Hirejobs Canada
Register
Auckland Jobs
Canterbury Jobs
Northland Jobs
Otago Jobs
Southland Jobs
Tasman Jobs
Wellington Jobs
West Coast Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Cybersecurity Manager - Jobs in Richmond, BC

Job LocationRichmond, BC
EducationNot Mentioned
SalaryNot Disclosed
IndustryNot Mentioned
Functional AreaNot Mentioned
Job TypeFull Time

Job Description

Description-In a world where a Security Guard protects assets and a Bodyguard protects people, Cybersecurity Manager protect information from theft, illegal duplication, and unauthorized access. The work of Cybersecurity Manager focuses on finding risks and possible leaks. Cybersecurity Manager deal with protecting information on computer networks, cloud servers, mobile devices, and payment software, to name a few. They analyze where these risks are and develop strategies to prevent breaches. Cybersecurity Manager fight against cyber criminals, people who use the internet and various hacking methods to steal sensitive or private information from computers.Many of the job aspects of a Cybersecurity Manager overlap with those of someone working in the field of Information Technology due to the nature of their work being closely tied to computers and technology. Like most positions related to Security, Cybersecurity Manager rely heavily on teamwork due to the broad scope of the Computer Science field and the security measures that need to be applied to it. We are looking for a very senior manager, with hands-on field threat hunting and vulnerability exploitation experience, that holds the appropriate certifications in this area. The candidate needs to have updated skills with tools such as PAM, MIM, EDR , NDR, SEIM, NAC, Firewall, Vulnerability Patching and continuous vulnerabilities testing technologies. Preferably with Dark Trace Antigina experience and deep knowledge of the tactics and techniques to block the “kill chain”Primary Responsibilities:Here’s a non-exhaustive list of common tasks Of the manager of Cyber Security are required to complete.

  • Take the lead on day-to-day monitoring for unusual activities, implement defensive protocols, and report incidents
  • Collaborate with other members of the cybersecurity and IT team to develop new protocols, layers of protection, and other both proactive and defensive systems that stay one step ahead of cyber criminals
  • Maintain a working knowledge of current cybercrime tactics.
  • Monitoring systems for unusual activities (e.g. unauthorized access, modification, duplication, or destruction of information);
  • Testing security strategies and defenses and running counteractive protocols and reporting incidents.
  • Attempting to break in to uncover potential weaknesses, acting like a hacker to test defensive systems; trying to access information without proper credentials;
  • trying to breakthrough firewalls and other security applications; and
  • Developing new defensive systems and protocols.
  • Running diagnostics on information changes to check for undetected breaches that may have occurred.
  • Analyzing new methods of intrusion by cyber criminals:
  • Keeping up-to-date on trends and new procedures in the industry and taking the necessary precautions, updating and fortifying defenses accordingly.
Daily Tasks
  • Infrastructure security auditing, improvement and recommendation
  • Protecting information from unauthorized access, duplication, modification, or destruction.
  • Analyzing security measures taken to protect information.
  • Constantly monitor for attack and run appropriate defensive protocols if breaches occur
  • Vulnerabilities and risks management; intrusion detection and prevention; incident response; treat hunting mitigating and remediating
  • Testing for and correcting possible weaknesses or openings.
  • Configuring security programs and tools.
  • Running defensive protocols and programs when breaches occur.Help lead employee training against phishing and other forms of cyberattack
Required Skills and Qualifications
  • Outstanding computer and IT skills:
    • Being familiarized with computer security systems;
    • having an understanding of network safety protocols; and
    • being able to run, configure, monitor, and maintain security programs.
  • Excellent analytical and problem-solving skills:
    • Being able to identify problems or breaches in security software; and
    • understanding the necessary procedures to solve problems and implementing the proper protocols.
  • High levels of creativity and patience:
    • Being able to think of creative new ways to develop and implement security measures and preventive protocols; and
    • imagining how a hacker would attempt to access information.
  • Strong decision-making skills:
    • Having a logical and analytical approach to problem-solving, being able to assess situations and decide on the best course of action.
    • understanding test results and developing the best solutions; and
    • reacting properly when breaches occur.
  • Outstanding organizational and time management skills:
    • Being able to work with complex systems and equipment.
    • completing tasks in a timely manner.
    • being detail-oriented, able to run repetitive tests in a thorough manner; and
    • being able to work on several tasks at the same time while being able to meet goals and deadlines.
  • Good communication skills:
    • Explaining updates and breaches to employers in a polite and clear manner, using non-technical language.
  • Excellent teamwork skills:
    • Helping other staff members; and
    • working as a unit.
    • Outstanding levels of honesty, integrity, and objectivity:
    • Being highly objective when running tests and analyzing weaknesses.
    • being trustworthy enough to handle sensitive or private information.
Quick Apply
  • Terms & Conditions
  • New Privacy
  • Privacy Center
  • Accessibility
For Job Seekers
  • Browse Jobs
  • Advanced Job Search
  • Emplois Quebec
For Employers
  • Post a Job
  • SimplyHired OnDemand
Stay Connected

APPLY NOW

© 2021 HireJobsCanada All Rights Reserved