Security Analyst

United States

Applications have closed

Magnet Forensics

Unlock the Truth. Protect the Innocent. We provide organizations with innovative tools to investigate cyberattacks and digital crimes.

View company page

Who We Are; What We Do; Where We’re GoingMagnet Forensics is a global leader in the development of digital investigative software that acquires, analyzes and shares evidence from computers, smartphones, tablets and other IoT related devices. We are continually innovating so that our customers can deploy advanced and effective tools to protect their companies, communities and countries. Headquartered out of Waterloo, Ontario, Canada, with over 400 employees globally, Magnet is continuing to expand and grow.  Where we are today, is not where we will be tomorrow.
This position is responsible for maintaining and monitoring the security of the company’s network, data, and computer systems and confirming compliance with applicable Magnet security policies.     This role will help research methods to manage regulatory compliance where required, as well as coordinate and performs activities related to compliance audits and responses.
Your Team·         If you stay up at night worried about ransomware and the next big zero-day vulnerability, you'd fit in well with our team·         If being a core team member implementing SOC2 and ISO excites you rather than scares you, we should talk·         We measure our successes in moving items across Kanban boards, reducing security risk and achieving our sprint goals·         We don't need to be in an office for most of this work and we don't expect you to be either·         We embrace having offices but being able to work from where we can be most productive as employees and as people Our mandate is to help identify and protect the business from risk.  We are the team that builds, maintains, monitors, and audits the security policies and tools protecting the company’s network, data, and compute, and we are going to need a few more eager and talented individuals to bring their knowledge, experience and perspective to our growing security program.  
What You Will Accomplish·         Monitor security systems and alerts·         Participate in system and end-user security incident management and response·         Participate in evaluating, implementing, day-to-day operations of security solutions·         Create and update dashboard of security systems to provide relevant information·         Follow ITIL best practices change/incident/reviews·         Document security systems, security procedures, and processes·         Research emerging security threats including applicable regulatory security requirements·         Be aware of the company's information security requirements while also reporting all breaches in information security to the Director of IT What We Are Looking ForWe’re looking for someone who checks off most, but not all, of the boxes. It’s more important to us to find a candidate who can display indicators of success through skills they have developed and experience they have been a part of, than to find folks who have “been there, done that”. We want to be a part of your development journey, and we’ll learn as much from you as you learn from us. There are a few must haves, but we will keep that list short: ·         Bachelor's Degree / Diploma in a relevant area of study with a preference for Information Security, Computer Science or Computer Engineering ·         2-3+ years of previous Security Operations Centre with experience and experience in conducting security investigations·         Strong knowledge of Security Incident Management, Vulnerability and Penetration Processes·         Information Security professional designations such as CISSP, CISM, CISA, Security+·         Solid understanding of IT, including multiple operating systems and system administration skills (Windows, MacOS, Linux, Mobile)·         Strong understanding of Networking Principles and common Internet Protocols ·         Understanding of SaaS / Web applications, Databases, Firewalls, VPN, EDR, MDM Technologies The Most Important Thing We’re looking for candidates that can provide examples of how they have demonstrated Magnet InteGRITy in their previous experiences:Greater Good – We think beyond our own interests and strive to improve communities around the world. This demonstrates our passion for making a difference in the world.Respect – We hold ourselves accountable through transparent sharing of information and we have faith in each other’s abilitiesInnovation – We lead the industry in excellence and reliability while keeping the user experience simple and relevant. We are not afraid to push the boundaries to stay ahead of our competitors.Teamwork – We collaborate internally and externally, while caring about each other and listening to our customers.Magnet Forensics Inc. is an affirmative action, equal opportunity employer. It is Magnet Forensics policy to recruit and select applicants for employment solely on the basis of their qualifications, with emphasis on selecting the best-qualified person for the job. Magnet Forensics does not discriminate against applicants based on race, color, religion, sex, sexual orientation, national origin, or disability or any other status or condition protected by applicable law. Magnet Forensics encourages applications from all qualified candidates. Magnet Forensics has a great record of accommodating persons with disabilities. Contact our AODA contact at aoda@magnetforensics.com or 519-342-0195, if you need accommodation at any stage of the application process or want more information on our accommodation policies.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits CISA CISM CISSP Compliance Computer Science EDR Firewalls Forensics ITIL Kanban Linux MacOS Monitoring SaaS SOC 2 VPN Windows

Perks/benefits: Career development

Region: North America
Country: United States
Job stats:  22  8  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.