Title: Senior Cyber Security Analyst (Malware and Incident Response Expert)
Length: Permanent working on a Hybrid model.
Location: Sydney
Salary: $200k - $220k + Super
The GIS Team
The Global Information Security (GIS) team is responsible for safeguarding information systems, confidential data, and customer information across the banking and finance industry.
Within GIS, the Cyber Threat Defence (CTD) team manages a comprehensive security approach to oversee and enhance all security controls within the organisation.
The CTD Malware Defence Team
The CTD Malware Defence team works to minimise risk through advanced malicious code detection and containment activities, ensuring business continuity, data confidentiality, and information security.
This team operates globally with a 24/7, follow-the-sun model, with locations across APAC, EMEA, and AMRS.
The Role: Malware Analysis
The Malware Analysis position focuses on incident response, with an emphasis on malware analysis.
Please note, this is a senior Cyber Security lead role.
While it does not involve direct reports, you will be responsible for leading the Malware and Incident Response for the 'Follow the Sun' project in Australia.
Key Responsibilities Include: Performing static and dynamic malware analysis to extract IoCs and classify malware types.
Proactively responding to threat actor activities to mitigate potential risks.
Conducting detailed analysis of malware alerts and events.
Reverse-engineering recent malware and delivering in-depth reports.
Undertaking both disk-based and memory-based system analysis.
Improving risk management strategies and incident response tactics.
Monitoring and analysing security logs and establishing detection rules.
Conducting initial triage of incidents and developing escalation and contingency protocols.
Your Background
This role requires direct experience in malware analysis within the banking and finance industry, critical infrastructure, or technology sectors.
Ideal qualifications include:
Strong understanding of malware dynamic/static analysis.
Background in malware-related network traffic analysis.
Proficiency in reverse-engineering techniques, particularly encryption and obfuscation.
Experience tracking malware trends, infrastructure, and threat actor campaigns.
Relevant certifications like GCIH, GREM, GCFA, CISSP, or CCSP.
Knowledge of networking protocols (TCP/IP, HTTP/HTTPS, FTP, etc.)
and cloud services (AWS, GCP, Azure).
Strong communication skills to tailor information for various audiences.
Ability to create scripts and automation for analysis and response.
If you would like more information on this role, please contact Sarah Brown at #J-18808-Ljbffr