Our client is a well-established Cyber Security Consultancy and Managed Security Services Provider and currently have an opportunity for a security analyst to be a pivotal member of the team and protect their clients. The MSS division has been operating for five years, delivering high-level security support across incident response, threat hunting, threat modelling, for a range of customers across Australia.
As mid level Security Analyst, you’ll take a hands-on role in the team and ideally bring some expertise across detection engineering or threat detection and response. The team operates a collaborative security model where every team member is involved across the entire security lifecycle, rather than being restricted to a specific level (L1 / L2 / L3). You’ll work with a mix of security tools, automation, and scripting to enhance security operations and protect clients against evolving threats.
The role is Monday to Friday, core business hours, with an on call roster in place for after hours.
Key Responsibilities
- Security Monitoring & Incident Response – Investigate, detect, and respond to security events from enterprise log sources.
- Threat Detection & Hunting – Identify potential security risks and proactively detect suspicious activity.
- Incident Response Workflow Automation – Develop and implement automated workflows to improve response efficiency.
- Security Research & Intelligence Gathering – Stay ahead of the latest cyber threats and leverage intelligence feeds for proactive defense.
- Event Contextualisation & Documentation – Analyse security alerts within the business environment and maintain clear investigation records.
- SIEM Event Detection & Response – Define key events of interest and build detection rules within Microsoft Sentinel or similar SIEM platforms.
- Security Compliance & Best Practices – Ensure all security processes align with regulatory, policy, and audit requirements.
- Cybersecurity Tool Management – Administer and optimise security platforms, particularly in Microsoft Sentinel / Defender.
What You’ll Bring
- Solid foundation in Security Operations, including incident detection, triage, and remediation.
- Proven hands-on expertise with Microsoft Sentinel, Defender, and other security tools (preferred)
- Proven experience in either detection engineering or threat detection and response.
- Experience with SIEM detections, defining security events, and building rules based on client needs.
- Familiarity with incident response workflow tools and automation implementation.
- Experience working with DevOps tools (e.g., GitLab) and CI / CD pipelines – highly desirable.
- Ability to provide real-world examples of handling security incidents (e.g., phishing, ransomware attacks).
The role is located in Melbourne CBD and has a hybrid work environment with 2 days per week in the office. Will also consider candidates in Sydney and Perth. ALL applicants MUST have full working rights. Please apply for immediate consideration.
Please reach out to Liz for a confidential discussion at 0414214325.
Profession : ICTSecurity / Cyber Security