Cybersecurity Analyst
Embark View all jobs
- Mississauga, ON
- $115,000-138,000 per year
- Temporary
- Full-time
- Monitor, triage, and investigate security alerts originating from:
- Arctic Wolf MDR
- Microsoft Defender (Endpoint, Identity, Office 365, Cloud Apps)
- Netskope SSE (SWG, CASB, ZTNA, Threat Protection, DLP)
- Perform incident response activities including:
- Alert validation, scoping, and root-cause analysis
- Endpoint, identity, cloud, and SaaS activity investigation
- Containment actions (account suspension, device isolation, session revocation, policy enforcement)
- Work closely with Arctic Wolf on:
- Case escalations and response coordination
- Validation of detections and recommended actions
- Produce clear incident documentation, including:
- Timelines, affected assets, impact assessment, and remediation steps
- Tune and optimize detections and policies directly within:
- Microsoft Defender portals (no Sentinel)
- Netskope security and DLP policies
- Arctic Wolf escalation criteria and response workflows
- Reduce alert fatigue by:
- Eliminating false positives
- Aligning severity with business impact
- Improving investigation context and signal fidelity
- Contribute to detection coverage for:
- Identity compromise and OAuth abuse
- Malware, ransomware, and lateral movement
- Risky SaaS usage and anomalous cloud behavior
- Data exfiltration and policy violations
- Administer and enhance Microsoft Purview Information Protection and DLP, including:
- Sensitivity labels and label policies
- DLP policies across Exchange, SharePoint, OneDrive, and Teams
- Alert triage and incident follow-up for DLP eventsup for DLP events
- Design, implement, and tune Netskope DLP:
- Inline and at rest controls across web and cloud appsrest controls across web and cloud apps
- Classification, fingerprinting, and structured/unstructured data detection
- Partner with business and privacy stakeholders to:
- Translate data protection requirements into enforceable controls
- Implement exception handling and user education workflows
- Balance risk reduction with business usability
- Track and report on DLP effectiveness and trends
- Support the full Netskope SSE stack, including:
- Secure Web Gateway (SWG)
- CASB (managed and unmanaged apps)
- ZTNA
- Threat Protection
- DLP
- Monitor policy health, coverage, and enforcement effectiveness
- Identify and remediate gaps in visibility, control, or logging
- Support investigations involving risky apps, shadow IT, and cloud misuse
- Validate security tool coverage and operational health:
- Endpoint onboarding and Defender health
- Identity and SaaS integrations
- Logging completeness and alert flow
- Develop and maintain:
- Incident response playbooks
- DLP and investigation runbooks
- Operational procedures and escalation paths
- Produce actionable reporting for leadership:
- Incident trends, alert quality, DLP metrics, and risk themes
- Support knowledge transfer and operational maturity improvements
- 3-5+ years in a Security Analyst, SOC, or Incident Response role
- Hands-on experience with:
- Microsoft Defender (Endpoint, Identity, Office 365, Cloud Apps)
- Microsoft Purview (Information Protection and full DLP)
- Netskope (SWG, CASB, ZTNA, DLP, Threat Protection)
- Arctic Wolf MDR (case handling, escalations, collaboration)
- Strong understanding of:
- Cloud and SaaS security threats
- Identity-based attacks and phishing
- Data protection and regulatory considerations
- Incident response lifecycle and MITRE ATT&CK concepts
- Ability to clearly document findings and communicate with both technical and nontechnical stakeholders
- Experience with:
- Defender XDR Advanced Hunting
- Security policy design for large M365 environments
- SaaS governance and cloud risk management
- Certifications (preferred but not required):
- SC200, SC400, AZ500, Security+, or equivalent
- Reduce alert noise through documented tuning improvements
- Improve clarity and consistency of incident response processes
- Deliver measurable improvements in DLP signal quality
- Ensure full coverage and operational health across Defender, Netskope, and Purview
- Leave behind clear documentation and operational artifacts