Job Description
<h3>Job Description</h3><p>Job Description<p><p><strong>Shift Time:</strong> Mon-Fri, 12pm-8pm<br><br><strong>About DataStealth:</strong></p><p></p><p>DataStealth is a single, <strong>unified data security platform (DSP) </strong>that discovers, classifies, and protects sensitive data across your entire environment, from on-premise to legacy cloud to cloud; wherever your data lives or flows, we protect it. We do this without requiring complex integrations or changes to your existing applications, ensuring security that enables, rather than hinders, your business. By seamlessly applying data protection strategies, such as tokenization, we ensure that even if your perimeter is breached, your data remains unusable if it falls into the wrong hands.</p><p></p><p>Recognized for the fifth consecutive year as a <strong>Great Place to Work</strong>, we are one of the world’s leading and fastest growing cybersecurity software companies. Our team is the best in the business. Our patented technology provides our large enterprise customers with the ability to solve complex data security problems with a paradigm shifting technology that can actually solve problems.</p><p></p><p><strong>About You:</strong></p><p></p><p>You are a rare hybrid: a high-level technical troubleshooter with the "people skills" of a seasoned consultant. As a Level 3 Technical Engagement Lead, you don’t just close tickets; you own the customer experience. You thrive on the complexity of enterprise-level security, yet you possess the patience and clarity to explain those complexities to non-technical stakeholders. You are a natural investigator who stays calm under pressure, whether you are managing a major incident or deploying a critical security patch. You take pride in being the bridge between cutting-edge technology and the people who rely on it.</p><p><strong><br />Role Overview:</strong></p><p></p><p>The Level 3 Technical Engagement Lead serves as the primary point of contact between External customers and DataStealth’s IT organization, managing complex inquiries, incidents, and service requests. This role requires a unique blend of technical competency along with a customer-centric approach, with the ability to pivot between a variety of customer needs within the data security support space. The ideal candidate must focus on delivering value through effective incident management, service request handling, and clear communication, all while applying <span >professional/technical</span> support, following ITIL best practices, supporting continuous improvement, and providing true service to our customers and organization.</p><p></p><p><strong>Key responsibilities:</strong></p><p><strong><br /></strong></p><ul><li><p>Managing complex user inquiries and service requests through phone, email, and chat channels.</p></li><li><p>Managing complex incidents in the Service Management tool through logging, evaluating, diagnosing, categorizing, prioritizing, investigating, resolving or <span >triaging/escalating</span> to the appropriate team that cannot be resolved at the Service Desk level.</p></li><li><p>Implementing production solutions/fixes, and changes.</p></li><li><p>Monitoring events (alerts) and responding as required.</p></li><li><p><span >Creating/maintaining</span> detailed documentation of issues and solutions (e.g., Run Books, Standard Operating Procedures, and Operational Articles) designed for reuse and training material for potential new staff.</p></li><li><p>Building reports <span >(metrics/analytics).</span></p></li><li><p>Supporting IT security policy implementation and enforcement.</p></li><li><p>Collaborating with other IT teams on complex technical issues.</p></li><li><p>Training users on IT systems and applications.</p></li><li><p>Overseeing and deploying critical and regular security patches/fixes according to the patching cycle.</p></li><li><p>Helping to manage and maintain infrastructure lifecycle, including inventory, and maintenance of infrastructure components.</p></li><li><p>Acting as a Major Incident Manager during critical events and managing the incident lifecycle (including: acknowledging, tracking, communicating, escalating, etc…through to resolution) where required.</p></li><li><p>Participating in Root Cause analysis exercises (post-incident).</p></li><li><p>Acting as a Change Manager where required.</p></li></ul><p></p><p><strong>Requirements</strong>:</p><p><br /></p><ul><li><p>Customer-centric, empathetic, and concerned for the user experience (External Customers and Internal staff).</p></li><li><p>Expert level verbal and written communication skills.</p></li><li><p>Expert level problem-solving and analytical skills.</p></li><li><p>Ability to explain technical concepts clearly to non-technical users.</p></li><li><p>Strong understanding of IT infrastructure, IT systems, networking, security, hardware, software, and monitoring tools.</p></li><li><p>Ability to work effectively with various functional teams (e.g., Technical Support, Engineering, Marketing, Project Management, etc…) to ensure alignment, timely service, and customer satisfaction.</p></li><li><p>Solid understanding of ITIL practices and service management.</p></li><li><p>Experience with Service Desk tooling and ITSM software.</p></li><li><p>Ability to multitask in a fast-paced environment.</p></li><li><p>Ability to deliver exceptional outcomes in a team environment and while working under minimal supervision.</p></li><li><p>Commitment to continuous learning and staying current with technology.</p></li><li><p>Ability to participate in a shift rotation <span >(days/evenings/nights),</span> including weekend after-hours (Emergency) support.</p></li></ul><p></p><p><strong>Qualifications:</strong></p><p><strong><br /></strong></p><ul><li><p>Proficient in networking technologies: routers, switches, load balancers, web application firewalls, next-gen firewalls, LAN/WAN networks, Internet, VPN, and various network protocols such OSPF/BGP, IKE/IPSec, DNS, DHCP, SMTP, SSH, S/FTP, etc.</p></li><li><p>Experience managing security protocols, firewalls, intrusion detection systems (IDS), and VPNs.</p></li><li><p>Experience installing and maintaining physical and virtual servers based on the Linux operating system (RHEL and clones).</p></li><li><p>Experience using Linux-based virtualization technologies (KVM, LibVirt, LXC) on physical hardware, or operating in a multi-cloud environment (AWS/Azure).</p></li><li><p>Understanding of Cloud platforms (AWS, Azure, Google Cloud).</p></li><li><p>Scripting experience (e.g., PowerShell) is considered an asset.</p></li><li><p>ITIL 4 Foundation certification (preferred).</p></li><li><p>Previous experience with JIRA Service Management (preferred).</p></li><li><p>Prior customer service or call center experience (preferred).</p></li></ul><p></p><p><strong>Additional Information:</strong></p><p></p><p>This posting is for an existing vacancy. We use artificial intelligence (AI) to screen, assess, and select applicants.</p><p></p><p><em>DataStealth is an equal opportunity employer. We encourage applications from candidates of all backgrounds and experiences.</em></p><p></p><p>We look forward to reviewing your application!</p><p>Compensation Range: CA$80K - CA$90K</p></p></p>Create Your Resume First
Give yourself the best chance of success. Create a professional, job-winning resume with AI before you apply.
It's fast, easy, and increases your chances of getting an interview!
Application Disclaimer
You are now leaving Jobsbrampton.ca and being redirected to a third-party website to complete your application. We are not responsible for the content or privacy practices of this external site.
Important: Beware of job scams. Never provide your bank account details, credit card information, or any form of payment to a potential employer.