Overview
If you are currently looking for opportunities and feel this role is right for you, please upload your resume and we will contact you to discuss current opportunities.
Triskele Labs have been identified as Australia’s fastest growing Managed Security Services Providers (MSSP) including recently being recognised as the AT&T (AlienVault) APAC Partner of the year. As such, we are looking for a security analyst to join our SOC team. This role will focus purely on the Security Operations Centre, monitoring our customer environments for potential security issues. We are looking for a self starter who can work autonomously.
This role is open to recent Bachelor and Masters graduate with a solid understanding of cybersecurity, networking fundamentals and infrastructure. We actively encourage new graduates to apply.
An average day will include:
- Monitoring deployed SIEM (including IDS, EDR, FIM, HIDS, DLP) solution for alerts. Researching issues, confirming them as positive and raising with the client via the Service Desk.
- Incident Management via systems such as SOAR to correlate alerts and identify an incident. Working with clients on incident remediation.
- Developing playbooks and incident scenarios within the SOAR.
- Conducting Vulnerability Scans, undertaking research of identified issues and ensuring positive results. Raising tickets with customers.
- Working with clients to develop threat intelligence and provide targeted issue identification.
- Managing incidents and alerts through the entire lifecycle, ensuring all incidents are followed up on to meet SLAs.
- Assisting with monthly reports including technical details and customer analysis.
Who we are looking for:
Ideally, we are looking for someone who loves cybersecurity and wants to show-off their talent and passion. You don’t necessarily need to have worked as an analyst before as this role is open to graduates. However; you must have demonstrated capability and the ability to explain cybersecurity concepts such as how an IDS functions, or what a Command and Control server is and how malware would exploit this. If you are coming straight from University or study; you must be able to demonstrate how you have applied your knowledge, which could be in a lab or building your own systems.
Types of Certifications we are looking for:
We are willing to support grads in this role. However; you must have the foundations for cybersecurity and able to articulate the basis. Ideally, you will have:
- Bachelor of Networking & Cybersecurity
- Master of Networking & Cybersecurity
- CCNA
- CCNA Security
- GIAC Security Certification
Anything else I should know:
This is a rotating shift role which you will commence on almost immediately. It is expected you will commence on Shift 1 to receive training. The shift pattern includes weekdays, weekends and public holidays. This role is part of a 24*7*365 crew and will not partake in Christmas shutdowns etc. The current roster is:
- Shift 1: 5 Days on: 7am – 4pm
- Shift 2: 3 Days Off
- Shift 3: 5 Days on: 10:30pm – 7:30am
- Shift 4: 4 Days Off
- Shift 5: 5 Days on: 2pm – 11pm
- Shift 6: 3 Days Off
- Repeat