Information Security Specialist | Spécialiste en sécurité de l'information
Hitachi Cyber
Montreal
Offre publiée le 2026-02-06
What could be your next challenge?
Join Hitachi Cyber, a global leader in cybersecurity, and become part of a dynamic team of experts dedicated to protecting organizations across various industries. As an Information Security Specialist, you’ll play a key role in delivering cutting-edge security services, leveraging tools like Microsoft Sentinel and Google SecOps (Chronicle) to detect, respond, and prevent threats.
You’ll play a key role in quality assurance, vulnerability management coordination, reporting, and proactive threat analysis and helping clients strengthen their security posture and stay ahead of emerging threats.
Your mission:
- Perform quality assurance reviews of SOC-generated incidents to ensure alerts from Microsoft Sentinel, Google SecOps, and other SIEM platforms are accurately captured, classified, and escalated.
- Collaborate with SOC analysts and engineering teams to improve alert fidelity, rule tuning, and incident-handling procedures.
- Prepare monthly operational and security performance reports and deliver presentations to clients, summarizing key metrics, incident trends, and improvement actions.
- Schedule and track vulnerability scans, ensuring scans are completed on time and results are communicated to relevant stakeholders.
- Support the onboarding and validation of new log sources, ensuring they are properly integrated into SIEM platforms for effective monitoring.
- Maintain and update documentation for alert flows, incident management procedures, and escalation paths.
- Conduct threat hunting activities and recommend new correlation rules or detections based on emerging threats, attack trends, or recent incidents.
- Contribute to continuous improvement efforts by identifying recurring issues, false positives, or detection gaps and recommending corrective actions.
- Provide expert guidance and support to clients on security-related issues.
- Lead complex incident response cases and provide post-incident recommendations.
- Mentor and coach junior analysts in technical and procedural areas.
- Participate in on-call rotations and security investigations.
What we’re looking for
- 3–5 years of experience in a security operations environment (SOC).
- A strong customer service mindset and ability to communicate clearly with both technical and non-technical audiences.
- Bachelor’s degree or equivalent professional experience in a related field.
- Hands-on experience with SIEM tools, especially Microsoft Sentinel and Google SecOps / Chronicle.
- Proven skills in incident response and security analysis.
- Deep understanding of packet capture and network protocols.
- Familiarity with vulnerability management and scanning tools.
- Cloud experience is considered a strong asset, particularly with Google Cloud and Microsoft Azure.
- Relevant certifications include in any of:
- Google Cloud Professional Cloud Security Engineer.
- Google Cybersecurity Professional Certificate.
- Microsoft Certified: Security Operations Analyst Associate (SC-200).
- Microsoft Certified: Azure Security Engineer Associate (AZ-500).
- Other Certifications such as GCIA, CEH, CISM, or CISSP (asset).
- Excellent communication skills in English and French.
Vous devez être connecté pour pouvoir ajouter un emploi aux favoris
Connexion ou Créez un compte