Cyber Security Operations Lead(CISSP, CISM, CISA, or GIAC )

Job# FT30616
Location Edmonton, AB
Job Type Contract
Salary Negotiable
Contact [email protected]
Status ACTIVE
Date Posted September 09, 2025
Submission Deadline September 17, 2025
Job Stream
Benefits Negotiable

Details

Job Description :Our client in Edmonton is looking for a Cyber Security Operations Lead(CISSP, CISM, CISA, or GIAC )

Must Have Primary Skills :
  • Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field
  • Industry certifications such as CISSP, CISM, CISA, or GIAC certifications (e.g., GCIH, GCIA, GMON).
  • Collaborate with the Cyber Program team to support the projects implementation by allocating operational resources time, tools, and technologies
  • Lead and manage a team of cybersecurity professionals, including security analysts, engineers, and incident responders


Nice To Have Secondary Skills :
Strong analytical and problem-solving skills, with the ability to analyze complex security incidents and make informed decisions under pressure.

Proven Experience In :
  • Extensive experience (typically 7+ years) in cybersecurity operations, including hands-on experience with security tools, technologies, and processes
  • Strong leadership and managerial skills, with a demonstrated ability to lead and motivate a team of cybersecurity professionals
  • Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders
  • In-depth knowledge of cybersecurity principles, practices, standards, and frameworks (e.g., NIST Cybersecurity Framework,
  • ISO/IEC 27001).
  • Experience with incident response, threat hunting, and digital forensics techniques and tools
  • Familiarity with cloud security, network security, and application security concepts and technologies
  • Experience with security risk assessment, vulnerability management, and security auditing methodologies
  • Develop, implement, and enforce security policies, procedures, and controls to protect the organization's information assets and ensure compliance with security standards
Email: [email protected]
IND1