ensuring that all essential functions and positions are covered during the exercise. Act as the facilitator during the Table Top Exercise, guiding participants through the scenario, posing questions, and prompting discussions to explor[...]
Other locations
As a Senior Consultant in the Cyber practice, you will be part of a team that delivers and maintains new security technology solutions for our clients. We count on you to help clients define their requirements and then design/develop/c[...]
Lead, design, develop and implement architecture solutions meeting security requirements and standardsApply innovative security primitives to improve next generation secure platformsDesign and Implement Embedded SOC Firmware + Platform[...]
Join our team The TELUS Data & Trust Office provides world-class, innovative privacy solutions to TELUS. We partner with teams across the organization to advance our corporate priorities, support innovation and ultimately deliver on our promise to
Conduct thorough research, and analyze the security configurations of AWS, Azure, and GCP cloud services, including IaaS, PaaS, SaaS, and marketplace offerings. Deploy cloud services in a sandbox environment and perform security assess[...]
This is a deep technical, delivery, and leadership-oriented role, and provides a unique opportunity to work closely with numerous business and functional areas across the bank.What will you do?Define solutions realizing customer and wo[...]
As a Technical Analyst, you will provide support to Cybersecurity Risk Management team, Security Operations Centre (SOC), Global Event Monitoring Service (GEMS), Deloitte firms and cybersecurity service teams like Firewall Management, [...]
Along with a competitive base salary and variable pay opportunities, we offer a wide array of initiatives that differentiate us as a people-first organization. On top of our regular paid vacation days, some examples include: $4,000 per[...]
This role will be responsible for managing and supporting CSA Group's Cybersecurity solutions. This includes technical configuration, development and user support. Results are delivered through production support, continuous improvemen[...]
and with business partners to fulfill these responsibilities:Periodically assess and maintain an understanding of the overall organization's cybersecurity postureMonitor the organization cyber risk profile and KRIs to proactively ident[...]