Overview

If you are currently looking for opportunities and feel this role is right for you, please upload your resume and we will contact you to discuss current opportunities.

The company:

Work for a fast growing, well-established startup. Fast track your career and expand your skill set. Our client provides a personalised training and development program. Get job-specific training, certificates and career coaching!

The role:

  • Provide support to clients to help mitigate, remediate and identify causes of cyber incidents.
  • Configure security monitoring rules in SOC Tools (Alien Vault).
  • Remain up-to-date with the current cybersecurity threat landscape.
  • Develop and maintain scripts and automation routines.
  • Perform analysis on security event data collected from client computing platforms, network elements and security devices.
  • Monitor and assess emerging threats and vulnerabilities.

About you:

You will ideally have 2-3 years’ experience working with a SOC and have an understanding  of SIEMs, networking protocols, incident handling and knowledge of GRC frameworks.

Your technical skills include:

  • Strong working knowledge of a broad range of security technologies such as IDS, DLP, Firewalls, Proxies, Anti-Virus etc.
  • Enhanced understanding of threat actors TTPs and the Cyber kill chain.
  • Understanding of current threat landscape, response and mitigation tactics in Information/Cyber security.
  • Proven ability to provide technical analysis and direction for investigations.
  • Ability to complete post-incident analysis of network logs, traffic flows and other activities with the aim to identify malicious activity on a network.
  • Ability to analyse and reverse engineer various file types.
  • Penetration testing and red teaming skills are highly desirable.

Australian citizens or permanent residents only. No sponsorship.