Position: Cyber Security Technologist
Type: Full Time (40h/week)
Company: ThreatDefence
Salary Range: 115k-130k AUD (Based on skillset)
- Master’s or bachelor’s degree in relevant Engineering or Information and Cybersecurity
- 3-5+ years of relevant experience with cyber technologies
- Serve as the technical lead between clients, partners, and our internal teams at ThreatDefence.
- Extensive experience with different SIEM, EDR, Firewalls, Vulnerability Management, Email Security, Azure, and O365 security including MS Defender and EDR.
- Collaborate with our Sales team to identify client needs, implement effective sales strategies, and communicate deployment proposals.
- You will bring demonstrated hands-on cyber operations experience in managing cyber incidents, threat intel & vulnerability management, and the implementation of security technologies.
- Passion for staying updated with the latest cybersecurity trends and a willingness to continuously develop your skillset.
- Establish yourself as a trusted advisor and technical authority to clients, from technical staff to C-suite executives.
- Plan and design client-specific deployment strategies and architectures in varying coverage areas.
- Conduct Proof of Value demonstrations of ThreatDefence technology, where appropriate, support opportunities
- You are highly organized, with the ability to attend to time-sensitive issues as a priority
- You will be a problem solver who can work to mature our current monitoring activities. Identifying solutions is second nature to you and you thrive in a dynamic, fast-moving environment.
- Assist with the implementation of Metcash's Cyber Security Strategy and use of the latest technologies associated with a roadmap
- Proactive in analytical and research tasks
- Extensive experience in the design and implementation of cyber threat detection
- Research and investigate attack techniques and recommend ways to defend against them
- Work from a given design requirement to design, build, and test digital networks
- Prevent security breaches using a variety of tools techniques and processes.
- Integrate and correlate information from a variety of sources and form an informed judgment on whether an indicator constitutes a likely security incident, breach or intrusion.
- Strong knowledge in both on-premises and cloud networking and technologies. Familiarity with full cybersecurity stack and attack methodologies preferred.
- Candidates will be given preference who have extensive experience with Microsoft, SentinelOne, AWS, TrendMicro, CrowdStrike, Elastic technologies
Certifications:
- CISM preferred
- eCIR/eTHP
- CEH/OSCP
- ComTIA Security+ / CompTIA Cybersecurity Analyst (CySA+)