You are on page 1of 6

ALPHA COLLEGE

OF BUSINESS AND TECHNOLOGY

Topic of the Contemporary Workplace

SUBMITTED TO: -
Towhid Shams

SUBMITTED BY: -
Akshay Kumar
4342270
G3E
Part 1

The source / link of the job posting and the job posting itself comprises part 1 of the
assignment.

LINK: https://ca.indeed.com/jobs?q=cyber+security&l=Toronto
%2C+ON&vjk=b49a83979f8f19f9

Full Job Description

Position: Cyber Security Researcher


Type: Full Time Permanent
Location: Toronto, ON. (The office is in Toronto downtown, but it is closed due to
COVID19. This position will be working remotely)

Company Overview:
Cycura Data Protection Corp is a part of WELL Health Technologies Corp. (TSX: WELL) and is
a leader in providing top-tier cybersecurity services, whose key principals have extensive
experience in protecting patient health data in the provincial Ministry of Health and acute care
hospital settings. Cycura provides its cybersecurity services to several high-profile companies in
various industries across Canada, including a collection of healthcare-related clients focusing on
mental health, telemedicine, health insurance and benefits, and other disciplines. Cycura has also
recently completed technical security assessments on medical devices used nationwide in both
acute care and long-term care settings. For more information about us, visit:
https://www.cycura.com/

About WELL:
WELL, is an omnichannel digital health company whose overarching objective is to empower
doctors to provide the best and most advanced care possible while leveraging the latest trends in
digital health. As such, WELL owns and operates primary and executive healthcare clinics in
both Canada and the US operates a global digital Electronic Medical Records (EMR) business
serving thousands of healthcare clinics and health systems of all sizes and operates a multi-
national portfolio of telehealth services which includes one of the largest telehealth service
providers in Canada. WELL, is also a provider of digital health, billing, and cybersecurity-
related technology solutions. WELLs wholly owned subsidiary CRH Medical provides various
products and services that have supported thousands of Gastroenterology physicians in the US.
WELL, is an acquisitive company that follows a disciplined and accretive capital allocation
strategy. WELL, is publicly traded on the Toronto Stock Exchange under the symbol " WELL."
For more information about us, visit: www.well.company.
Position Overview:
At Cycura, we take an offensive approach to security, both creating and implementing break-
through technologies. We base all our practices on fundamental security principles to effectively
protect what matters most to our customers.
Our team is expanding and seeking a Cyber Security Researcher who is a detail-oriented and
strong communicator to join the team. The scope of services provided as a Cyber Security
Researcher includes any activities, discussions, product development activities, design work,
software development, professional services, security assessments, research and any other
activities related to the company’s activities or services that the Employee will be engaged in on
behalf of the company.

Key Responsibilities:

 Red Team assessments.


 Penetration testing.
 Code review.
 Technical security assessments.
 Security assessments.
 Research & Development.
 Workshop delivery.
 Phishing and Social Engineering engagements.
 Project Infrastructure Configuration.
 Client facing project meetings and debriefs.
 Presenting and participating on behalf of the company at conferences and information
security competitions.
 Participation in the writing of company marketing materials, such as white papers and
blog posts.
 New duties and responsibilities may be added throughout the employment with the
company at the discretion of the Vice President of Services.

Requirements:
Technical skills
 Proficiency in at least one programming or scripting language (preference to Python,
JavaScript, and Go)
 Fundamental knowledge of network and web-related protocols (e.g., TCP/IP, UDP,
HTTP, HTTPS, REST)
 The diverse range of security experience at the enterprise level (information, application,
network, research)
 Strong understanding of common web application attacks (OWASP TOP 10)
 Strong Linux fundamentals and ability to analyze data with security toolsets.
 Familiarity with the fundamentals of a robust security program
 Fluency in common web technologies and engineering workflows
 Strong understanding of the diverse range of cloud services and their implementation

Soft skills

 Strong written and verbal communication skills


 Attention to detail in documentation and communications.
 Strong analytical capabilities
 Comfortable in client-facing situations

We are committed to supporting a diverse, inclusive and accessible workplace. We welcome and
celebrate the diversity of applicants and team members across ability, race, gender identity,
sexual orientation, and perspective. We strive to create an inclusive workplace where difference
is celebrated and fuels our success – this is the WELL Way.

Be as detailed as possible with the WRITE IN A PARAGRAPH, DO NOT PUT THAT IN


BULLET POINTS

Job Description:
The Security Researcher, this position is crucial for safeguarding an organization's digital assets
and information from cyber threats. Based in Toronto, a renowned technological hub, the Cyber
Security Researcher contributes to the development and implementation of strategies aimed at
protecting the organization's systems, networks, and data from unauthorized access, breaches,
and other cyber-attacks. The role requires a strong understanding of cyber security principles, the
ability to conduct research and analysis, and an awareness of emerging threats to enhance the
organization's security posture.
Key responsibilities of the Cyber Security Researcher include
conducting research and analysis to identify potential cyber threats, vulnerabilities, and attack
vectors. By monitoring security events, logs, and alerts, the researcher detects and responds
promptly to security incidents. Implementing security measures, protocols, and best practices is
essential to protect the organization's infrastructure, systems, and data. Conducting penetration
testing, vulnerability assessments, and risk assessments helps identify and mitigate potential
security risks.
In terms of machines used, a Cyber Security Researcher typically relies on
computers, servers, networking devices, security tools (such as firewalls, intrusion detection
systems, and anti-malware software), virtualization platforms, and data analysis software. While
the role is primarily office-based, there are inherent hazards associated with working in the cyber
security field, such as exposure to malicious software, sensitive data, and potential cyber-attacks.
Adherence to established security protocols, guidelines, and best practices is crucial to mitigate
these risks and maintain a secure working environment.
A Cyber Security Researcher
should possess several important emotional characteristics to excel in their role. Resilience is
crucial, as the field of cyber security presents constant challenges and potential breaches. The
ability to remain composed under pressure, recover quickly from setbacks, and maintain focus is
essential. Additionally, strong analytical thinking skills are necessary to effectively analyze
complex data, identify patterns, and draw meaningful conclusions for the detection and
mitigation of security risks.
The job specifications for a Cyber Security Researcher typically include a bachelor's or
master's degree in computer science, information security, or a related field. Possessing relevant
certifications, such as Certified Information Systems Security Professional (CISSP), Certified
Ethical Hacker (CEH), or Certified Information Security Manager (CISM), is highly
advantageous in this role. Strong analytical skills, attention to detail, problem-solving abilities,
and a commitment to continuous learning are essential attributes for success as a Cyber Security
Researcher.
Additionally, excellent communication and collaboration skills are vital for working effectively
with cross-functional teams and stakeholders.
While the role of a Cyber Security Researcher
primarily involves intellectual and analytical work, there are sensory demands to consider.
Visual perception is crucial for tasks such as analyzing logs, security events, and data
visualizations, which require attention to detail and effective interpretation of visual information.
Auditory perception is also important for tasks involving listening to security alerts, participating
in discussions with colleagues, or engaging in meetings. However, it's important to note that the
sensory demands in this role are primarily cognitive in nature, requiring mental focus, critical
thinking, and decision-making skills. The emphasis is on intellectual engagement rather than
physically intensive sensory demands.

Write a brief paragraph about why you chose to apply for this job. 300 WORDS

The field of cybersecurity has always intrigued me, and it is why I am drawn to applying for a
career in this dynamic and challenging domain. In today's increasingly digital world, the
importance of protecting sensitive information and combating cyber threats cannot be overstated.
The constantly evolving landscape of cybercrime and the potential consequences it poses to
individuals, organizations, and even nations have fueled my passion for making a positive impact
in this critical field. The opportunity to be on the front lines of defending against malicious
actors and helping to secure digital infrastructures is a compelling and rewarding prospect. I am
fascinated by the intricate and ever-changing nature of cybersecurity, which demands continuous
learning and adaptation to stay ahead of emerging threats. The chance to constantly explore new
technologies, develop innovative defense strategies, and contribute to the resilience of systems
and networks is both intellectually stimulating and professionally fulfilling. Moreover, the global
nature of cyber threats presents an exciting and collaborative environment, where experts from
diverse backgrounds come together to share knowledge and expertise. The ability to work with
cross-functional teams and engage in proactive threat hunting, incident response, and
vulnerability management is an invigorating prospect. In addition, the field of cybersecurity
offers a unique blend of technical skills, analytical thinking, and problem-solving abilities, which
align perfectly with my strengths and interests. By pursuing a career in cybersecurity, I hope to
leverage my passion for technology, my commitment to continuous learning, and my desire to
contribute to a safer digital world. I am excited to immerse myself in the challenges and
opportunities this field offers, and I am confident that my skills and dedication will allow me to
make a meaningful difference in safeguarding critical information and protecting against cyber
threats. Also, the salary in the field is one of the most important things.

You might also like