As a SOC Analyst, you’ll be on the front line—watching the security alert queues, remediating incidents, escalating effectively, and closing the loop with crisp documentation and RCAs. Reporting to the Director of Centralized Services, you’ll also work closely with our Service Desk, NOC, and Professional Services to maintain high service quality, rapid incident response, and disciplined change control.
Responsibilities
- Remediate, monitor & triage alerts: Keep a constant eye on the security queues (SIEM/EDR, CW Automate, security mailboxes). Classify alerts, confirm business impact, and open/assign tickets with the right priority. Action security related alerts and tickets.
- CVE & vulnerability intake: Review vendor feeds and community sources for imminent threats. Triage CVE notifications, create or action remediation tickets, and coordinate with NOC analysts.
- Incident response: Identify severity, remediate standard incidents, and escalate major incidents to senior analysts—supporting the Tech Lead and Communications Lead as needed. Produce concise Security RCAs for Major security incidents.
- Security tooling & baselines: Help maintain our security baseline across internal and managed client environments; assist with deployments (e.g., EDR/ITDR, phishing tools) and complete 60day checkups after security projects.
- Change & release discipline: Schedule/Support change windows and post-change verification to minimize client disruption; keep documentation and ticket notes current.
- Cyber Security Consulting: Work with Account Managers and Project Managers to provide security consulting and direction for our clients in the form of security focused meetings or completing cyber security reports.
- Cross-team collaboration: Work hand-in-hand with Service Desk/NOC and escalate promptly to the during wider incidents or conflicts in scheduling.
What you bring
- Appetite for a career in cyber security: 0–2 years in SOC/IT operations, coop, or lab experience—keen to learn fast and handle real incidents and reports. Desire to work towards a role as a Senior Security Analyst.
- Tool awareness: Familiarity with EDR/AV, phishing simulators, basic SIEM concepts, and ticketing workflows (e.g., ConnectWise Manage/Automate).
- Methodical triage: Comfort applying priority rules, confirming impact, and escalating on time—under pressure and in afterhours rotations when needed.
- Documentation discipline: Clear ticket notes and post-incident writeups; curiosity to turn fixes into repeatable standards.
- Growth mindset: Working toward relevant certs (e.g., CompTIA Security+, MS SC900) and staying current on threats, trends, and tools.
Nice-to-haves
- Exposure to Microsoft 365 security controls, identity hygiene (MFA/conditional access), and email compromise playbooks
- Basic scripting (PowerShell/REWST) for automation
- A Cyber Security Related Certification
- Experience with EDR/ITDR solutions (e.g., Huntress) or phishing simulation programs in an MSP environment would be an asset
Location, Schedule & flexibility
This role participates in afterhours/on call rotations and occasional client maintenance windows. This role will be located in our new Edmonton office but will be a hybrid of in office and work from home.
Job Type: Full-time
Pay: $60,000.00-$80,000.00 per year
Benefits:
- Dental care
- Extended health care
- Life insurance
- On-site parking
- Paid time off
- RRSP match
- Vision care
Work Location: In person