×
Register Here to Apply for Jobs or Post Jobs. X

MONTREAL Hybrid - Senior Security Analyst L3

Job in Montreal, Montréal, Province de Québec, Canada
Listing for: QUANTEAM (RAINBOW PARTNERS Group)
Full Time position
Listed on 2026-02-23
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Job Description & How to Apply Below
Position: MONTREAL [Hybrid] - Senior Security Analyst L3
Location: Montreal

MONTREAL [Hybrid] - Senior Security Analyst L3
Get AI-powered advice on this job and more exclusive features.

Direct message the job poster from QUANTEAM (RAINBOW PARTNERS Group)

About the Company:

As the founding entity of RAINBOW PARTNERS, Quanteam is a consulting firm specializing in Banking, Finance, and Financial Services. Guided by our core values of closeness, teamwork, diversity, and excellence, our team of 1,000 expert consultants, representing 35 different nationalities, collaborates across 10 international offices:
Paris, Lyon, New York, Montreal, London, Brussels, Geneva, Lisbon, Porto, and Casablanca.

We are currently seeking a Senior Security Analyst (L3) to join one of our clients in the financial sector, a major international bank based in Montreal.

Role Overview :

The Level III Cybersecurity Analyst (SOC L3) is a senior member of a 24x7 Security Operations Center, responsible for advanced threat detection, in-depth incident investigation, and response to complex and high-impact security incidents targeting critical systems and infrastructure.

This role goes beyond alert handling and focuses on root cause analysis, threat hunting, detection engineering, and continuous improvement of SOC capabilities. The L3 Analyst acts as a technical reference for the SOC, providing guidance to L1/L2 analysts and contributing to the organization’s overall security posture.

Key Responsibilities

Lead the investigation and response to complex and high-severity security incidents, including advanced persistent threats (APT), lateral movement, and sophisticated malware activity.

Perform deep-dive analysis using SIEM platforms (e.g., Splunk, ELK) and other security tools to identify root causes and attacker behaviors.

Act as an escalation point for L1/L2 analysts, providing technical guidance, validation of findings, and recommended remediation actions.

Develop, optimize, and maintain SIEM use cases, detection rules, dashboards, and alerts to improve threat visibility and reduce false positives.

Conduct threat hunting activities based on intelligence, hypotheses, and observed attacker techniques.

Leverage scripting and automation (e.g., Python, Bash) to support investigations, data enrichment, and SOC efficiency.

Provide expert-level analysis of logs, network traffic, endpoint activity, and forensic artifacts.

Collaborate with internal teams (IR, Network, Infrastructure, Cloud, IAM) and external partners as required during incident response.

Contribute to post-incident reviews, lessons learned, and recommendations to improve security controls and processes.

Maintain a strong understanding of the organization’s technical architecture, attack surface, and evolving threat landscape.

Support SOC projects, tooling improvements, and security initiatives.

Ensure accurate documentation of incidents, investigations, and technical findings.

Participate in on-call or shift rotations as required to support 24/7 operations.

Adhere to all internal security policies, standards, and procedures.

Required Qualifications and Skills

Minimum 5 years of experience in a Security Operations Center (SOC) or equivalent cybersecurity role.

Strong hands‑on expertise with SIEM platforms, such as Splunk and/or ELK, including query writing, correlation rules, and dashboards.

Advanced knowledge of security technologies, including network security (firewalls, IDS/IPS, proxies, VPNs), endpoint security solutions (EDR/XDR), and email security and data protection tools.

Strong understanding of incident response processes, log analysis, and network traffic analysis (PCAP).

Solid knowledge of network protocols and architectures, including the OSI model, TCP/IP, DNS, HTTP/S, and SMTP.

In-depth understanding of attack techniques and threat actor behaviors, aligned with frameworks such as MITRE ATT&CK.

Proven experience working with Windows and Linux environments, including the detection of compromise and abnormal behavior.

Strong scripting skills (Python, Bash) used for automation and investigation support.

Demonstrated security mindset, with a proactive and adversarial approach to threat detection and defense.

Ability to analyze complex security events and clearly…
Position Requirements
10+ Years work experience
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary