Company Overview

Tell us your story. Don’t go unnoticed. Explain why you’re a winning candidate. Think “TD” if you crave meaningful work and embrace change like we do. We are a trusted North American leader that cares about people and inspires them to grow and move forward.

Stay current and competitive. Carve out a career for yourself. Grow with us. Here’s our story:

Department Overview

Building a World-Class Technology Team at TD

We can’t afford to be boring. Neither can you. The scale and scope of what TD does may surprise you. The rapid pace of change makes it a business imperative for us to be smart and open-minded in the way we think about technology. TD’s technology and business teams become more intertwined as new opportunities present themselves. This new era in banking does not equal boring. Not at TD, anyway.

TD Information Security covers the development and management of security strategies, policies and programs to assess, prioritize, and mitigate business risk with technology controls. Priorities include: mitigating and managing cyber security threats, ensuring systems availability, aligning with global regulatory risk and compliance requirements, managing systems and network complexity, and partnering with businesses for better technology delivery by providing advice on technology controls.

There’s room to grow in all of it.

Job Description

Job Description
Meaningful work is fueled by meaningful performance and career development conversations with your manager. Here’s some of what you may be asked to perform:

  • Highly motivated, team-oriented, self-learner, responsible, and focused on exceeding expectations.
  • Strong organizational skills to facilitate management and tracking of large numbers of requirements, activities, findings and changes
  • Sense of urgency, resourcefulness and enthusiasm in providing technical recommendations and solutions
  • Ability to apply agile methodology & accurate logic and common sense in making technology and systems configuration decisions
  • Ability to protect confidential information and act with a high level of integrity
  • Diverse knowledge in current and emerging technologies in the space of Security Event Management and Security Analytics, User & Entity Behavior Analytics (UEBA), and Security Analytics Platforms in particular.
  • Demonstrates understanding of the role of technology in business and information protection controls and operational governance as it applies to each functional area
  • Ability to recommend and execute solutions in compliance with corporate security standards.
  • Validate log sources and indexed data, search through indexed data to optimize search criteria, expert knowledge in recognizing and onboarding new data sources into Splunk, analyzing the data for anomalies and trends.
  • Exceptional abilities in identifying and adding customer context to use cases, eliminate noise and false positives, and develop trends and data models.
  • Ability to interface successfully with audit and compliance functions to facilitate control assessments and related reporting
  • High level of confidence and assertiveness in high-pressure situations
  • Ability to build strong relationships with and lead teams and individuals without direct reporting relationships
  • Ability to quickly analyze large amounts of information, derive incisive insight and formulate action plans based on that analysis
  • Excellent written and oral communications skills and ability to articulate and present information to all levels of management and staff


Job Requirements
What can you bring to TD? Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. It helps if you have:

  • 3 to 5 years’ work experience in information security, cyber security, data protection or a related field
  • Minimum of a two-year degree in information protection, computer forensics, computer information systems, computer science, or information systems management
  • Security Analytics and UBA (Splunk): 3+ years of experience in performing security event management, security information event management and/ or security analytics configuration and management, security use case development and tuning, operational management and administration
  • Public Cloud (desirable): 2+ years of experience in performing security and compliance event management, security analytics configuration, security or UEBA use case development & tuning, and operational management & administration
  • Working experience with security event management and security analytics operational governance and fundamental operational processes (intake of new log sources, on-boarding, use cases management, etc.)
  • Proven experience with the successful development and deployment of use cases correlating information from various heterogeneous security feeds/platforms (e.g.: threat intel feeds, IOC. EDR, APT intelligence, etc.)
  • Expert knowledge of enterprise logging, with a focus on security event logging, knowledge of regular expression, good knowledge of SQL and SPL (Search Processing language) and Machine Learning.
  • Design and drive technical plans toward security analytics management objectives such as: integration of events from cloud platforms to enterprise SIEM; implementation of use case/policy using native public cloud security tools; net new security use cases development to support Security Logging & Monitoring/UEBA, account for the effect of the evolving threat space on the overall set of existing security use cases, net new log sources on-boarding (inclusive of testing and pre-production acceptance tasks), etc.
  • Risk-based activities prioritization, reporting, and developing technical and process management remediation steps
  • Develop and lead work-shopping activities for security use cases development and tuning, processes and run books for security event management and security analytics on-boarding/ off-boarding, intake management, requirements analysis, remediation, and reporting
  • Identify problems and understand when to fix or when to mitigate risk
  • Maintain governance material for the security event management and security analytics program as required
  • Must have solid understanding of Public Cloud (infrastructure, operations, security logging & monitoring), Network and Security infrastructure, topology including firewalls, routers, wireless access points, DNS, DHCP, and Identity and Access Management technologies
  • Experience with securing virtual, physical and cloud environments
  • Proven expertise with Splunk Enterprise Security and Splunk User Behavior Analytics; Splunk certifications are desirable
  • Working Experience with one or more of the following technologies:
    Preferred: Azure Sentinel, MS Azure Security Center (ASC), Microsoft Cloud Application Security (MCAS), Amazon Web Services (security services, e.g.: CloudTrail, CloudWatch),
    Optional: ArcSight, RSA, Securonix, Splunk, QRadar or equivalent tools.
  • Professional IT security certification such as CISSP, SANS Certified Intrusion Analyst (GCIA), CompTIA Security+, CEH, GSEC and/or CISM is preferred
  • An understanding of regulatory and Controls requirements: PCI, FFIEC, SOX, HIPAA, ISO 2700x, NIST standards

Additional Information

Join in on what others in TD Technology Solutions are doing:

  • Inspire a positive work environment and help champion quality, innovation, teamwork and service to the business.
  • Learn voraciously, stretch your thinking, share your knowledge and educate others.
  • Communicate and collaborate with both technical and non-technical professionals.
  • Cultivate winning relationships by building trust with business and technology partners.
  • Share our commitment to productivity, effectiveness and operational efficiency.
  • Embrace change and witness amazing things happen – from the inside.




At TD, we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. We are dedicated to building a workforce that reflects the diversity of our customers and communities in which we live and serve. If you require an accommodation for the recruitment/interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.

Job Overview

Sign in

Sign Up

Forgotten Password