Senior Cyber Security Engineer

Location Sydney CBD
Discipline Cyber Security, Governance, Risk & Compliance
Job reference 175298
Salary AU$120.00 - AU$130.00 per hour

The Role

Senior Cyber Security Engineer
Our client believes technology should help you achieve more. And they help businesses do exactly that almost daily -co-creating innovative connected products, rapidly and securely deploying apps in the cloud, managing employee-owned devices on a global scale, and deflecting sophisticated attacks. To support their Cyber Security and the provisioning of Advanced Security Operations Centre (ASOC/Managed SIEM) services, they are looking for a Senior Cyber Analyst (SIEM) Engineer experienced in Splunk and Microsoft Sentinel.


This role will work closely with technical customer teams, vendors and SOC engineering teams.
The Senior Cyber Analyst will be fully or partially dedicated resources assigned to a customer for the Managed SIEM service. They will work through daily action items, respond to customer requests, and fulfill priority items. In addition, they will deliver consistent results and outputs, adopt refined methodologies and procedures to better align with the customer, and execute tuning instructions in regards to the ever-evolving threat landscape.

Key Responsibilities

  • Tune the SIEM tool (Splunk and MS Sentinel) security policy with use cases, threat libraries, and watch list details for better threat detection and threat recognition;
  • Work directly with customers to understand their application and log onboarding requirements. Facilitate discussions and offer leadership and guidance in meeting best practice for their organisation. Incorporate and consider asset landscape, severity ranking, and business impact details into log ingestion requirements and use case development;
  • Passive threat analysis and incident investigation;
  • Develop guidance on mitigation strategies and defense techniques relative to trends and events in the global threat landscape;
  • Assist security staff with incident management, security strategy, and publication of security intelligence;
  • Facilitating information exchange amongst Verizon, the customer, and the customer's third parties (if applicable) during an incident;
  • Provide assistance with proactive services that help with prepare,recognize, and respond in anticipation to a specific attack or known attack patterns:
    • Applying lessons learned from past incidents to improve the customer's CERT basic processes and practices;
    • Provide regular feedback on day-to-day incident management and response;
    • Help develop and maintain processes and methodologies in preparation for specific and probable threats;
    • Trigger the customer's Investigative Response Retainer (if applicable).
  • After proper remediation or containment, close the incident and provide root cause analysis, lessons learned, and additional recommendations on how to prevent a similar incident;
  • Monitor the global threat and vulnerability landscape. Participate in client's weekly intelligence calls and intelligence summary reports.

Skills/Experience

  • Bachelor's degree in Computer Science or related field is preferable, plus at least 5 years' experience in a dedicated security position
  • Strong communication skills and ability to engage with customers at both technical and executive levels
  • Clear and concise written and oral English, including the ability to product professional-level documentation
  • Strong problem-solving and security analytics skills; able to identify gaps in processes and recommend improvements for mitigation
  • Strong leadership skills and a proactive approach to customer issues
  • Ability to excel in high pressure environments
  • Strong Splunk AND Microsoft Sentinel (Azure Security) analytics and configuration skills.
  • SANS or other Security certifications is desirable, such as GCIA, GCIH, GREM, GPEN, CEH.
  • Knowledge or exposure to Cyber Security Frameworks such as NIST, ISO27001, Essential Eight etc.
  • CISSP Certification and / or CISM Certification desirable
  • ITIL Foundations training / certification desirable
  • Significant experience in Security Operation Centre (SOC) processes
  • Experience of how to structure and operate an efficient Incident Response process

If this sounds you, APPLY NOW and reach out for more information.

Madhuri Mhanta
Key Accounts Consultant
Let's Connect
https://www.linkedin.com/in/madhuri-mhanta-5a4a7a17
+ 61 386 334 112

ManpowerGroup is committed to being a Diversity Confident Recruiter and encourages applications from people from a diverse range of backgrounds, including people with a disability. Please indicate your preferred method of communication in your resume and please let us know if you require any reasonable adjustments should you be contacted for an interview.

Aboriginal and Torres Strait Islander people are encouraged to apply.

By submitting your resume and other personal information with this application you are consenting to this information being collected in line with our privacy policy. Follow the link to learn more - www.manpowergroup.com.au/privacy-policy

State: QLD, licensee/s Manpower Services (Australia) Pty Ltd, LHL-02026-D5L4Q. State: QLD, LHL-02014-Y5F6D. State: SA, licensee/s Manpower Services (Australia) Pty Ltd, LHS 288856