Summary
The ideal candidate will be responsible for monitoring, detecting, analyzing, and responding to security threats across our infrastructure. This role plays a critical part in safeguarding the confidentiality, integrity, and availability of our systems and data.
Responsibilities
- Review and manage IT policies and procedures as it relates to Information Security and Cybersecurity operations within the organisation.
- Monitor security information and event management (SIEM) systems for suspicious activity.
- Investigate and respond to security alerts, incidents, and breaches.
- Conduct root cause analysis and recommend mitigation strategies.
- Collaborate with IT, engineering, and third parties on incident response and remediation.
- Develop and maintain standard operating procedures (SOPs) and incident runbooks.
- Analyze threat intelligence feeds and incorporate them into detection strategies.
- Maintain logs, reports, and documentation in accordance with regulatory and compliance requirements.
- Perform regular vulnerability assessments and assist in patch management initiatives.
- Participate in red team/blue team exercises and tabletop simulations.
- Stay up to date on the latest cyber threats, trends, and best practices.
Requirements
- Bachelor’s degree in Computer Science, Information Security, or related field; or equivalent work experience.
- 2–4 years of experience in a SOC, security analysis, or incident response role.
- Strong understanding of networking concepts, operating systems, and cloud environments.
- Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm), IDS/IPS.
- Knowledge and proficiency in working with endpoint management concepts and tooling (such as Microsoft Intune and Trendmicro Worry Free).
- Knowledge and experience in relation to forensics and investigation highly regarded.
- Familiarity with threat frameworks such as MITRE ATT&CK, NIST, and CIS Controls.
- Familiarity with Australian specific security standards and frameworks such as essential 8 and SOCI.
- Experience with scripting (Python, PowerShell, or Bash) is a plus.
- Strong communication and documentation abilities.
- Working with partners and vendor relationships who provide the organisation with specialist services (such as monitoring and forensics).
- Security certifications (e.g., CompTIA Security+, CEH, GCIH, GCIA, or CISSP) is an advantage.