Location Address: Hybrid - Scarborough – 2 days in the office. Subject to change.
Contract Duration: ASAP to Oct 31st 2026 –
Possibility of extension: Yes, depending on funding approval and business case.
Number of Positions: 2
Schedule Hours: 9 am-5pm Monday-Friday; standard 37.5 hrs/week
Reason: Extra support
Daily activities:
• You thrive in fast paced environments where time-sensitive risk evaluations are critical.
• You enjoy performing manual analysis and decisioning based on vulnerability severity, asset context, and threat intelligence.
• You are comfortable creating, tracking, and managing remediation tickets within enterprise systems.
• You excel at reviewing and interpreting vulnerability data to produce clear and accurate reports.
• You are motivated by improving operational processes, suggesting analytics enhancements, and strengthening data quality.
• You enjoy collaborating with technical and non technical teams to drive remediation and reduce risk.
• You’re energized by contributing to the Bank’s security posture and supporting compliance with internal and external regulatory expectations.
Must-have requirements:
• 5-8 years of experience in cybersecurity concepts including vulnerability management, exposure management, and general threat landscapes.
• 3-5 years of experience creating logical methodologies to assess risk.
• 3-5 years of experience executing and performing quality control on risk scoring of vulnerabilities.
• 3-5 years of experience reassessing vulnerabilities and verifying remediation status using tool outputs and operational workflows.
• 3-5 years of experience with data analytics concepts and ability to suggest improvements to dashboards, reporting, and data quality.
Nice-To-Have Skills:
• Experience with ticketing tools (e.g., ServiceNow, Jira), and analytics/reporting tools (Excel, Power BI, or equivalent).
• Certifications: CompTIA Security+
• Knowledge of vulnerability management platforms (e.g., Qualys, Rapid7, Tenable)
Best VS. Average Candidate:
The best candidate is someone with vulnerability management and data entry metrics and reporting experience. Someone with experience in Cybersecurity.
Candidate Review & Selection
1- Video– 30 mins – HM - situational and technical questions, go through experience and role overview.
2nd round Video– 30 mins –HM and peers – cultural fit and situational questions.