part of this change, formal review and documentation of the change will need to take place to prevent outages or detrimental system impact
  • Create and Implement the automation routines and information collection and identification tools for security correlation purposes
  • The identification and formal review of redundant monitoring tasks, redundant security event analysis or data duplication on collection tasks to streamline and free up system resources. Where “Reduction” occurs documentation will need to be developed explaining the proposed solution
  • Monitor and ensure Service Provider is empowered to review the security data feeds among the various servers, applications and networks within relevant processes
  • Document and review with other SOC analysts at the Service Provider the interactions of the filters, rules and matching routines and security applications within the deployed security technologies.
  • Assist, through strong documentation and communications skills, the Service Provider SOC analysts in explaining the solutions that were developed, designed and implemented to security operations and non-security operations personnel
  • Keep up-to-date on the latest security information pertaining to the SOC technology in order to validate the security capabilities of the SOC
  • Review, assess and analyze intelligence to support the IESO’s Cyber Threat Intelligence team and cyber security programs.
  • Deliver and support information security technologies and programs.
  • Review and update deliverables to ensure they meet the highest standards.
  • Work with business units to identify opportunities for collaboration and growth of the cyber security and cyber intelligence programs.
  • Collaborate internally with technology, cyber security, and other business units to support and enhance job functions.
  • Perform other duties/tasks/projects as required or assigned.

Benefits

  • Best-in-class benefits and long-term support in the form of a defined benefit pension plan.
  • Work in a dynamic and evolving sector that offers exciting opportunities and the chance to explore new career paths.
  • Leadership that values meaningful discussions, welcomes feedback, and prioritizes career development.
  • A strong, inclusive culture and a collaborative team environment with a shared passion for impactful work.
  • Compensation packages that are regularly reviewed to remain competitive and to best accommodate the diverse needs of our employees.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service