DE Jobs

Search from over 2 Million Available Jobs, No Extra Steps, No Extra Forms, Just DirectEmployers

Job Information

CYOS Solutions Cyber Security Engineer in Remote, Australia

Application closing date: Monday, 15 July 2024 • 11:59pm, Canberra time (in Canberra)

Estimated start date: Thursday, 01 August 2024

Location of work: ACT

Working arrangements: Working from home arrangements are according to a team roster and a minimum of 5 days per fortnight in Services Australia's Canberra office is required.

Length of contract: 12 Months

Contract extensions: 2 x 12 months

Security clearance: Must have Negative Vetting Level 1

Rates: $130 - $160 per hour (inc. super)

Cyber Threat Detection (CTD) Security Information and Event Management (SIEM) Specialist is required to perform a leadership role while exercising a considerable degree of technical skill and independence pertaining to the monitoring and response function of Services Australia Cyber Security.

The primary focus of the CTD SIEM Spec8ialist is to lead a multi-disciplinary team to develop and implement detection methods to identify, monitor, respond, protect against malicious cyber events targeting Services Australia and shared service agency networks.

This role requires in-depth knowledge of cyber security fundamentals to accurately determine impact and relevance of emerging and existing threats to operating environments. The CTD SIEM Specialist will draw upon their knowledge of detection methodologies and technologies, attack vectors, vulnerability management principles, network security, security engineering principles, information systems control design and control monitoring.

Key duties may include, but are not limited to:

  • Threat Detection development inclusive of reviewing and approving detection use cases, response playbook development and implementation of detection use cases.

  • Provide technical or strategic advice on complex issues related to detection technologies.

  • Coordinate the accurate and appropriate referral and subsequent tuning of detection use cases.

  • Review and contribute to process documentation including providing input into the development of processes and ensuring documentation created by the shift aligns with outcomes and goals of the process.

  • Provide timely, relevant and accurate information to the Director Cyber Threat Detection where business impacts of events and decisions are sensitive, including but not limited to:

  • Wide ranging impacts. Events affecting senior executives or other agencies.

  • Confidentiality, integrity and availability are impacted.

  • Provide technical guidance and support to Cyber Security Operations staff while overseeing Cyber Threat Detection roles.

  • Prioritise tasks and duties in accordance with direction from Cyber Security Divisional teams considering risk, urgency and impact using independent judgement.

  • Provide expert advice and assistance to team members performing technical work.

Primary Technologies required for role include:

  • IBM QRadar, Splunk, Elastic, Sentinel Services.

Essential Criteria

  • Proficiency in managing SIEM platforms - QRadar, Splunk and Elastic.

  • Knowledge of network architecture concepts including topology, protocols, components, and principles.

    Desirable Criteria

  • Experience in developing SIEM use cases and/or rules.

  • Experience in SIEM administration.

  • Understanding of the requirements of network security monitoring.

  • Must possess strong verbal and written communication skills.

  • Strong stakeholder engagement skills.

  • Understanding of Windows and Unix/Linux logging.

  • Familiarity with the MITRE ATT&CK Framework.

DirectEmployers