Security Analyst

Independent Electricity System Operator
Hybrid

About The Position

The IESO is committed to ensuring Ontario’s electricity system meets the province’s needs today and into the future. We are charged with purpose, delivering reliable, affordable, and sustainable electricity for homes, businesses, and communities across the province. We are energized to grow, embracing opportunities to shape the future of a dynamic and evolving energy sector while advancing our careers. We are powered by teamwork, supported by diverse and passionate colleagues who foster respect, celebrate successes, and thrive on shared achievements. At the IESO, it’s not just what we do—it’s who we are! Our central role includes managing the provincial power grid in real-time, overseeing and evolving Ontario’s electricity market, engaging with government, municipalities and Indigenous communities, and planning for Ontario’s future electricity needs. Our employees play a key role in driving grid innovation, protecting the system from threats, advancing the province’s energy conservation programs, and forecasting and procuring the electricity resources we’ll need in the decades to come. This is a unionized position that falls within the Information Security Division in the Information & Technology Services Business Unit. The energy sector is rapidly evolving, offering exciting new opportunities for those who want to make a difference. Coordinate, plan and/or organize the response to a detected cybersecurity issue within the IESO and the Ontario electricity industry. This function will work with the Security Operations Management Analyst and the Security Technology Lead, and other security operations providers including our government security partners. This function is the first point of technical contact in the organization around cyber security operations. This is a critical role in the identification of cyber incidents.

Requirements

  • Requires a sound knowledge of computer science, information technology and telecommunications systems.
  • Good written and oral communication skills, in order to deal with end-users, review/input on procedures, standards and/or methods; and design/deliver training.
  • This knowledge is considered to be normally acquired either through the successful completion of a university degree in the area of Computer Science or related discipline or equivalent.
  • Requires experience coordinating/analyzing enterprise security systems on a diverse set of computing platforms, operating systems and applications, especially Windows NT and UNIX.
  • Experience with networking products, large package and systems implementation.
  • Previous experience as part of a large multi-disciplined project, and with systems vendors, which requires having sound project management skills.
  • A period of over 4 years, up to and including 6 years is considered necessary to gain this experience.

Responsibilities

  • Oversee/monitor access logs and privileges.
  • Contribute to the development of Information Security standards and procedures for business units consistent with corporate security objectives and generally accepted and leading edge Information Security practices and professional security standards and in coordination with IT Process Development Leaders and the Information Security Manager.
  • Support the delivery of the Information Security Operations and Technology programs for applications, tools, anti-virus, encryption and fire walls, implementation support, identification of system vulnerabilities, system assessments, Information Security advice and consultation, business resumption planning and disaster recovery planning.
  • Provide input to supervision on all areas of Information Security.
  • Contribute to the development/delivery of awareness training and general Information Security education.
  • Provide strategic, operational, and technical insight to ensure the IESO Security program is adequately prepared to detect current and future threats
  • Review and modify, in conjunction with the Threat Intelligence & Analysis Advisor, the security technology rules and filters to better detect and prevent security incidents. As part of this change, formal review and documentation of the change will need to take place to prevent outages or detrimental system impact
  • Create and Implement the automation routines and information collection and identification tools for security correlation purposes
  • The identification and formal review of redundant monitoring tasks, redundant security event analysis or data duplication on collection tasks to streamline and free up system resources. Where “Reduction” occurs documentation will need to be developed explaining the proposed solution
  • Monitor and ensure Service Provider is empowered to review the security data feeds among the various servers, applications and networks within relevant processes
  • Document and review with other SOC analysts at the Service Provider the interactions of the filters, rules and matching routines and security applications within the deployed security technologies.
  • Assist, through strong documentation and communications skills, the Service Provider SOC analysts in explaining the solutions that were developed, designed and implemented to security operations and non-security operations personnel
  • Keep up-to-date on the latest security information pertaining to the SOC technology in order to validate the security capabilities of the SOC
  • Keep up-to-date on the vulnerability of appliances, servers, OS, application, etc. of the SOC
  • Installation, operation and management of approved security tools and applications to provide security information, security event relationship and security event analytical tools for the SOC analysts
  • Participate in improvement efforts to gather, analyze, and define security operations and information security requirements for a variety of threat and vulnerability management issues
  • May be asked to perform product evaluations and recommendations. The analyst may be asked to choose security products and services to implement, and plan the implementation based on industry best-practices or procedures in relationship to the SOC
  • Develop, document, and present general and technical presentations
  • First point of contact from Service provider during business hours.
  • Provide leadership and insight for the security monitoring and security incident investigation and response personnel
  • Will have access/handle confidentiality issues, requiring high level of trust and integrity.
  • Perform other duties/tasks/projects as required or assigned.

Benefits

  • Best-in-class benefits and long-term support in the form of a defined benefit pension plan.
  • Work in a dynamic and evolving sector that offers exciting opportunities and the chance to explore new career paths.
  • Leadership that values meaningful discussions, welcomes feedback, and prioritizes career development.
  • A strong, inclusive culture and a collaborative team environment with a shared passion for impactful work.
  • Compensation packages that are regularly reviewed to remain competitive and to best accommodate the diverse needs of our employees.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service