What are the responsibilities and job description for the Security Analyst position at Quarterhill Inc.?
Overview
The Mid-Level Security Analyst is responsible for assessing, monitoring, and improving the organization’s security posture, with a primary focus on incident detection, vulnerability management, response, and resolution across Quarterhill’s Roadside, Back Office, Safety divisions.
This role involves conducting vulnerability assessments, correlating security events, and guiding the organization’s incident response efforts to prevent security breaches. In addition, this position will collaborate with cross-functional teams to enhance security awareness and integrate best practices across the enterprise. As a key contributor to the cybersecurity team, the Security Analyst works to ensure the organization is prepared for, and resilient against, evolving cyber threats.
Responsibilities
- Incident Detection and Response
- Perform security event correlation using information from multiple sources to detect threats.
- Conduct cyber incident triage to assess scope, urgency, and impact.
- Respond, escalate, and resolve by enforcing security protocols and implementing solutions.
- Track cyber actions from initial detection through final resolution.
- Collaborate with internal IT teams and relevant stakeholders to develop and refine runbooks and escalation procedures.
- Vulnerability Management
- Maintain and update an inventory of all in-scope systems and software, ensuring it remains accurate and up to date.
- Reconcile data from multiple sources (e.g., CMDBs, network scans, asset management systems) to ensure inventory completeness.
- Ensure all in-scope systems and software are routinely scanned by the appropriate vulnerability management tools.
- Analyze and prioritize vulnerability scan results; open tickets, provide technical remediation guidance, and track resolution efforts to closure.
- Analysis and Reporting
- Conduct trend analysis and provide regular security performance reports.
- Operate with an awareness of applicable governance, risk, and compliance (GRC) regulations and policies.
- Utilize SIEM and other monitoring tools (e.g., Splunk, QRadar, Sentinel) to gather data for dashboards and executive summaries.
- Policy Development and Training
- Assist with the development and refining security protocols, policies, and incident response plans.
- Assist in the development of employee training programs to enhance organizational cybersecurity awareness.
- Post-Incident Analysis
- Assess and analyze damage to data and infrastructure.
- Provide post-incident reports to management, including root cause analysis and recommendations for prevention.
Qualifications
Basic Qualifications
Preferred Qualifications
Benefits
We offer a Total Rewards plan designed with you and your family’s health and wellness in mind that includes :
We welcome applicants from all backgrounds, regardless of race, color, religion, sex, veteran status, sexual orientation, gender identity, national origin, age, or disability or any other protected characteristics in accordance with applicable federal, state / provincial, and local laws. We're committed to creating a workplace where everyone feels valued and respected.
We appreciate all responses and will acknowledge only those being considered for an interview.
We respectfully request no calls or unsolicited resumes from Agencies.