Information Security Specialist

4 months ago(9/8/2017 11:12 AM)
Job ID
# Positions
Employee Type
R- Regular
Full Time / Part Time
Full Time
Product Development


Trend Micro: Securing Your Journey to the Cloud

As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With over 20 years of experience, we’re recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based data protection solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.


We are a world class Information Security team, one of the best in Canada. We specialize in vulnerability research and rules development. Located in Ottawa, researching for Trend Micro’s flagship DataCenter Security Product called Deep Security. The team is referred to as our Deep Security Labs team. Working with other global teams, this team is chartered to keep abreast with the latest vulnerabilities, and provide timely protection to our customers by preventing threats over the network and detect local indicators of compromise.


Information Security Specialist – – Ottawa, Canada:

We are looking for someone who is passionate about information security. Whether you like to dig into vulnerabilities and exploits, you love hacking web applications, study malware, play with metasploit or run pen-tests; we are interested in helping you develop your passion further. We are on a mission to prevent servers from being attacked against vulnerabilities and threats.


You don’t have to be a security expert. If you understand computers and TCP/IP networks, HTTP and other layer 7 protocols well you are more than welcome to apply for this position.

Duties & Responsibilities

  • Write and Test IPS, Integrity Monitoring and Log Inspection rules for quality, functionality, false positives and false negatives, regression, performance, etc. This involves
    • Vulnerability/attack scenario reproduction to ensure the attack is well understood and well protected against
    • Carry out testing with exploit PoCs, viruses, Metasploit and other exploit tools.
    • Review for flaws in the rule and relevant codes which have a tendency of being logical/state/detail oriented
    • Security patch analysis
  • Implement and design small-scale to medium-scale automation in order to simplify testing tasks, improve and assure the best quality using Perl, python, ruby etc.
  • Vulnerability and threat monitoring
  • Vulnerability scanner execution & results analysis
  • Develop and perform test cases based on the objectives of the test
  • Script various tasks and activities by using bash, ruby, batch, perl
  • Understand and interpret the detailed information on vulnerabilities and exploits in pursuance of quality testing, test cases generation and quality assurance
  • Utilize common tools such as VMware suite, SQL, binary editors, terminal clients, RDP clients, browser’s developers’ tools
  • Performance testing
  • Perform weekly routine responsibilities such as: shipping/testing of the virtual patches, rule testing, QA review, reproductions

Experience Required

  • Good hands-on Security tools, vulnerability scanners, fuzzing tools, pen testing tools.
  • Knowledge in TCP/IP protocols and deeper knowledge of application layer protocols like HTTP, FTP, DNS.
  • Experience with signature development/testing OR penetration testing, along with writing exploit code.
  • Solid understanding of Operating Systems Internals.
  • Knowledge of scripting languages.

Desired skills:

A passion for information security.

In-depth knowledge of various protocols like HTTP, CIFS, MSRPC, SMB, IMAP, NTP, SNMP etc.


Trend Micro welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process.

Apply or Socialize

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed