Are you passionate about cybersecurity?
Do you have a strong attention to detail and proven track-record of delivering results?
We are looking for a motivated cybersecurity Security Engineer/ Incident Response team member to join our Security Operations team, who lives and breathes cybersecurity and customer satisfaction.
You will work with a team of experts to deliver exemplary internal and external services by using your strong documentation skills, ability to collaborate with others, and determination and drive for constant improvement.
You will be performing security monitoring, security and data/log analysis and forensic analysis, to detect security incidents, and incident response.
You will also investigate and utilise new technologies and processes to enhance security capabilities and implement improvements.
Key responsibilities Monitor Red Piranha and its clients' networks, computers and applicationsAnalyse, contain and eradicate security threats, ensuring swift resolution for clientsPre-sales support, scoping, report writing and presentation to clientsWork with external parties (IT teams) to plan and remediate findingsWatch for events and traffic indicators that signal intrusionsDetermine and identify the damage caused by detected intrusions and how it occurredRecommend safeguards against similar intrusionsPerform security research with Red Piranha intelligence systems and malware systemsDevelopment of cybersecurity tools and technologies About you Ability to demonstrate technical knowledgeUnderstanding of systems administration, networking and risk/compliance.Ability to work as a part of a team or autonomouslyGood written and verbal communication skillsStrong customer service and problem-solving skillsHave a passion for information security and have a desire to be key player in developing Australia's first Extended Detection and Response platform and servicesExperience in network and security implementation and/or operationsGood awareness of security and risk management and their implications for technical solutionsKnowledge in IDS/IPS and firewallsWide knowledge and experience in using security tools used in offensive and defensive infrastructuresStrong understanding of exploits, malware and digital forensicsKnowledge of different log technologies, sources and transport methodsAbility to communicate security issues to peers and managementMinimum of two years' experience as a SOC/NOC Analyst or similarExperience with SOC and CTI platforms such as The Hive, Cortex, Cuckoo Sandbox Clearance Requirements Ability to obtain and maintain an Australian Police ClearanceMust have full Australian working rights. #J-18808-Ljbffr