Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Systems Engineer - Level 2

About Invotec: Invotec, based in Melbourne, is a leading IT company dedicated to delivering exceptional service across Australia.  We specialize in innovativ...


Invotec Pty Ltd - Victoria

Published 5 days ago

Fp&A Analyst

ABOUT OUR CLIENT Our client is an industry leader who is seeking a skilled and strategic Financial Planning & Analysis (FP&A) Manager to join its finance t...


Victoria

Published 5 days ago

Manager Of Hospitality & Catering | Chef Background Essential

Manager of Hospitality & Catering | Chef background essential$90k - $100k p.a. + Super + Salary Packaging Manager of Hospitality & Catering | Aged Care NSW/V...


Southcare Inc - Victoria

Published 5 days ago

Sap Payroll Consultant

We are seeking a skilled SAP Payroll Consultant to join our team. You will be responsible for implementing and maintaining SAP Payroll solutions for our clie...


Zone It Solutions - Victoria

Published 5 days ago

Senior Consultant - Security Operations Analyst - Level 3 - Cyber Security

Details of the offer

Location: MelbourneRequisition ID: 1545597What if your most rewarding experiences couldn't be captured by a resume?At EY we believe that whoever you are, your uniqueness helps us stand apart.We bring together extraordinary people, like you, to build a better working world.What's in it for you?As a Level 3 Security Analyst, you will play a vital role in protecting our clients from cyber threats. You will operate with a high degree of autonomy in both incident response and threat hunting and be a key influencer in strategic cybersecurity decisions. As a senior analyst in any SOC, you will co-ordinate incident response on a day-to-day basis, lead continuous improvement in L1 and L2 triage processes and perform threat analysis that will lead to better detection capability for our services.Key ResponsibilitiesDevelop a strong understanding of incident response frameworks and best practices.Lead the investigation and response to security incidents, leveraging advanced technical skills and threat intelligence.Triage security alerts, perform in-depth analysis to determine root cause and impact, and develop effective containment and remediation strategies.Collaborate with cross-functional teams to coordinate incident response activities and ensure timely communication.Act as the primary point of contact for incident escalations from Tier 1/2 analysts.Perform advanced triage, including deep-dive analysis of security events and logs to determine incident severity, scope, and potential impact.Lead incident response efforts, coordinating activities across various teams to contain, investigate, and remediate security breaches.Develop and execute incident response plans, ensuring proper communication and documentation throughout the incident lifecycle.Investigate potential threats identified through security alerts, anomalies, or intelligence reports.Conduct independent research and analysis to identify potential attack vectors and vulnerabilities.Utilize threat intelligence and attack frameworks (e.g., MITRE ATT&CK) to create realistic attack scenarios.Translate threat intelligence into actionable detection and hunting strategies.Utilize SIEM (Security Information and Event Management) and other security tools to identify and analyze potential threats.Develop and fine-tune security rules and correlation logic to improve threat detection capabilities.Maintain detailed documentation of security incidents, investigations, and response actions.Provide guidance and mentorship to junior SOC analysts.Assist in developing and delivering security awareness training programs.What we're looking forBachelor's degree in Computer Science, Information Security, or a related field.Minimum 5-7 years of experience in a SOC or security analyst role.Proven track record of successfully identifying, analyzing, and responding to security incidents.Strong background in formulation and execution of threat hunt scenarios and the development of subsequent use cases to uplift detection capability.Relevant industry certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or CompTIA Security+ are highly desirable.In-depth knowledge of Sentinel, MS Defender, other Threat centric tools, IDS/IPS, email security, vulnerability scanners and other security technologies.Apply now… we're over 9,000 perspectives in Australia and we're ready to welcome yours.Diversity, equity, and inclusiveness (DE&I) are core to who we are, how we work and how we live our values. We hold a collective commitment to continue to drive an environment where all differences are valued, practices are equitable, and everyone experiences a sense of belonging — where people are inspired to team and lead inclusively in their interactions every day.The exceptional EY experience. It's yours to build.#LI-HybridEY | Building a better working world
#J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Whatjobs_Ppc

Requirements

Built at: 2024-11-18T14:52:03.169Z