Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailMinimum three years experience in Cyber Security Operations or Incident Response.
Applied Experience with a Security Incident and Event Management tool such as SPLUNK or the ability to utilise system administration or scripting experience to address cyber security requirements.
Demonstrated knowledge should be relevant to both cloud and onpremises Candidate environments.
An in depth understanding of current cyber security techniques threats and vulnerabilities and the ability to apply this knowledge to mitigate cyber security risks. This includes the application of frameworks such as MITRE ATT&CK and analysis of TTPs of threat actors.
The ability to work well and share knowledge within a team.
Welldeveloped writing skills and experience maintaining technical documentation.
Experience with automation preferably security orchestration automation and response.
Knowledge of Splunk Risk Based Alerting (RBA).
Relevant industry certifications such as CISSP GCIH GCIA.
Technical tertiary qualifications Microsoft or Splunk certifications are highly desirable.
Australian Citizen with NV1 security clearance
Canberra work location
12 months 12 months contract
#cyber #cyberanalyst #cybersecurityanalyst #soc #socanalyst #securityoperations #splunk #incidentresponse #mitreatt&ck #TTp #eventmanagement #Splunk Risk Based Alerting #cissp #gcih #gcia #australiajobs #securityorchestration #automation #clloud #onpremise #australiajobs #canberrajobs
#cyber #cyberanalyst #cybersecurityanalyst #soc #socanalyst #securityoperations #splunk #incidentresponse #mitreatt&ck #TTp #eventmanagement #Splunk Risk Based Alerting #cissp #gcih #gcia #australiajobs #securityorchestration #automation #clloud #on-premise
Full Time