The Cybersecurity Analyst will enhance vulnerability management and cyber threat intelligence capabilities while collaborating with IT teams to provide actionable insights.
Required Language:
French and English (advanced level in at least one of the two languages)
Hours per Week:
35 hours per week
Work Arrangement (Remote / On-site):
Hybrid – 50% onsite presence in one of the following locations: Montreal, Brossard, Valcourt, or Sherbrooke (flexible depending on the manager)
Contract Duration:
Contract mandate until January 31, 2027
We are seeking a Cybersecurity Analyst specializing in Vulnerability Management and Cyber Threat Intelligence (CTI) to help strengthen the security program of an organization recognized for the maturity of its cybersecurity practices.
In this role, you will be responsible for monitoring, analyzing, and correlating vulnerability and threat data from multiple security platforms to deliver meaningful insights and actionable recommendations. You will play a key role in identifying critical vulnerabilities, analyzing emerging threats, and prioritizing remediation actions based on real risk to the organization.
You will work closely with IT teams, SecOps, and business partners in a structured corporate environment that values autonomy, proactivity, and operational rigor.
Requirements and Technical SkillsThe ideal candidate has strong experience in cybersecurity and a solid ability to analyze threats and vulnerabilities.
Key Requirements:
Minimum 5 years of experience in cybersecurity across multiple domains
Hands-on experience in Vulnerability Management
Practical experience with a Cyber Threat Intelligence (CTI) platform, ideally Recorded Future
Strong understanding of cybersecurity frameworks such as:
MITRE ATT&CK
Cyber Kill Chain
Good knowledge of SOC technologies and tools including:
SIEM
XDR
vulnerability scanners
Understanding of technology infrastructures, networking, and application environments
Ability to analyze TTPs (Tactics, Techniques, and Procedures) used by threat actors
Strengthen the organization’s Vulnerability Management and Cyber Threat Intelligence capabilities
Improve vulnerability prioritization based on real threat context
Monitor active vulnerability exploitation and emerging threats
Correlate vulnerability data with insights from CTI platforms
Provide clear analysis and actionable recommendations to technical teams and business partners
Monitor vulnerability data from scanners and enterprise security tools
Analyze, validate, and contextualize findings to determine severity, exploitability, and potential impact
Collect and analyze threat intelligence from internal and external sources
Correlate Cyber Threat Intelligence data with vulnerabilities identified in the internal environment
Identify vulnerabilities requiring immediate remediation priority
Produce executive reports and operational recommendations
Support remediation teams by prioritizing actions based on real risk
Monitor exploitation trends and threat campaigns
Contribute to the continuous improvement of Vulnerability Management and CTI processes
Maintain awareness of the evolving threat landscape
Experience with MISP
Experience with Dark Web monitoring and Brand Protection
Knowledge of Attack Surface Management practices
Experience in Third-Party Risk Management
Experience with advanced OSINT techniques
Knowledge of APT groups and their tactics
Excellent technical and executive communication skills
Strong autonomy and ability to work with minimal supervision
Advanced analytical and correlation skills
Ability to prioritize effectively in a dynamic environment
Proactive mindset and strong sense of initiative
Xideral builds advanced network operations and telecom solutions that emphasize security and performance for enterprise environments. They specialize in automation and integration, enhancing operational efficiency while ensuring robust cybersecurity practices.
Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.
Security Analyst Q&A's