Join our team The TELUS Data & Trust Office provides world-class, innovative privacy solutions to TELUS. We partner with teams across the organization to advance our corporate priorities, support innovation and ultimately deliver on our promise to
Other locations
Conduct thorough research, and analyze the security configurations of AWS, Azure, and GCP cloud services, including IaaS, PaaS, SaaS, and marketplace offerings. Deploy cloud services in a sandbox environment and perform security assess[...]
This is a deep technical, delivery, and leadership-oriented role, and provides a unique opportunity to work closely with numerous business and functional areas across the bank.What will you do?Define solutions realizing customer and wo[...]
As a Technical Analyst, you will provide support to Cybersecurity Risk Management team, Security Operations Centre (SOC), Global Event Monitoring Service (GEMS), Deloitte firms and cybersecurity service teams like Firewall Management, [...]
Along with a competitive base salary and variable pay opportunities, we offer a wide array of initiatives that differentiate us as a people-first organization. On top of our regular paid vacation days, some examples include: $4,000 per[...]
This role will be responsible for managing and supporting CSA Group's Cybersecurity solutions. This includes technical configuration, development and user support. Results are delivered through production support, continuous improvemen[...]
and with business partners to fulfill these responsibilities:Periodically assess and maintain an understanding of the overall organization's cybersecurity postureMonitor the organization cyber risk profile and KRIs to proactively ident[...]
Description Exciting Opportunity Awaits! Join Us as a Customer Solution Architect - Intelligent Spaces, Security and Automation for Atlantic Canada and Quebec Are you ready to embark on a thrilling journey where you can ignite your pas[...]
A typical day as an OT Cyber Security specialist involves collaborating with our clients to understand their priorities, business operations and their constraints in implementing cybersecurity controls to: - Identify prioritized cyber [...]
Other location