About Mjolnir Security
Mjolnir Security is a proudly Canadian-owned cybersecurity firm specializing in Security Operations Center (SOC) as a Service, Digital Forensics & Incident Response, Threat Detection, Dark Web Intelligence, and Cybersecurity Training. We support both public and private sector clients, with a strong focus on enabling cyber teams in Canadian law enforcement agencies.
Founded in 2017, our team brings over a century of collective experience supporting sectors including energy, transportation, healthcare, telecom, manufacturing, government, and defense.
Role Overview
We are hiring a SOC Analyst to join our fast-paced and growing Security Operations Center. Ideal candidates will have 3+ years of prior experience in IT, system administration, or network administration, and at least 1 year of dedicated experience in a SOC or cybersecurity operations role. This position is shift-based and involves working with advanced detection and response tools to monitor, investigate, and escalate security events across a diverse client base.
Key Responsibilities
- Monitor and triage alerts from SIEM, EDR, NDR, firewall, and cloud platforms
- Analyze network traffic, log data, and endpoint activity to identify and validate security threats
- Perform first-level investigation and escalation of incidents following playbooks
- Support containment, remediation, and post-incident documentation
- Contribute to tuning and optimization of detection rules and automation workflows
- Collaborate with incident responders and threat analysts for deeper investigations
- Assist in refining SOC processes and sharing knowledge with peers
- Stay informed on current threat actors, tactics, and vulnerabilities
Required Qualifications
- 3+ years of hands-on experience in IT/System/Network Administration
- 1+ year of dedicated SOC or cybersecurity operations experience
- Strong understanding of network protocols (TCP/IP, DNS, HTTP/S), log formats, and endpoint behavior
- Familiarity with tools such as SIEM, EDR, IDS/IPS, and log aggregators
- Competence in analyzing alerts and indicators across operating systems and networks
- Excellent analytical, troubleshooting, and documentation skills
- Strong written and verbal communication abilities
- Willingness to work rotating shifts, including nights and weekends
- Ability to exercise sound judgment and maintain confidentiality
Preferred Assets
- Industry certifications such as CompTIA Security+, CySA+, CEH, GSEC, or similar
- Exposure to scripting or automation (Python, PowerShell, etc.)
- Understanding of MITRE ATT&CK, Cyber Kill Chain, or threat intelligence platforms
- Experience supporting regulated environments or public sector clients
Interview Evaluation Areas
- Core cybersecurity concepts and real-world application
- Log analysis and incident handling scenarios
- Communication and teamwork
- Professional ethics and continued learning
Additional Information:
- This is an onsite position only. Remote work is not available. If you are not interested in an onsite role, please understand that no exceptions will be made.
- Please do not call our IR hotline or use the “Contact Us” form on our website for job inquiries.
- Only shortlisted candidates will be contacted for interviews.
If you are passionate about cybersecurity, eager to learn, and ready to support critical infrastructure and public safety organizations, this is your opportunity to join a mission-driven team making a real-world impact.