Назад
Company hidden
2 дня назад

Staff Security Analyst, Threat Intelligence (Fintech)

144 500 - 170 000CAD
Формат работы
hybrid
Тип работы
fulltime
Грейд
senior/lead
Английский
b2
Страна
Canada
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Staff Security Analyst, Threat Intelligence (Fintech): Hunting and mapping criminal ecosystems targeting hirify.global and its customers, translating intelligence into scalable systems and coordinated defenses that disrupt adversaries before they cause harm. Focus on building a comprehensive “Universe of Threats” and establishing a proactive threat intelligence lifecycle.

Location: Based in the Toronto, Canada office, with in-person attendance expected at least 3 days per week.

Salary: $144,500 - $170,000 CAD

Company

hirify.global's mission is to democratize finance for all.

What you will do

  • Proactively hunt and map criminal ecosystems targeting hirify.global and its customers, then translate intelligence into scalable systems and coordinated defenses.
  • Build and operationalize a comprehensive “Universe of Threats” by identifying, tracking, and prioritizing adversaries across various threats.
  • Establish and mature a proactive threat intelligence lifecycle by developing industry partnerships and collaborating with trusted peers and federal authorities.
  • Investigate attacker infrastructure across domains, DNS, certificate transparency logs, cloud providers, and telecom platforms.
  • Coordinate threat actor infrastructure takedowns with hosting providers, domain registrars, cloud platforms, and other infrastructure partners.
  • Partner directly with various teams and executive leaders to prioritize threats based on measurable business risk.

Requirements

  • 8–12+ years of total experience, including 3–5+ years operating at a senior or staff-level scope in threat intelligence, brand protection, or cyber investigations.
  • Hands-on experience tracking criminal ecosystems tied to phishing, scams, impersonation, fraud, and infrastructure abuse.
  • Deep familiarity with domain registration patterns, DNS and certificate transparency analysis, cloud and hosting abuse across providers (e.g., AWS, GCP, Azure, VPS), and attacker monetization methods.
  • Experience using OSINT tooling, SQL, Python, notebooks, SIEM or SOAR platforms, OpenCTI, and case management systems.
  • Ability to translate complex technical threats into clear business risk for technical teams and executive audiences.
  • Experience mentoring others or leading initiatives across teams.

Nice to have

  • Experience with crypto investigations or on-chain analysis.
  • Background in highly regulated industries such as fintech, financial services, payments, crypto, healthcare, or government.

Culture & Benefits

  • Challenging, high-impact work to grow your career.
  • Performance-driven compensation with multipliers for outsized impact, bonus programs, and equity ownership.
  • Top-tier benefits to fuel your work, including supplemental health insurance, ancillary insurance, and mental health support programs.
  • Exceptional office experience with catered meals, events, and comfortable workspaces.
  • Monthly commuter stipend to help offset in-office commuting costs.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →