Sr. Security Analyst - Security Event Management

Confidential Company  •  Scarborough, ON

Less than 5 years experience  •  Financial Services

Salary depends on experience
Posted on 02/20/18
Confidential Company
Scarborough, ON
Less than 5 years experience
Financial Services
Salary depends on experience
Posted on 02/20/18

181298BR

Department Overview

Building a World-Class, Diverse and Inclusive Technology Team at TD

We can’t afford to be boring. Neither can you. The scale and scope of what TD does may surprise you. The rapid pace of change makes it a business imperative for us to be smart and open-minded in the way we think about technology. TD’s technology and business teams become more intertwined as new opportunities present themselves. This new era in banking does not equal boring. Not at TD, anyway.
Technology Risk Management and Information Security (TRMIS) is a group of technology, security and risk professionals in Canada, the U.S. and the U.K., focused on managing a comprehensive program to assess, prioritize, and mitigate business risk with technology controls.

The Cyber Threat Management Team is responsible for protecting the Bank, customers and employees by mitigating and identifying technology threats to TD. Development of effective risk management programs help ensure TD’s best-in-class cyber security approach.

What We Stand For
The TRMIS program is continuously evolving to mitigate risks to the bank, including introducing new initiatives and improved defense. With a layered approach to protect customers, employees and the bank from cyber threats, TD manages, challenges and reviews technology controls for all business applications.
Technology Risk Management and Information Security (TRMIS) is a group of technology, security and risk professionals in Canada, the U.S. and the U.K., focused on managing a comprehensive program to assess, prioritize, and mitigate business risk with technology controls.

The Cyber Threat Management Team is responsible for protecting the Bank, customers and employees by mitigating and identifying technology threats to TD. Development of effective risk management programs help ensure TD’s best-in-class cyber security approach.

What We Stand For
The TRMIS program is continuously evolving to mitigate risks to the bank, including introducing new initiatives and improved defense. With a layered approach to protect customers, employees and the bank from cyber threats, TD manages, challenges and reviews technology controls for all business applications.
Technology Risk Management and Information Security (TRMIS) is a group of technology, security and risk professionals in Canada, the U.S. and the U.K., focused on managing a comprehensive program to assess, prioritize, and mitigate business risk with technology controls.

The Cyber Threat Management Team is responsible for protecting the Bank, customers and employees by mitigating and identifying technology threats to TD. Development of effective risk management programs help ensure TD’s best-in-class cyber security approach.

What We Stand For
The TRMIS program is continuously evolving to mitigate risks to the bank, including introducing new initiatives and improved defense. With a layered approach to protect customers, employees and the bank from cyber threats, TD manages, challenges and reviews technology controls for all business applications.

Job Description

Meaningful work is fueled by meaningful performance and career development conversations with your manager. Here’s some of what you may be asked to perform:

  • Highly motivated, team-oriented, self-learner, responsible, and focused on exceeding expectations
  • Strong organizational skills to facilitate management and tracking of large numbers of activities, findings, requirements and changes
  • Sense of urgency, resourcefulness and enthusiasm in providing technical recommendations and solutions
  • Ability to applyagile methodology & accurate logic and common sense in recommending technology and systems configuration decisions
  • Ability to protect confidential information and act with a high level of integrity
  • Diverse knowledge in current and emerging technologies in the space of SecurityEvent Management and Security Analytics in particular
  • Demonstrates understanding of the role of technology in business and information protection controls and operational governance as it applies to each functional area
  • Ability to recommend and execute implementation activities in compliance with corporate security standards
  • High level of confidence and assertiveness in high-pressure situations
  • Ability to build strong relationships with and lead teams and individuals without direct reporting relationships
  • Ability to quickly analyze large amounts of information and formulate action plans based on that analysis
  • Excellent written and oral communications skills and ability to articulate and present information at different levels of technical staff

Requirements

What can you bring to TD? Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. It helps if you have:

  • 3 to 5years’ work experience in information security, cybersecurity, data protection or a related field
  • Minimum of a two-yeardegree in information protection, computer forensics, computer information systems, computer science, or information systems management
  • 3+ years of experience in performing securityevent management, security information event management and/ or security analytics configuration, operational management and administration in an enterprise setting
  • Experience with Systems design and engineering activities such as: solution design drafting, validation and review; solution implementation and configuration in a large enterprise setting, including computing platform, storage tier, networking settings and communication ports, middleware to support platforms and applications, etc.
  • Experience with securityevent management and security analytics operational governance and fundamental processes
  • Design and drive technical plans toward securityevent management objectives such as: platform and services currency and capacity augmentation, net new log sources on-boarding (inclusive of testing and pre-production acceptance tasks), off-boarding, troubleshooting of in-place configurations to remedy technical issues arising from service interruptions, etc.
  • Ability to develop work-shopping materials for activities and processes; run books for securityevent management and security analytics on-boarding/ off-boarding; intake management, requirements analysis, remediation, and reporting
  • Identify problems and understand when to fix or when to mitigate risk
  • Must have solid understanding of Network and Securityinfrastructure, topology including firewalls, routers, wireless access points, DNS, DHCP, and Identity and Access Management technologies
  • Experience with securing virtual, physical and cloud environments
  • Working Experience with the following technologies: ArcSight, RSA, Securonix, Splunk, QRadar or equivalent tools
  • Professional IT security certification such as CISSP, SANS Certified Intrusion Analyst (GCIA), CompTIA Security+, CEH, GSEC and/or CISM is preferred
  • An understanding of regulatory and Controls requirements: PCI, FFIEC, SOX, HIPAA, ISO2700x, NIST standards
Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.