Join our team The TELUS Data & Trust Office provides world-class, innovative privacy solutions to TELUS. We partner with teams across the organization to advance our corporate priorities, support innovation and ultimately deliver on our promise to
Other locations
This is a deep technical, delivery, and leadership-oriented role, and provides a unique opportunity to work closely with numerous business and functional areas across the bank.What will you do?Define solutions realizing customer and wo[...]
Conduct thorough research, and analyze the security configurations of AWS, Azure, and GCP cloud services, including IaaS, PaaS, SaaS, and marketplace offerings. Deploy cloud services in a sandbox environment and perform security assess[...]
As a Technical Analyst, you will provide support to Cybersecurity Risk Management team, Security Operations Centre (SOC), Global Event Monitoring Service (GEMS), Deloitte firms and cybersecurity service teams like Firewall Management, [...]
Along with a competitive base salary and variable pay opportunities, we offer a wide array of initiatives that differentiate us as a people-first organization. On top of our regular paid vacation days, some examples include: $4,000 per[...]
and with business partners to fulfill these responsibilities:Periodically assess and maintain an understanding of the overall organization's cybersecurity postureMonitor the organization cyber risk profile and KRIs to proactively ident[...]
This role will be responsible for managing and supporting CSA Group's Cybersecurity solutions. This includes technical configuration, development and user support. Results are delivered through production support, continuous improvemen[...]
Description Exciting Opportunity Awaits! Join Us as a Customer Solution Architect - Intelligent Spaces, Security and Automation for Atlantic Canada and Quebec Are you ready to embark on a thrilling journey where you can ignite your pas[...]
A typical day as an OT Cyber Security specialist involves collaborating with our clients to understand their priorities, business operations and their constraints in implementing cybersecurity controls to: - Identify prioritized cyber [...]
Other location