IT Security Admin / Core Technology
CAN Oakville Ontario 585 Michigan Drive
Marmon Holdings
Come join a team where People make the difference! As a part of Marmon Holdings, Inc., a highly decentralized organization, we rely heavily on people with the aptitude, attitude, and entrepreneurial spirit to drive our success, and we're committed to attracting and retaining top talent.
Opportunity:
The IT Security Administrator role is a dynamic opportunity for a motivated cybersecurity professional with 1-3 years of experience to join our Security team. Focused on leveraging Microsoft's suite of security tools, this position entails implementing and maintaining security measures across our IT infrastructure, conducting vulnerability assessments, and collaborating with IT teams to ensure timely patching and compliance. Additionally, the role involves managing security features of Microsoft operating systems, mobile device management, and supporting Apple device deployments. The ideal candidate will have experience with vulnerability management systems like Tenable.
Position Summary
- Implement and maintain security measures using Microsoft's suite of security tools.
- Conduct vulnerability assessments and prioritize remediation efforts.
- Collaborate with IT teams to ensure timely security patches and updates deployment.
- Support and manage all security tools and related technology (AV, EDR, Vulnerability Management, AIM, Azure, etc.)
- Assist in the evaluation and selection of new security tools and technologies.
- Conduct and document user interviews and post-mortems on security incidents.
- Proactively identify improvements for existing solutions and propose new security solutions to improve Marmon Rail’s security posture.
- Support the team with our vulnerability management tools, interacting with our infrastructure and development teams
- Support security investigations (including piecing together what happened from logs) alongside our security partners
- Liaise with vendors and other IT personnel for problem-resolution
- Other related responsibilities/duties as assigned
Skills and Responsibilities:
- Experience in Network and Endpoint Security (i.e. DLP, Endpoint Detection and Response, File Integrity, and SIEM).
- Experience with Vulnerability Management Programs (Tenable, Rapid7, etc.)
- Experience with identity management best practices (Azure Active Directory) and security
- Experience with Cloud Security
- Experience performing security assessments of infrastructure, applications, and websites.
- Infrastructure background with experience in server, storage, and network design.
You will always meet internal and external customer expectations by fully applying yourself to the task involved, preventing errors, and developing and implementing personal quality improvement projects. In addition, the incumbent is required to understand the Responsible Care Management System and actively participate in activities outlined therein.
As a critical member of the Core Technology team, the incumbent is required to provide "on-call" support for the North American IT organization's functions. This "on-call" support will require the incumbent to share with other Information Technology team members the responsibility of providing information and assistance to ensure that the various information services facilities are available when needed by the company. This includes support after regular business hours and may include attendance to the site at any time 24 hours a day, 7 days a week. IT management will endeavor to ensure that this requirement is not unduly exploited, that the "on-call" duty is rotated fairly amongst support employees, and that due consideration is taken of employees' personal commitments.
Education and Qualifications:
- 1-3+ years' security-specific experience with a broad knowledge/understanding of Information security concepts and methodologies
- Familiarity with Microsoft security tools and technologies.
- Preference for applicants who have obtained cybersecurity training and certifications such as Security+, GISF, GSEC, ISC2 Associate or similar.
- BS/MS degree in Computer Science, Engineering or a related subject preferred
- DISCLAIMER Please note the duties listed are not set forth for purposes of limiting the assignment of work. They are not to be construed as a complete list of the many duties normally to be performed under a job title or those to be performed temporarily outside an employee's normal line of work. Duties, and activities may change at any time with or without notice.
Following receipt of a conditional offer of employment, candidates will be required to complete additional job-related screening processes as permitted or required by applicable law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Azure Cloud Compliance Computer Science EDR Endpoint security GSEC IT infrastructure Security assessment SIEM Vulnerability management
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Security Consultant jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open Threat intelligence-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open SaaS-related jobs
- Open EDR-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open PowerShell-related jobs