Share this job
Security Analyst
Laval, QC
Apply for this job

Responsibilities:

Security Monitoring & Incident Response

• Monitor, triage, and investigate security alerts across platforms including SentinelOne (Vigilance), Field Effect Complete, Microsoft Defender, and ThreatLocker;

• Correlate events across multiple tools to identify true positives and reduce noise;

• Assist in response actions during security incidents (containment, isolation, remediation coordination);

• Participate in full incident lifecycle including investigation, response support, and post-incident documentation.


Security Operations & Investigation

• Analyze endpoint, identity, and cloud activity to identify suspicious or malicious behavior;

• Perform targeted investigations and deeper analysis when required;

• Leverage available tools and data sources to validate alerts and determine impact;

• Support continuous improvement of monitoring and response processes.


Multi-Client SOC Delivery (MSP Environment)

• Manage and prioritize alerts, incidents, and security tasks across multiple client environments;

• Ensure response timelines align with SLAs and client expectations;

• Adapt investigations and recommendations based on client maturity and environment.


Client Onboarding & Security Implementation

• Participate with onboarding and deployment of security platforms (SentinelOne, Field Effect, Defender, ThreatLocker, dmarcian);

• Configure and support Microsoft 365 security controls (Defender, Conditional Access, Secure Score improvements);

• Implement and validate security baselines across endpoint, identity, and cloud environments;

• Maintain onboarding documentation and technical runbooks.


Vulnerability Management & Remediation

• Review penetration test results and vulnerability findings;

• Translate findings into clear, actionable remediation steps (e.g., legacy protocols, exposed services, misconfigurations);

• Coordinate with internal teams (NOC, Service Desk, Web, Cloud) to execute remediation;

• Track and validate resolution of identified risks.


Security Advisory & Client Engagement

• Provide practical security recommendations based on incidents, findings, and trends;

• Support vCIOs and account managers with technical input for client discussions and QBRs;

• Communicate risks and remediation steps to both technical and non-technical stakeholders.


Platform & Vendor Collaboration

• Work with security vendors to review platform capabilities, updates, and best practices;

• Identify opportunities to improve usage and effectiveness of deployed security tools;

• Contribute to SOC playbooks, documentation, and service improvements.


The candidate must have:

• 3–5+ years of experience in cybersecurity, SOC operations, or MSP technical roles;

• Strong hands-on experience with EDR/XDR platforms (e.g., SentinelOne, Microsoft Defender);

• Experience investigating real-world security incidents (endpoint, identity, email, cloud);

• Good understanding of Microsoft 365 security (Defender, Conditional Access, Secure Score);

• Experience working with vulnerability remediation and security recommendations;

• Strong analytical and investigative mindset;

• Ability to independently triage and move investigations forward;

• Strong communication skills (technical and client-facing);

• Ability to manage multiple priorities across different clients.


Preferred Qualifications:

• Experience in an MSP or multi-tenant SOC environment;

• Familiarity with Field Effect, dmarcian, ThreatLocker, or similar platforms;

• Experience working alongside MDR services (e.g., SentinelOne Vigilance);

• Understanding of email security (DMARC, SPF, DKIM);

• Exposure to penetration testing results and remediation workflows;

• Basic scripting or automation skills (PowerShell, Python);

• Understanding of common web security concepts (e.g., headers, TLS);

• Certifications such as Security+, CySA+, or equivalent (or willingness to pursue);

• Experience contributing to incident response processes or exercises.


Apply for this job