×
Register Here to Apply for Jobs or Post Jobs. X

IT Security Engineer

Job in Calgary, Alberta, D3J, Canada
Listing for: Trafigura Group
Full Time position
Listed on 2026-01-11
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 CAD Yearly CAD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Main Purpose

Serve as a senior technical expert within the IT Security Operations Centre, leading complex security incident investigations and advanced threat hunting activities. Drive continuous improvement of security monitoring capabilities through custom detection development, automation, and forensic analysis. Act as technical escalation point for SOC analysts while coordinating cross‑functional response efforts during critical security events. Enhance organisational security posture through proactive threat identification, root cause analysis, and development of advanced security tools and procedures.

Knowledge,

Skills and Abilities

,

Key Responsibilities
  • Security Monitoring & Detection & Advanced Infrastructure Security Knowledge:
    Demonstrated expertise in network security architecture, endpoint protection, and cloud security principles.
  • Security Information and Event Management (SIEM):
    Proficiency with Splunk Enterprise Security or similar platforms for advanced correlation, threat hunting, and analytics.
  • Endpoint Detection & Response (EDR):
    Expert‑level experience with Microsoft Defender for Endpoint (or equivalent), including configuration management, alert triage, and response automation.
  • Threat Intelligence Integration:
    Ability to incorporate threat feeds into detection systems and develop custom detection rules based on emerging threats.
  • Advanced Analytics:
    Experience with behavioural analytics, anomaly detection, and machine learning‑based security monitoring techniques.
  • Incident Response & Forensics:
    Incident Management Leadership:
    Ability to take ownership of complex security incidents from initial detection through complete remediation.
  • Digital Forensics:
    Expertise in memory forensics and network forensics to establish incident timeline and scope.
  • Malware Analysis:
    Advanced skills in static and dynamic malware analysis, including disassembly, debugging, unpacking, and sandbox analysis.
  • Threat Hunting:
    Proactive identification of threats that have evaded existing security controls through hypothesis‑driven investigations.
  • Incident Coordination:
    Experience leading cross‑functional response teams and communicating effectively with stakeholders during security incidents.
  • Scripting & Automation:
    Strong programming skills in Power Shell, Python, and other relevant languages for security automation and custom tool development.
  • Active Directory & Identity Management:
    Deep understanding of AD architecture, LDAP queries, and common attack vectors against identity infrastructure.
  • Operating System Security:
    Comprehensive knowledge of Windows, Linux, and macOS security mechanisms and hardening techniques.
  • Network Security:
    Expertise in network protocols, traffic analysis, and network‑based detection techniques.
  • Cloud Security:
    It would be advantageous (but not required) if the candidate had experience securing assets across major cloud platforms (AWS, Azure) and understanding cloud‑specific security controls.
Key Responsibilities
  • Security Operations:
    Lead complex security investigations requiring advanced forensic techniques and cross‑platform analysis.
  • Develop & maintain custom detection rules, playbooks, and response procedures.
  • Perform regular threat hunting exercises to identify potential compromises.
  • Analyze and validate security alerts escalated from Tier 1 analysts.
  • Conduct root cause analysis for security incidents and develop mitigation strategies.
  • Engineering & Development:
    Design and implement security monitoring improvements and automation workflows.
  • Develop custom scripts and tools to enhance detection and response capabilities.
  • Maintain and optimise security tooling, including SIEM content, EDR policies, and detection rules.
  • Collaborate with security architecture teams to improve defensive posture.
  • Contribute to continuous improvement of security monitoring and response processes.
  • Leadership & Knowledge Transfer:
    Serve as technical escalation point for Tier 1 SOC analysts.
  • Document findings, methodologies, and lessons learned from security incidents.
  • Collaborate with threat intelligence teams to enhance detection capabilities.
Qualifications
  • Required Experience:

    5+ years in cybersecurity with at least 3…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary