Information Security Analyst
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Data Security
Information Security Analyst (12 month contract)
Job Category
:
Professional / Technical
Requisition Number
: INFOR
002529
- Posted :
January 28, 2026 - Full-Time
Showing 1 location
Toronto Head Office
40 Temperance Street
Suite 2600
Toronto, ON , CAN
Position Title: Information Security Analyst
Department: Information Technology
Location: Toronto
Employment Type: Contract 12 months
Working Arrangement: Full-time, Hybrid
About UsAs a self-regulatory organization, the Canadian Investment Regulatory Organization (CIRO) is committed to setting high regulatory standards for the investment industry, safeguarding investors, and supporting the integrity of Canada’s capital markets. Join a growing team and contribute to the dynamic and complex world of Canadian capital markets.
About this OpportunityThe Information Security Analyst will implement the information security program initiatives, administer information security systems, and assist with monitoring information security policy compliance. The Analyst along with the Information Security team will be developing the information security maturity of the organization as well as performing operational activities on implemented information security controls to ensure information security policies are being followed. The role will be responsible for various activities to build information security including developing appropriate documentation, building awareness, implementing technologies, and identifying information security weaknesses with the objective of protecting CIRO information assets.
CoreResponsibilities
- Work with the Information Security team, businesses, vendors, and IT teams to ensure that corporate policies and procedures are being understood and followed
- Write procedures and technical standards to meet corporate policies and industry best practices
- Evolve corporate security policies and procedures to stay aligned with the security industry best practices
- Develop and improve internal processes to manage information security corporate wide
- Lead initiatives related to the remediation of security weaknesses or information security solution implementation while working with corporate wide businesses, vendors, and the IT team as needed
- Review technical configurations from various operating systems and security solutions (Windows, Linux, AD, VMware, IDS/IPS, FIM, SIEM, WAF, AV, endpoint encryption, etc.) to determine/enhance the parameters to meet industry-accepted hardening standards such as NIST, CIS, SANS, etc.
- Review security reports from various security technologies (vulnerability assessment reports, cyber security reports, audit reports, access privileges, etc.) to identify violations, intrusion attempts, or security weaknesses
- Provide recommendations and guide development and operations team to address security weaknesses and identify potential new security solutions
- Monitor the information security industry and be proactive with implementing appropriate information protection controls to mitigate risks on the latest types of vulnerabilities
- Conduct security product research and assess their appropriateness for the organization
- Produce report and presentation deliverables with attention on content as well as format
- Perform security incident investigations and document findings/root causes
- Post-secondary degree or equivalent education in computer science, computer engineering, or similar studies
- Information security certifications such as CISSP, GIAC, CRISC, etc.
- Previous experience of 4-6 years specifically in the information security industry preferred
- Working knowledge of industry security standards such as ISO
27001/ISO
27002, NIST, etc. - Demonstrated experience working with security technologies
- Demonstrated experience with implementing internal processes to manage information security initiatives
- Working knowledge of network architecture with multiple layers of defense
- Working knowledge of application security vulnerabilities
- High attention to details and accuracy
- Self-motivated and able to work unsupervised
- Ability to take projects to completion from beginning to end
- Strong written and oral communication skills
- Strong…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: