
Cybersecurity Incident Responder
LanceSoft, Cambridge, MA, United States
Job Description
Location Address: Hybrid - 888 Birchmount Road 6th Floor, Scarborough -mostly WFH, coming in for training and ad hoc meetings -1/month after training period, preference for candidates in GTA Contract Duration: ASAP -Oct 30th 2026 Possibility of extension, no conversion to FTE. Schedule Hours: 9am-5pm Monday-Friday;standard 37.5 hrs/week Role: Cybersecurity incident responder
Story Behind the Need Business group: Threat Monitoring & Response (TMR) team is responsible for detecting, monitoring, and investigating threats;responsible for the coordination of key programs that impact all divisions within the Cybersecurity Operations (CSOps) organization and all of Information Security & Controls Project: 3rd party cyber security incidents - These roles are responsible for managing critical 3rd party risk events. Cybersecurity incident responder is responsible for managing the Bank's response to cybersecurity & data threats and the mitigation of associated risks. Cybersecurity incident responder works with various business and corporate functions on understanding and coordinating risk reduction.
Candidate Value Proposition: The successful candidate will have the opportunity to work within one of the Top 5 Banking Institutions in Canada. We are technology partners who help the business transform how our employees around the world work. You'll get to work with and learn from diverse industry leaders, who have hailed from top technology and financial institutions across the globe. As a leading global financial institution, this role gives exposure to various national policies and regulations for cybersecurity incident management.
Typical Day in Role: • Run 3rd party incident handling, refine and improve response playbooks. • Reporting to Senior Manager, Global Threat Response • Monitoring 3rd party events -coordinate general cyber security response to news, intelligence notifications • Working with stakeholders around the globe • Bridging communication between technical operations teams and globally based business leadership, and demonstrating an understanding of the business risk in doing so • Compiling and contextualizing investigating data for business consumption • Guiding team to best practice for incident response • Solutioning for multiple security domains (Security Management, Security Engineering, Identity and Access Management, etc.). • Leading complex projects providing security advice to ensure information security risk are mitigated.
Candidate Requirements/Must Have Skills: 1. 10+ years of working experience in IT 2. 3+ years of prior experience in Cybersecurity - hands-on working experience in management of threats and industry 3. 5+ years of incident management experience 4. 3+ years'experience using productivity tools (Power BI) to produce quantitative/qualitative reports, data flow diagrams & visual presentations.
Nice-To-Have Skills: 1. Bilingual in Spanish is a strong nice-to-have 2. Built custom reporting of mitigation status against threats 3. Experience involving red team (Vulnerability Assessments, Web app assessments), consulting (Compliance, policy creation), SOC and Device Management 6 Experience having managed large scale incident calls with C-level executives 7. CISSP and/or CISM certification
Education:
Bachelor's degree in a technical field such as computer science, engineering, business, or equivalent work experience Certifications (CISSP, CISM, CCSP, CRISC) are an asset
Best VS. Average Candidate:
The business line already has strong Technical SMEs in place, so candidates whose strengths are primarily technical will not be prioritized for this role. The best candidate is someone with extensive experience in people management, incident leadership, and public speaking, someone who can coordinate teams, manage high-pressure situations, and communicate confidently with stakeholders at all levels. This role requires a strong communicator and leader rather than a technical specialist.
Meet Your Recruiter
Lakshmi Naidu
Location Address: Hybrid - 888 Birchmount Road 6th Floor, Scarborough -mostly WFH, coming in for training and ad hoc meetings -1/month after training period, preference for candidates in GTA Contract Duration: ASAP -Oct 30th 2026 Possibility of extension, no conversion to FTE. Schedule Hours: 9am-5pm Monday-Friday;standard 37.5 hrs/week Role: Cybersecurity incident responder
Story Behind the Need Business group: Threat Monitoring & Response (TMR) team is responsible for detecting, monitoring, and investigating threats;responsible for the coordination of key programs that impact all divisions within the Cybersecurity Operations (CSOps) organization and all of Information Security & Controls Project: 3rd party cyber security incidents - These roles are responsible for managing critical 3rd party risk events. Cybersecurity incident responder is responsible for managing the Bank's response to cybersecurity & data threats and the mitigation of associated risks. Cybersecurity incident responder works with various business and corporate functions on understanding and coordinating risk reduction.
Candidate Value Proposition: The successful candidate will have the opportunity to work within one of the Top 5 Banking Institutions in Canada. We are technology partners who help the business transform how our employees around the world work. You'll get to work with and learn from diverse industry leaders, who have hailed from top technology and financial institutions across the globe. As a leading global financial institution, this role gives exposure to various national policies and regulations for cybersecurity incident management.
Typical Day in Role: • Run 3rd party incident handling, refine and improve response playbooks. • Reporting to Senior Manager, Global Threat Response • Monitoring 3rd party events -coordinate general cyber security response to news, intelligence notifications • Working with stakeholders around the globe • Bridging communication between technical operations teams and globally based business leadership, and demonstrating an understanding of the business risk in doing so • Compiling and contextualizing investigating data for business consumption • Guiding team to best practice for incident response • Solutioning for multiple security domains (Security Management, Security Engineering, Identity and Access Management, etc.). • Leading complex projects providing security advice to ensure information security risk are mitigated.
Candidate Requirements/Must Have Skills: 1. 10+ years of working experience in IT 2. 3+ years of prior experience in Cybersecurity - hands-on working experience in management of threats and industry 3. 5+ years of incident management experience 4. 3+ years'experience using productivity tools (Power BI) to produce quantitative/qualitative reports, data flow diagrams & visual presentations.
Nice-To-Have Skills: 1. Bilingual in Spanish is a strong nice-to-have 2. Built custom reporting of mitigation status against threats 3. Experience involving red team (Vulnerability Assessments, Web app assessments), consulting (Compliance, policy creation), SOC and Device Management 6 Experience having managed large scale incident calls with C-level executives 7. CISSP and/or CISM certification
Education:
Bachelor's degree in a technical field such as computer science, engineering, business, or equivalent work experience Certifications (CISSP, CISM, CCSP, CRISC) are an asset
Best VS. Average Candidate:
The business line already has strong Technical SMEs in place, so candidates whose strengths are primarily technical will not be prioritized for this role. The best candidate is someone with extensive experience in people management, incident leadership, and public speaking, someone who can coordinate teams, manage high-pressure situations, and communicate confidently with stakeholders at all levels. This role requires a strong communicator and leader rather than a technical specialist.
Meet Your Recruiter
Lakshmi Naidu