What could be your next challenge?

Join Hitachi Cyber, a global leader in cybersecurity, and become part of a dynamic team of experts dedicated to protecting organizations across various industries. As an Information Security Specialist, you’ll play a key role in delivering cutting-edge security services, leveraging tools like Microsoft Sentinel and Google SecOps (Chronicle) to detect, respond, and prevent threats.

You’ll play a key role in quality assurance, vulnerability management coordination, reporting, and proactive threat analysis and helping clients strengthen their security posture and stay ahead of emerging threats.

Your mission:

  • Perform quality assurance reviews of SOC-generated incidents to ensure alerts from Microsoft Sentinel, Google SecOps, and other SIEM platforms are accurately captured, classified, and escalated.
  • Collaborate with SOC analysts and engineering teams to improve alert fidelity, rule tuning, and incident-handling procedures.
  • Prepare monthly operational and security performance reports and deliver presentations to clients, summarizing key metrics, incident trends, and improvement actions.
  • Schedule and track vulnerability scans, ensuring scans are completed on time and results are communicated to relevant stakeholders.
  • Support the onboarding and validation of new log sources, ensuring they are properly integrated into SIEM platforms for effective monitoring.
  • Maintain and update documentation for alert flows, incident management procedures, and escalation paths.
  • Conduct threat hunting activities and recommend new correlation rules or detections based on emerging threats, attack trends, or recent incidents.
  • Contribute to continuous improvement efforts by identifying recurring issues, false positives, or detection gaps and recommending corrective actions.
  • Provide expert guidance and support to clients on security-related issues.
  • Lead complex incident response cases and provide post-incident recommendations.
  • Mentor and coach junior analysts in technical and procedural areas.
  • Participate in on-call rotations and security investigations.

What we’re looking for

  • 3–5 years of experience in a security operations environment (SOC).
  • A strong customer service mindset and ability to communicate clearly with both technical and non-technical audiences.
  • Bachelor’s degree or equivalent professional experience in a related field.
  • Hands-on experience with SIEM tools, especially Microsoft Sentinel and Google SecOps / Chronicle.
  • Proven skills in incident response and security analysis.
  • Deep understanding of packet capture and network protocols.
  • Familiarity with vulnerability management and scanning tools.
  • Cloud experience is considered a strong asset, particularly with Google Cloud and Microsoft Azure.
  • Relevant certifications include in any of:
  • Google Cloud Professional Cloud Security Engineer.
  • Google Cybersecurity Professional Certificate.
  • Microsoft Certified: Security Operations Analyst Associate (SC-200).
  • Microsoft Certified: Azure Security Engineer Associate (AZ-500).
  • Other Certifications such as GCIA, CEH, CISM, or CISSP (asset).
  • Excellent communication skills in English and French.
#J-18808-Ljbffr