About the role

Are you passionate about cybersecurity? Do you have a strong attention to detail and proven track-record of delivering results?

We are looking for a motivated cybersecurity Security Engineer/ Incident Response team member to join our Security Operations team, who lives and breathes cybersecurity and customer satisfaction. You will work with a team of experts to deliver exemplary internal and external services by using your strong documentation skills, ability to collaborate with others, and determination and drive for constant improvement.

You will be performing security monitoring, security and data/log analysis and forensic analysis, to detect security incidents, and incident response. You will also investigate and utilise new technologies and processes to enhance security capabilities and implement improvements.

Key responsibilities

  • Monitor Red Piranha and its clients’ networks, computers and applications
  • Analyse, contain and eradicate security threats, ensuring swift resolution for clients
  • Pre-sales support, scoping, report writing and presentation to clients
  • Work with external parties (IT teams) to plan and remediate findings
  • Watch for events and traffic indicators that signal intrusions
  • Determine and identify the damage caused by detected intrusions and how it occurred
  • Recommend safeguards against similar intrusions
  • Perform security research with Red Piranha intelligence systems and malware systems
  • Development of cybersecurity tools and technologies
  • Monitor and investigate security breaches


About you

  • Ability to demonstrate technical knowledge
  • Understanding of systems administration, networking and risk/compliance.
  • Strong incident response across MS Azur etc
  • Ability to work as a part of a team or autonomously
  • Good written and verbal communication skills
  • Strong customer service and problem-solving skills
  • Have a passion for information security and have a desire to be key player in developing Australia’s first Extended Detection and Response platform and services
  • Experience in network and security implementation and/or operations
  • Good awareness of security and risk management and their implications for technical solutions
  • Knowledge in intrusion IDS/IPS, firewalls and WAF
  • Wide knowledge and experience in using security tools used in offensive and defensive infrastructures
  • Strong understanding of exploits, malware and digital forensics
  • Knowledge of different log technologies, sources and transport methods
  • Familiar in a system administration supporting multiple platforms and applications
  • Ability to communicate security issues to peers and management


Desirables

  • Minimum of two years’ experience as a SOC/NOC Analyst or similar
  • Experience with scripting languages (javascript, python, bash, etc.)
  • Experience with SOC and CTI platforms such as The Hive, Cortex, Cuckoo Sandbox


Clearance Requirements

  • Ability to obtain and maintain an Australian Police Clearance
  • Must have full Australian working rights.
Location
Submitted by john.cezar on Mon, 12/18/2023 - 08:50