Work with us
Title: Cyber Security Architect (Contract)Requisition ID: 5280
City: Melbourne
Country/Region: AU
WHAT IS THE PURPOSE OF MY ROLE?
This role exists to execute the cyber-security incident detection and response function within Security Services. The role is also responsible for contributing to the on-going maturity of the team, processes and frameworks.
The role requires strong technical skills and experience in incident detection and response.
AccountabilitiesRespond to cyber-security threats, vulnerabilities, events and incidentsAct as technical contributor during major security incidentsContribute to improvement in the team's capability, including:Mitigation strategies, including proactive planning, new controls, optimising existing controlsParticipate and contribute to the planning and executing of purple teaming activitiesMeet team operational metricsMaintain an up-to-date knowledge of cyber threatsDrive continuous learning and knowledge sharing within the teamAs required, support internal stakeholders and projectsWork in a 'business hours + rostered on-call' environmentOther related activities as required by Management or Cyber Response LeadsBACKGROUND INFORMATION ABOUT MY ROLE:Do I lead a team in this role? NO
COMMON NEXT CAREER MOVES:Coming into this role:
ExperiencePlease include
See Essential Capabilities
Good understanding and experience with:Incident response methodologies and techniquesDetection and mitigation strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltrationCommon cloud platforms/technologies, such as Azure, AWS and Google cloudCommon enterprise technologies, such as Windows, Linux, Active Directory, DNS, DHCP, web proxies, SMTP, TCP/IPMalware analysis and reverse engineering, including dynamic and static analysisOperational usage of common analysis and response tooling, including Splunk, Crowdstrike, Microsoft Defender, FireEye, Akamai, etcPerforming vulnerability assessments and penetration testing, including network, infrastructure and application exploitationThe Lockheed Martin Cyber Kill Chain or similar methodologiesEssential non-technical skills:Demonstrated ability to stay calm and lead under pressureExperience working in a CSOC / CIRT performing 2 and/or level 3 supportExperience in a complex enterprise environmentDemonstrated willingness to engage in self-learning or security research outside of standard business hoursGood analytical, problem solving and lateral thinking skillsGood verbal and written communication skillsGood time management and prioritisation skillsBasic consulting and stakeholder managementQualification RequirementsTertiary qualifications preferably in technology and cyber-security subjects.
SANS GIAC Certified Incident Handler (GCIH) or similarSANS GIAC Certified Forensic Analyst (GCFA) or similarSANS GIAC Reverse Engineering Malware (GREM) or similarSANS GIAC Penetration Tester (GPEN) or Offensive Security Certified Professional (OSCP) or similarCommon next career moves (please list and include roles in T&EO outside of Security if applicable):Senior Consultant (Lead) Cyber Response AnalystsSenior Consultant (Lead) Cyber Threat Intelligence
A TYPICAL DAY FOR ME INVOLVES:Respond to cyber-security threats, vulnerabilities, events and incidentsAct as technical contributor during major security incidentsContribute to improvement in the team's capability, including:Mitigation strategies, including proactive planning, new controls, optimising existing controlsParticipate and contribute to the planning and executing of purple teaming activitiesMeet team operational metricsMaintain an up-to-date knowledge of cyber threatsDrive continuous learning and knowledge sharing within the teamAs required, support internal stakeholders and projectsWe are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.
Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.
#J-18808-Ljbffr
Built at: 2025-05-19T02:02:23.426Z