University of Waterloo

Returning Candidate?

Systems Integration Specialist

Systems Integration Specialist

Requisition ID 
Job Category  
5170 - Information Systems and Techno
Job Status 
Regular Full-Time
Hiring Range 
$62,976 - $102,023

More information about this job


The Security Operations Centre (SOC) is looking to hire an operations analyst. You will join a small team consisting of two analysts and one manager. This team is part the Information Security Services (ISS) group, within Information Systems & Technology (IST), the University of Waterloo's central technology support department.  The campus is similar to a small city in terms of both scope and diversity.  We value and expect integrity, curiosity, and a willingness to continuously learn and adapt.


  • Take part in day to day operations, including but not limited to: network and email firewall changes, incident detection and response, TLS certificate management, and log monitoring.
  • Assist with the campus vulnerability management program. Identify and prioritize real and potential security risks, and work with relevant stakeholders to manage risks appropriately.
  • Assist with administration and maintenance of technologies employed by the SOC.
  • Initiate and assist with other internal and campus-wide projects related to information security.

Some work outside of University business hours may sometimes be required, but is not typically expected.


  • Relevant university degree, college diploma, or a combination of other training and experience
  • 3 year of experience in an information security-related field, in system administration, or a combination of both
  • Demonstrated ability to conduct technical investigations both independently and as a member of a team
  • Comfortable dealing with individuals displaying a wide range of technical and information security expertise across broad problem domains
  • Demonstrated ability to process and analyze large sets of data
  • Preference will be given to those with experience with one or more security technologies including network firewalls, log collection/aggregation, open-source intrusion detection, and vulnerability management