Lead Security Engineer (Security Operations) Melbourne $190k+ package Threat-centric approach to critical infrastructure. Work of things that have never been done before! A recent project was for one of the world's largest batteries. We need someone who can implement controls but also understands the “why” behind each one. You should be able to ask, “What threat are we mitigating? How does this control support the overall security strategy?” What You’ll Be Doing: • Policy Management: Oversee and manage security policies to ensure alignment with security objectives. • Strategic Alignment: Understand the intent behind security strategies and translate them into actionable controls. • Threat-Centric Implementation: Implement controls that focus on mitigating specific threats and techniques. • SIEM Development: Build and enhance SIEM capabilities for more effective monitoring and analytics. • Control Implementation: Build and optimize: • Endpoint Security • Email Security • Network Security • Identity and Access Management (IAM) Sound fun? Australian Citizen? Send me a DM
Ricki Burke’s Post
More Relevant Posts
-
jobs.fhtcareers.com Apply Now Senior Cyber Incident Response Engineer Remote - Baylor Scott & White Health - Remote jobs.fhtcareers.com APPLY NOW! #cyber #cyberjobs #cybersecurityjobs #cloudsecurity #pentesting #cybersecurityexperts #cybersecuritynews #cybersecurityexpert
To view or add a comment, sign in
-
Hello Connections, There is an Urgent Requirement on IT Security Operations with one of our client. Role: IT Security Operations Location: 3 Days per week onsite 2 days remote Experience: 4-6 years Note: Locals preferred only on W2. One of 3 shifts a day in a 24/7 operation (*consultant needs to be flexible enough to fill any of the 3 shifts as needed): Shift 1 = 12am – 8:30am Shift 2 = 8am – 4:30pm Shift 3 = 3:30pm – 12am Please see attached CMP form send me scan copy with signature along with DL copy Summary Of the Function/Role: The IT Cyber Security Operations Monitoring Team is seeking consultants to perform Tier 2 SOC follow-up and remediation activity on escalated incidents. The Tier 2 level Analyst (Senior Analyst) should have the ability to respond to a wide range of escalated Incidents and follow through with incident lifecycle through completion. Some of the areas we are looking for candidates to have experience in include but are not limited to: Critical Key requirements: • Critical Thinker & Analytical Aptitude • SIEM Experience (Splunk) • Tier II SOC Incident Handling & Investigation • 24/7 Security Operation Center Experience • Threat Detection & Response Experience • Threat Detection Technologies Experience RISKS (required by MTA Risk Management): • All work when On MTA premises will be desk work only performed within the Cyber Security Operation Center (CSOC) Environment. Qualifications Experience & Education: • Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations. • Organizational, decision making, and communications skills. • Knowledge of network security operations with a solid understanding of the technology and attention to detail. • Creative problem-solving abilities, coupled with a desire to take on responsibility. • Strong team player with the ability to engage and promote a cohesive unit. • Ability to handle multiple tasks in a fast-paced environment and prioritize highly varied work in order to maintain required productivity levels. • Ability to communicate technical' info and ideas so others will understand. • Ability to make appropriate decisions considering the relative costs and benefits of potential actions. • Ability to apply collaborative skills and traits that create solutions and results to unexpected situations. • Bachelor’s degree in Computer Science, Cyber Security, Information Technology or related discipline OR a satisfactory equivalent with 4-6 years of Information Technology experience. Interested please share resumes to [email protected]
To view or add a comment, sign in
-
Greetings from Soft_AI, We have the following urgent requirement,please share your resume on [email protected] urgently if you are fine with JD.. JD : *PLEASE NOTE THIS POSITION WILL ALLOW CONSULTANT TO WORK REMOTELY. HOWEVER, DUTIES WILL REQUIRE CONSULTANT TO WORK ONSITE 3 DAYS PER WEEK. THEREFORE, WILL BE CRITICAL FOR THE CONSULTANT TO BE LOCAL TO NYC AND ABLE TO TRAVEL TO OUR OFFICE WITHOUT ISSUE, AS NEEDED (AT THEIR OWN EXPENSE). One of 3 shifts a day in a 24/7 operation (*consultant needs to be flexible enough to fill any of the 3 shifts as needed): Shift 1 = 12am – 8:30am Shift 2 = 8am – 4:30pm Shift 3 = 3:30pm – 12am SUMMARY OF THE FUNCTION/ROLE: The IT Cyber Security Operations Monitoring Team is seeking consultants to perform Tier 2 SOC follow-up and remediation activity on escalated incidents. The Tier 2 level Analyst (Senior Analyst) should have the ability to respond to a wide range of escalated Incidents and follow through with incident lifecycle through completion. Some of the areas we are looking for candidates to have experience in include but are not limited to: Critical Key requirements: * Critical Thinker & Analytical Aptitude * SIEM Experience (Splunk) * Tier II SOC Incident Handling & Investigation * 24/7 Security Operation Center Experience * Threat Detection & Response Experience * Threat Detection Technologies Experience QUALIFICATIONS EXPERIENCE & EDUCATION: * Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations. * Organizational, decision making, and communications skills. * Knowledge of network security operations with a solid understanding of the technology and attention to detail. * Creative problem-solving abilities, coupled with a desire to take on responsibility. * Strong team player with the ability to engage and promote a cohesive unit. * Ability to handle multiple tasks in a fast-paced environment and prioritize highly varied work in order to maintain required productivity levels. * Ability to communicate technical' info and ideas so others will understand. * Ability to make appropriate decisions considering the relative costs and benefits of potential actions. * Ability to apply collaborative skills and traits that create solutions and results to unexpected situations. * Bachelor’s degree in Computer Science, Cyber Security, Information Technology or related discipline OR a satisfactory equivalent with 4-6 years of Information Technology experience.Additional Skills and Information:Security Event Monitoring, Network Event monitoring, Email Header Analysis, Packet Capture inspection, Malware Triage & Analysis, SIEM (Splunk) & TIP Experience
To view or add a comment, sign in
-
#hiring Cyber Systems Engineer, Washington, United States, $234K, fulltime #jobs #jobseekers #careers $234K #Washingtonjobs #DistrictofColumbiajobs #ITCommunications Apply: https://lnkd.in/gmw6s4cb About PeratonPeraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure.ResponsibilitiesMonitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision. Assists with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations' continuous monitoring and ongoing authorization programs. Establishes a framework by which cyber risk can be measured and quantified in the marketplace. Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation. Verifies security systems by developing and implementing test scripts. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Responsible for the design, development, implementation, and integration of a DoD IA architectures, systems, or system components for use within computing, network, and enclave environments. Ensures that the architecture and design of development and operational systems are functional and secure. This includes designs for program of record systems and special purpose processing nodes with platform IT interconnectivity.• Designs and develops new systems, applications, and solutions for enterprise-wide cyber systems and networks.• Ensures system security needs established and maintained for operations development, security requirement
https://www.jobsrmine.com/us/district-of-columbia/washington/cyber-systems-engineer/468297950
To view or add a comment, sign in
-
ShieldX Security UK base information security company looking to hire 𝐒𝐞𝐧𝐢𝐨𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐩𝐞𝐫𝐚𝐭𝐢𝐨𝐧 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐉𝐨𝐛 𝐃𝐞𝐬𝐜𝐫𝐢𝐩𝐭𝐢𝐨𝐧: The SOC Analyst Level 3 / Sr, SOC Analyst is a senior position within the Security Operations Center (SOC) responsible for advanced threat detection, incident response, and the development and optimization of SIEM (Security Information and Event Management) systems. 𝐊𝐞𝐲 𝐑𝐞𝐬𝐩𝐨𝐧𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐢𝐞𝐬: 𝐀𝐝𝐯𝐚𝐧𝐜𝐞𝐝 𝐓𝐡𝐫𝐞𝐚𝐭 𝐃𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬: Monitor and analyze security events and alerts from SIEM and other security tools.Conduct in-depth analysis of security incidents to determine root cause, scope, and impact. Perform threat hunting to identify and mitigate potential security risks. SIEM Development and Optimization: Develop, configure, and maintain SIEM systems to ensure effective and efficient threat detection. 𝐈𝐧𝐜𝐢𝐝𝐞𝐧𝐭 𝐑𝐞𝐬𝐩𝐨𝐧𝐬𝐞: Lead and coordinate responses to complex security incidents, including containment, eradication, and recovery.Develop and execute incident response plans and playbooks.Conduct post-incident analysis to identify gaps and recommend improvements. 𝐏𝐫𝐨𝐚𝐜𝐭𝐢𝐯𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐌𝐞𝐚𝐬𝐮𝐫𝐞𝐬: Perform vulnerability assessments and penetration testing to identify weaknesses.Implement and manage advanced security controls and technologies.Conduct regular security assessments to ensure compliance with policies and standards. 𝐌𝐞𝐧𝐭𝐨𝐫𝐬𝐡𝐢𝐩 𝐚𝐧𝐝 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠: Mentor and train junior SOC analysts on cybersecurity and SIEM best practices.Develop and deliver training sessions on advanced cybersecurity topics. 𝐂𝐨𝐥𝐥𝐚𝐛𝐨𝐫𝐚𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧: Work closely with IT and security teams to ensure coordinated responses to incidents.Communicate complex security issues and recommendations to non-technical stakeholders.Develop and maintain documentation, including incident reports, SOPs, and threat intelligence reports. Continuous Improvement: Stay current with cybersecurity trends, threats, and technologies.Participate in industry forums, conferences, and training sessions.Recommend and implement enhancements to SOC capabilities and processes. 𝐐𝐮𝐚𝐥𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬: Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).At least 5-7 years of experience in a SOC or Cybersecurity role, with at least 3-4 years in a senior position. Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent.Proficiency in SIEM tools (e.g., Splunk, ArcSight, QRadar) and security technologies.Strong knowledge of Cybersecurity frameworks and standards (e.g., NIST, ISO 27001).Experience with scripting and automation (e.g., Python, PowerShell) is a plus. Job Timing & Location Job Time: Night Shift Location : Lahore Interested share resume [email protected]
To view or add a comment, sign in
-
Attention "Cyber Security Analyst " We are hiring for an Remote Contract in Harrisburg, PA #Local Candidates only! Demonstrates good judgement and problem-solving skills. Reacts and adapts to changing circumstances rapidly. Technically proficient and experienced with Windows and Unix/Linux operating systems, enterprise class firewalls, network security, network traffic analysis, incident response, vulnerability analysis, packet analysis, and systems hardening. Possesses proficient knowledge of layer2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, PGP, VLAN,LLDP, LACP, ARP, 802.1x, DNS, AES, etc. Assists in deterring, identifying, monitoring, investigating and analyzing network intrusions. Collects intrusion artifacts, indicators of compromise, correlates artifacts across systems, and gathers other relevant facts to enable mitigation of potential incidents within the enterprise. Receives and analyzes network alerts from various sources within the enterprise. Determines the alert trigger, the severity of the alert, and prioritizes response accordingly. Track and document incidents from initial detection to final resolution. Participates in the containment and neutralization of cyber threats based on the intelligence and indicators of compromise gathered. Assesses damage to services, systems, networks, data and other relevant assets. Participates in the restoration and reconstitution of systems and services. Makes recommendations to prevent the recurrence of cyber incidents and verifies that normal operations have resumed. Manages, monitors, and analyzes several security technologies to include defensive and offensive security solutions on the perimeter and internal networks such as firewalls, intrusion detection/prevention systems (IDS/IPS),data loss prevention, etc. Uses data from Security Information and Event Management (SIEM) and other logging solutions to conduct analysis, identify cyber trends, disseminate relevant findings, and recommend suitable security and/or compensating controls. Participates in the design and implementation of security controls. Grants and revokes access to restricted resources, ensures that end-users are authorized to access requested resources, and participates in periodic system audits/cleanup initiatives. #Cybersecurity #securityanalyst #socanalyst #contract #Pennsylvania #newjob #remote #C2C #W2
To view or add a comment, sign in
-
North Korean Hacker Infiltrates US Security Firm! 🚨 🔍 What Happened? A North Korean hacker posing as a remote software engineer infiltrated KnowBe4, a US-based security training company. 🕵️♂️💻 🔐 How? The hacker successfully passed all interviews and background checks, but malware was detected on their company-issued Mac, triggering an FBI investigation. 🖥️🐍🔍 💡 Why It Matters: This incident underscores the escalating threat of state-sponsored cyberattacks and the critical need for robust vetting processes and ongoing security monitoring. 🚨🌐🔒 📌 Key Takeaways: ⚡ Sophisticated Attack: The hacker employed AI-edited images and manipulated session files to circumvent security measures. 🤖📸📂 ⚡ Swift Response: KnowBe4 promptly contained the threat, preventing further damage. 🛡️🚀🛠️ ⚡ Industry Wake-up Call: Companies are urged to strengthen vetting procedures, conduct video interviews, and enhance background checks. 🏢🔍🎥🗂️ Wonder if this happened due to a cost-cutting measure? any thoughts? 🤔💭 #BusinessContinuity #CSuite #Cyberattack #CyberEspionage #Cybersecurity #DataBreach #DataProtection #DigitalTransformation #EmergingThreats #ExecutiveLeadership #GlobalSecurity #InformationSecurity #Infosec #IncidentResponse #ITSecurity #NationStateHacking #RiskManagement #SecurityAwareness #SupplyChainSecurity #TechIndustry #TechNews #ThreatIntelligence #ZeroTrust
North Korean Hacker Poses as Remote IT Worker to Infiltrate US Security Firm
msn.com
To view or add a comment, sign in
-
SOC Analyst Level 1 (L1) Roles and Responsibilities Primary Focus: Monitor networks and systems for security breaches, typically using Security Information and Event Management (SIEM) tools. Alert Handling: They are the first to respond to cybersecurity alerts. Their job is to identify whether an alert signals a real threat or is a false positive. Initial Assessment: Perform a basic threat analysis and escalate it to Level 2 analysts for further investigation if necessary. Reporting Incidents: Document incidents and basic details for further analysis. Incident Logging: Keep records of security incidents and threats. Skills Required ✓ Basic understanding of network security and protocols. ✓ Familiarity with common cybersecurity threats and attack methodologies. ✓ Ability to operate security monitoring tools. SOC Analyst Level 2 (L2) Roles and Responsibilities In-depth Analysis: They receive escalated incidents from L1 analysts and perform a deeper analysis. Incident Validation: Validate and prioritize the incidents. Incident Handling: Begin initial response actions, like isolating the affected system or blocking malicious traffic. Communication: Coordinate with other teams for incident response, such as network or IT support teams. Mentoring: May provide guidance and mentorship to L1 analysts. Skills Required ✓ More advanced analytical skills to distinguish between false positives and genuine threats. ✓ Proficiency in using a broader range of security tools and technologies. ✓ Stronger understanding of the IT infrastructure and cybersecurity landscape. SOC Analyst Level 3 (L3) and higher Roles and Responsibilities Advanced Incident Response: Handle the most complex incidents that require deep understanding and analysis. Threat Hunting: Proactively search for undetected threats within the organization. Strategy and Development: Contribute to the development of security processes and procedures. Tool Customization and Development: Customize security tools and develop scripts to automate specific threat detection and response aspects. Leadership: Often served as the team leader or technical supervisor, guiding L1 and L2 analysts. Skills Required ✓ Expert-level knowledge in network security and various attack vectors. ✓ Experience with advanced security solutions and forensic tools. ✓ Possess robust problem-solving skills and the capability to make rapid decisions under high-stress conditions.
To view or add a comment, sign in
-
Acknowledging the Recent Cyber Attacks: Protect Your Company Now! 🚨 In light of the recent cyberattacks affecting businesses across California, it’s more important than ever to ensure your company is protected. I represent top-tier professionals who specialize in safeguarding your organization’s digital infrastructure. Here are some key positions and the essential skills they bring: ▪ Cybersecurity Analyst: Threat detection, vulnerability assessment, incident response. ▪ Information Security Manager: Security policies development, risk management, compliance. ▪ Network Security Engineer: Secure network architectures, intrusion detection systems, firewall management. ▪ IT Security Consultant: Security audits, risk assessments, strategic security advice. ▪ Security Software Developer: Security applications development, security protocols integration, vulnerability prevention. Let’s work together to fortify your defenses and keep your business safe. Reach out to me to connect with these experts and ensure your company is well-protected against cyber threats. 📩 [email protected] #CyberSecurity #Hiring #ITSecurity #Recruitment #CyberAttacks #SecurityJobs #InformationSecurity #NetworkSecurity #TechRecruitment
To view or add a comment, sign in
-
We have below immediate open positions, please reach us [email protected]. Positions # 1 Security Operations Engineer - Remote Local to Texas Looking for a Security Operations Engineer who will work to protect enterprise systems and information by promptly responding to security threats and incidents. Act as subject matter expert to provide insight and guidance on implementing or modifying preventative security measures. Work with various internal teams to identify gaps and expand endpoint, logging, and network tooling coverage to improve monitoring and response capabilities. Perform static and dynamic analysis on suspicious files or URLs to aid in the detection and mitigation of potential threats. Responsibilities · Manage Endpoint Detection and Response (EDR) platform(s). · Coordinate and execute cutover to production following proper change management processes. · Participate and lead critical areas in the security incident response and investigation processes. · Develop comprehensive and accurate reports and presentations for technical and executive audiences. · Effectively communicate findings and strategy to stakeholders, including technical staff, executive leadership, and legal counsel. · Perform root cause analysis and provide recommendations that will mitigate potential impact. · Develop scripts, tools, or methodologies to enhance ABM's red teaming/penetration testing processes. · Maintains the integrity and security of enterprise-wide IT systems and networks. · Supports security initiatives through both predictive and reactive analysis. · Drives and implements strategic-level security initiatives. · Manages vendors and other interdependencies to streamline security processes. · Communicates and escalates complex security issues as required. · Assists in the optimization of enterprise-wide security efforts. · Coordinates resources during enterprise incident response efforts and drives incidents to timely and complete resolution. · Consistently delivers tasks in support of IT strategies, projects, and initiatives. • Leverages readily available resources to create cost-effective security solutions. • Ensures full network coverage and accurate reporting on all security tools. • Identifies, evaluates, and reports security vulnerabilities to prioritize mitigating potential threats and minimize the overall attack surface. • Research emerging cyber security threats and apply necessary countermeasures to maintain a proactive security posture.
To view or add a comment, sign in