27 Cybersecurity jobs in Australia

Triton Cybersecurity GRC Lead

Edinburgh, South Australia Northrop Grumman

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

AUSTRALIAN CITIZENSHIP REQUIRED FOR THIS POSITION: Yes
RELOCATION ASSISTANCE: No relocation assistance available
CLEARANCE TYPE: AU-Top Secret (NV2)
TRAVEL: Yes, 10% of the Time
**Description**
As the Triton Cybersecurity GRC Lead, you'll maintain, support, and enhance the cybersecurity program for Northrop Grumman's MQ-4C Triton. You will work closely with engineering, configuration, and data management teams to manage security risks and maintain system Authorisation to Operate (ATO) through governance, risk, and compliance processes.
+ Perform systems security risk management, including identifying threats, analysing exposure, and recommending treatment options.
+ Maintain accurate asset inventories for all hardware and software configuration items.
+ Evaluate system changes for cybersecurity impact and update affected security authorisation artefacts.
+ Support Assessment and Authorisation activities to gain and maintain system ATO.
+ Develop and maintain key security documentation such as SSP, SRMP, PoAM, and ISSR.
+ Conduct user privilege audits to enforce the principle of least privilege.
**About You:**
You're a detail-oriented cybersecurity practitioner with strong governance, risk, and compliance skills, with experience in a high-security environment. You can communicate technical concepts to non-technical stakeholders, and you bring a ris-based approach to safeguarding systems.
+ Must hold an NV1 security clearance (with ability to upgrade to PV).
+ Qualifications or certification in Systems Security Engineering or a cybersecurity-related field (e.g. CISSP or similar)
+ Experience in security risk management and applying frameworks such as ISM, PSPF, and DSPF.
+ Understanding of Defence Assessment and Authorisation processes.
+ Desirable: Experience in vulnerability management tools, Windows and Linux cybersecurity, OT environments, and developing/reviewing security processes and procedures
**What we Offer:**
We have built our benefits to help you define your possible.
+ 18 weeks paid parental leave
+ Flexible Working Options including - Hybrid Working, 9-day Fortnights, Volunteer leave, Varying start and Finish times to suit your family needs.
+ 2 Weeks Paid Reservist leave
+ Health, Wellbeing and Generous Employee discount programs
+ Additional purchased annual and salary packaging option
+ Ongoing career progression opportunities- leadership development, education support, ongoing career growth through internal movement
**Who we are:**
At Northrop Grumman Australia, we have been defining possible for the ADF for over 20 years. Our commitment to safeguarding Australia's future by delivering pioneering technology is only matched by our commitment to building a great place to work and supporting each other.
**Everyone Matters:**
Wherever you are in your career, we have a range of policies and initiatives in place to help you define possible based on your individual needs. A variety of initiatives support STEM education, veterans, communities and the environment. And our thriving Employee Resource Groups also enable our people to share common interest in such areas as veterans, gender and young professionals.
What's Your Possible?
**_As a Defence security clearance is required for this role, you must be an Australian Citizen. International Traffic in Arms Regulations (ITAR) are applicable, as such your nationality may be a factor in determining your suitability for this role. You will also need to satisfy police checks and employment screening verification_**
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer - Defence Sector

Canberra, Australian Capital Territory KBR

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Title:
Cybersecurity Engineer - Defence Sector
Your KBR future - delivering solutions and changing the world
About KBR:
We are a company of innovators, thinkers, creators, explorers, volunteers and dreamers who all share one goal - to improve the world.
KBR delivers science, technology and engineering solutions to governments and companies around the world. KBR employs approximately 34,000 people performing diverse, complex, and mission-critical roles in 33 countries.
For 65 years, KBR and its heritage companies are proud to have delivered some of Australia's largest and most complex projects.
With around 2,000 employees in 6 primary offices throughout Australia, we are committed to social and environmental sustainability and delivering projects with a digital mindset driving innovation within our business and for our customers.
We help ensure mission success on land, in the air, at sea, in space and cyberspace for our Defence customers. From individual technologies and services to comprehensive project delivery and mission execution, no other company can match the breadth and depth of KBR.
KBR comprises a talented team who provide a broad spectrum of capabilities across Australia and the Asia Pacific. Our proven project teams readily address complex and multi-disciplinary activities, providing low-risk and cost-effective solutions to the Defence force.
The Opportunity:
KBR is seeking expressions of interest from experienced and driven Cybersecurity Engineers to support current and future Defence capability programs in Canberra and Brisbane.
As a trusted partner to Defence, KBR delivers technical excellence across a broad range of programs and domains. This role presents an opportunity to be part of a high-performing team, delivering critical security outcomes in support of Australia's national defence and security interests.
The key responsibilities of the role will include, but is not limited to:
+ Develop, implement, and manage cybersecurity requirements across complex Defence systems and platforms.
+ Conduct system security architecture assessments and provide input into secure design and integration.
+ Perform risk assessments in accordance with the Information Security Manual (ISM) and Defence Security Principles Framework (DSPF).
+ Support accreditation and certification processes under the Defence Information Assurance Framework (DIAF).
+ Collaborate with multi-disciplinary engineering and project teams to ensure cybersecurity risks are identified, documented, and mitigated throughout the system lifecycle.
+ Provide advice and guidance on secure configuration, security controls, and compliance requirements.
+ Contribute to the development of security artefacts including Security Risk Management Plans (SRMPs), System Security Plans (SSPs), and Risk Assessments.
As the ideal candidate you will bring:
+ Degree in Cybersecurity, Information Technology, Systems Engineering, or a related field.
+ Minimum 5 years' experience in a cybersecurity engineering role within the Defence industry or a similarly complex, regulated environment.
+ Demonstrated knowledge of ISM, DSPF, DIAF, and relevant Australian and international cybersecurity standards (e.g., ISO/IEC 27001, NIST).
+ Experience supporting system design, integration, and security accreditation activities.
+ Strong written and verbal communication skills, with the ability to engage confidently with stakeholders and project teams.
+ Australian Citizenship is essential due to security clearance requirements.
+ Current or active AGSVA security clearance (NV1 or above) is highly desirable.
Benefits of KBR
+ A workplace culture certified as a Great Place To Work (Aus, India, UK & US)
+ Flexible working conditions
+ Competitive salary (including annual reviews)
+ Paid Parental leave
+ Paid Reservist leave
+ Income protection
+ Corporate rewards
+ Salary packaging/Novated leasing
+ Discounted employee stock purchase plans
+ Flu shots, skin checks and private health insurance discounts
+ Career development: Online learning, mentorship and career pathways
If you're ready to shape tomorrow, let's get started. Apply Now!
KBR acknowledges the Traditional Custodians of Country throughout Australia and their continuing connections to land, sea, community and culture. We pay our respects to Elders past and present.
As a Major Service Provider of the Australian Defence Force, an AGSVA security clearance will be required and compliance to International Traffic in Arms Regulations (ITAR). As such, our hiring decisions are based on the key requirements of each role and candidates are selected based on their unique strengths and experiences.
#LI-JAW1
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer - Defence Sector

Brisbane, Queensland KBR

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Title:
Cybersecurity Engineer - Defence Sector
Your KBR future - delivering solutions and changing the world
About KBR:
We are a company of innovators, thinkers, creators, explorers, volunteers and dreamers who all share one goal - to improve the world.
KBR delivers science, technology and engineering solutions to governments and companies around the world. KBR employs approximately 34,000 people performing diverse, complex, and mission-critical roles in 33 countries.
For 65 years, KBR and its heritage companies are proud to have delivered some of Australia's largest and most complex projects.
With around 2,000 employees in 6 primary offices throughout Australia, we are committed to social and environmental sustainability and delivering projects with a digital mindset driving innovation within our business and for our customers.
We help ensure mission success on land, in the air, at sea, in space and cyberspace for our Defence customers. From individual technologies and services to comprehensive project delivery and mission execution, no other company can match the breadth and depth of KBR.
KBR comprises a talented team who provide a broad spectrum of capabilities across Australia and the Asia Pacific. Our proven project teams readily address complex and multi-disciplinary activities, providing low-risk and cost-effective solutions to the Defence force.
The Opportunity:
KBR is seeking expressions of interest from experienced and driven Cybersecurity Engineers to support current and future Defence capability programs in Canberra and Brisbane.
As a trusted partner to Defence, KBR delivers technical excellence across a broad range of programs and domains. This role presents an opportunity to be part of a high-performing team, delivering critical security outcomes in support of Australia's national defence and security interests.
The key responsibilities of the role will include, but is not limited to:
+ Develop, implement, and manage cybersecurity requirements across complex Defence systems and platforms.
+ Conduct system security architecture assessments and provide input into secure design and integration.
+ Perform risk assessments in accordance with the Information Security Manual (ISM) and Defence Security Principles Framework (DSPF).
+ Support accreditation and certification processes under the Defence Information Assurance Framework (DIAF).
+ Collaborate with multi-disciplinary engineering and project teams to ensure cybersecurity risks are identified, documented, and mitigated throughout the system lifecycle.
+ Provide advice and guidance on secure configuration, security controls, and compliance requirements.
+ Contribute to the development of security artefacts including Security Risk Management Plans (SRMPs), System Security Plans (SSPs), and Risk Assessments.
As the ideal candidate you will bring:
+ Degree in Cybersecurity, Information Technology, Systems Engineering, or a related field.
+ Minimum 5 years' experience in a cybersecurity engineering role within the Defence industry or a similarly complex, regulated environment.
+ Demonstrated knowledge of ISM, DSPF, DIAF, and relevant Australian and international cybersecurity standards (e.g., ISO/IEC 27001, NIST).
+ Experience supporting system design, integration, and security accreditation activities.
+ Strong written and verbal communication skills, with the ability to engage confidently with stakeholders and project teams.
+ Australian Citizenship is essential due to security clearance requirements.
+ Current or active AGSVA security clearance (NV1 or above) is highly desirable.
Benefits of KBR
+ A workplace culture certified as a Great Place To Work (Aus, India, UK & US)
+ Flexible working conditions
+ Competitive salary (including annual reviews)
+ Paid Parental leave
+ Paid Reservist leave
+ Income protection
+ Corporate rewards
+ Salary packaging/Novated leasing
+ Discounted employee stock purchase plans
+ Flu shots, skin checks and private health insurance discounts
+ Career development: Online learning, mentorship and career pathways
If you're ready to shape tomorrow, let's get started. Apply Now!
KBR acknowledges the Traditional Custodians of Country throughout Australia and their continuing connections to land, sea, community and culture. We pay our respects to Elders past and present.
As a Major Service Provider of the Australian Defence Force, an AGSVA security clearance will be required and compliance to International Traffic in Arms Regulations (ITAR). As such, our hiring decisions are based on the key requirements of each role and candidates are selected based on their unique strengths and experiences.
#LI-JAW1
This advertiser has chosen not to accept applicants from your region.

Service Line Specialist- Cybersecurity

Sydney, New South Wales Cognizant

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

**Service Line Sales Specialist - Security**
**About Cognizant**
Cognizant is one of the world's leading professional services companies, helping clients become data-enabled and data-driven in the digital era. Our industry-based, consultative approach helps companies evolve into modern businesses. By leading clients in using technologies crucial to modern enterprises such as IoT, artificial intelligence, digital engineering, cybersecurity & cloud, we enable new business and operating models that unlock new value in markets around the world. Cognizant's unwavering focus on our clients is led by over 350,000 associates, who deliver services and solutions tailored to specific industries and the unique needs of the organizations we serve.
**Overview**
We are looking for a Service Line Sales Executive to join the Cybersecurity Service Line to drive additional revenue growth specific to Technology Partner led Cybersecurity solutions & services. Service Line Sales Executives, partner with Cognizant vertical and Cloud, Infrastructure and Security (CIS) and Vertical sales teams to identify areas of opportunity to position Cybersecurity solutions and services, create compelling solutions to secure client estate and pursue Cybersecurity deals with innovative technical and commercial models.
**Key Responsibilities**
+ Responsible for Partner driven Solutions and Services business growth and pipeline generation in partnership with the sales leaders
+ Responsible for managing partner relationships, connects and proactive business plan
+ Partners with account teams to identify, solution and close opportunities within the account base
+ Responsible for Training and Educating Vertical and other Horizontal Sales team on Cognizant Security Portfolio
+ Responsible for driving solutions for managed services opportunities collaborating with offshore based teams
+ Responsible for articulating the Cybersecurity solution and value proposition to clients, as part of large managed services / IT outsourcing engagements
+ Responsible for engaging in proactive conversations with security collaborators on current trends, client's landscape and enable solutions to address security challenges.
**Required Experience**
+ 10+ years of experience in one or more of areas such as Cybersecurity solutions and service sales, program management, technical solution centric sales
+ Experience in Security Consulting, Security Professional Services and Managed Services solution experience
+ Strong Information Cybersecurity Technology Background
+ Prior experience in presales solutioning and client management. Experience in large opportunities management is desired
+ Ability to partner with additional collaborators in a matrixed environment
+ Experience in articulating joint value proposition of Cognizant Security Services and Cybersecurity Partner Solutions
+ Work with GSI team of Palo Alto Networks to track pipeline, perform account planning and drive client conversations along with Palo Alto Networks account representatives.
+ Ability to provide inputs to offering development teams on market requirements to enable them to create innovative differentiated offerings
+ Experience in preparing solution presentations, proposals (word / ppt), statement of work, effort price estimation and pricing/commercial model
+ Good working experience with market leading security technologies with in SIEM, Network and Endpoint Security, Cloud Security, Identity and Access Management etc.
+ Ability to articulate technology solution value proposition to business collaborators, partners and team members
+ Experience with developing Trusted Advisor relationships at the C Level with in F200 & F500 Accounts
+ Good communication skills in complex client relationship model
+ Works closely with other Cognizant practices and geographic regions to ensure that Cognizant continues to operate effectively as one firm.
+ Bachelor's Degree required
**Preferred Experience**
+ Security certifications such as CISA or CISM or CISSP preferred
+ Master's Degree
**Top Reasons to Join Our Team**
+ Excellent compensation/benefits. A strong financial incentive package that includes a solid base salary with a highly attractive bonus plan. Further incentives include award programs, club trips, and excellent benefits.
+ Wide exposure to industry, product, and functional best practices; as well as world-class teams supporting your sales pursuits.
+ Encouraging management team that rewards initiative & success.
+ Opportunity to join an organization where you can truly build a long-term career.
+ Collaborative culture provides the opportunity to work with and learn from a diverse, highly experienced team of business professionals.
+ Tremendous opportunities for growth with a real career path promoting career advancement.
**A Good fit for the Cognizant culture:**
A person who possesses a true passion for changing organizations for the better, and desires to do so within a professional atmosphere filled with business professionals who all manifest a belief in partnership, innovation, and excellence. Our "Cultural Value Drivers" are well-known and clearly communicated within the organization: Open, Transparent, Driven, Empowered, Opportunity-Filled, Flexible & Collaborative.
Cognizant is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
This advertiser has chosen not to accept applicants from your region.

Cyber Threat Intelligence Specialist

Canberra, Australian Capital Territory Leidos

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

**Description**
+ We're a 'Family Friendly' certified workplace - we understand the often many and varied roles our team members need to play within their own unique family setting and actively support them.
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
The Cyber Threat Intelligence Specialist is a technically focused role within the cross-functional Cyber Security team, responsible for leading the organisation's threat intelligence capability. This includes the operation and enhancement of the MISP platform, advanced analysis of external threat feeds, and the production of actionable intelligence to support vulnerability management, incident response, and strategic risk decisions.
You will maintain awareness of adversary tactics, indicators of compromise, and emerging vulnerabilities by correlating information from ACSC CTIS, CISA Known Exploited Vulnerabilities, the US National Vulnerability Database, and other curated MISP feeds. Intelligence outputs will directly inform the Security Risk Management Plan, threat models, and continual improvement cycles.
This is a hands-on position focused on platform operation, feed management, and threat analysis. You'll also be responsible for documenting intelligence products that are traceable, actionable, and relevant to the supported environment, while also contributing across broader security operations.
This role requires flexibility, collaboration, and a willingness to support team objectives across all areas of cyber defence while still focusing on Cyber Threat Intelligence.
**Key Responsibilities**
+ Operate and maintain the MISP threat intelligence platform, integrating structured threat feeds and known malware indicators, while tuning feeds to improve the relevance and quality of threat data.
+ Correlate threat intelligence with known vulnerabilities and incident data to support prioritised mitigation, patching, and risk-based decision-making across the environment.
+ Generate high-quality intelligence outputs, including threat profiles, risk narratives,contributions to the Security Risk Management Plan (SRMP) and other audit-ready documentation.
+ Provide enriched indicators of compromise and attribution context during incident response activities, supporting containment and recovery efforts in collaboration with internal and customer security teams.
+ Actively contribute to broader cyber security operations, supporting incident response, vulnerability management, endpoint security management, compliance activities, and continuous improvement initiatives as part of a small, cross-functional team.
**Qualifications & Experience**
+ Proven experience operating or administering MISP or a similar Threat Intelligence Platform (TIP) in a production environment, with a strong understanding of platform integration and maintenance.
+ Familiarity with cyber threat intelligence standards and frameworks such as STIX, TAXII, MITRE ATT&CK, and the Cyber Kill Chain, and their application in real-world threat analysis.
+ Practical experience working with structured threat feeds and enrichment sources (e.g., CVE/NVD, CTIS, CISA KEV), and applying this intelligence to support vulnerability and incident response workflows.
+ Strong written communication skills, with the ability to produce clear, actionable threat intelligence artefacts, technical documentation, and operational advisories for diverse audiences.
+ A collaborative and inclusive approach to cyber defence, with a passion for continuous learning, teamwork, and contributing to a shared security mission as part of a wider team.
_This role does require the successful applicant to be an Australian Citizen and hold_ _or be able to obtain an NV1_ _level security clearance._
**Diverse Team Members, Shared** **Values** **and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values._ _It's_ _about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network, Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - virtual / face to face interview & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please contact our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
This advertiser has chosen not to accept applicants from your region.

Business Sales and Delivery Executive - Cybersecurity Threat Management

Melbourne, Victoria IBM

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

**Introduction**
As a Business Sales & Delivery Executive, you will support IBM's consistent growth by bringing to the table your business development, sales, account management, and delivery skills.
**Your role and responsibilities**
The ideal candidate will be responsible for managing a team of security professionals and ensuring the successful execution of managed security services for our clients. This role involves strategic planning, client engagement, and a thorough understanding of cybersecurity protocols and trends.
Picture yourself working with a highly motivated, highly successful team with a proven sales record in top technologies. If you're ready to bring insights and experience in cloud security, we are ready to offer you a best-in-class career development.
This role is a leadership role engaged in the sales, planning and implementation of threat management solutions in our services portfolio and as such you will be self-motivated and driven to build new and maintain existing client relationships, have proven track record of meeting your sales and utilisation targets.
* Work with clients to establish a vision, gather requirements, and lead the development of winning solutions which meet client requirements, and maximize IBM's strengths
* Lead and manage the Managed Security Services (MSS) team, ensuring high performance and adherence to service level agreements (SLAs).
* Work closely with colleagues to develop client presentations and Statement of Works (SOWs) based on internal processes for release
* Analyzing and defining a client's threat management strategy based on the business strategy
* Drawing from primary and existing IBM research on evolving market trends
* Identifying issues, creating hypotheses, and executing analysis, to develop decision-ready recommendations for our clients
* Analyse and interpret test results to provide actionable recommendations for remediation, mitigation, and security enhancements.
* Communicate findings and insights to technical and non-technical stakeholders through detailed and concise reports, presentations, and discussions.
* Stay up to date with the latest cybersecurity trends to continuously improve testing methodologies and approaches.
* Provide leadership in use case design and implementation, runbook design and implementation, policy, process, technology assessment and build, governance, or organisational areas.
* Mentor and provide guidance to junior members of the team, fostering skill development and knowledge sharing.
**Required technical and professional expertise**
You understand and how to build use-cases because you know what you're looking for. For example, you understand how ransomware and other malware, or threats technically works, which logs they write to, their IOCs, network flows, and behaviors; thus, you are adapt at building custom use-cases that hunt for early indicators. Additionally, you understand how to hunt for threats, the relationship it has with forensic investigations, and creating extracts that divulge targets and areas of interest. Also, you can design Threat Hunting programs which can be taught to other analysts, or even be automated using artificial intelligence. False positives are your sworn enemies.
You must have experience writing your own queries and scripts that will allow you to search through logs, network flows, and other areas to correlate security events of interest. You are able to de-construct attacks and threats.
* Strong financial acumen and proven sales experience in Micorsoft, Palo Alto or related security technology solutions.
* At least 8-10 years' related experience in design of enterprise security service solutions (advisory, systems integration, and/or managed security services);
* Should have depth of knowledge and experience in core security domains SOC Assessments, Use Cases, SOC Runbooks, SOC Processes, SOC Operations, SIEM, Threat Hunting, Threat Intelligence, IOC's.
* Hands on experience with SIEM solutions such as Microsoft Sentinel highly desired
* Hand on SOAR: Resilient and others (SOAR workflow and playbook skill set)
* Knowledge of Palo Alto Cortex solution and XSIAM
* Knowledge and working experience with EDR, Attack Surface Management, Threat Intelligence tools
* Expert knowledge of Mitre Framework, NIST framework and Cyber Kill Chain Process.
* Scripting and custom parser knowledge required for integrations.
* An understanding of Threat Intelligence and Threat Hunting
* Proficient in incident response processes - detection, triage, incident analysis, remediation, and reporting.
* Understanding of compliance issues (ISO 27001, PCI, COBIT, GDPR, POPII, etc.) and market regulations
* Knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
* Knowledge of malware operation and indicators
* Knowledge of threat landscape (threat actors, APT, cyber-crime, etc
* Knowledge of Windows and Linux
* Knowledge in penetration techniques. Extensive experience in documentation and reporting.
* Well-developed presentation skills.
* Strong communications skills both oral and written, and solid organisational skills.
* University degree in computer science, natural sciences or mathematics, engineering or an equivalent activity
**Preferred technical and professional experience**
.
IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.

Business Sales and Delivery Executive - Cybersecurity Threat Management

Sydney, New South Wales IBM

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

**Introduction**
As a Business Sales & Delivery Executive, you will support IBM's consistent growth by bringing to the table your business development, sales, account management, and delivery skills.
**Your role and responsibilities**
The ideal candidate will be responsible for managing a team of security professionals and ensuring the successful execution of managed security services for our clients. This role involves strategic planning, client engagement, and a thorough understanding of cybersecurity protocols and trends.
Picture yourself working with a highly motivated, highly successful team with a proven sales record in top technologies. If you're ready to bring insights and experience in cloud security, we are ready to offer you a best-in-class career development.
This role is a leadership role engaged in the sales, planning and implementation of threat management solutions in our services portfolio and as such you will be self-motivated and driven to build new and maintain existing client relationships, have proven track record of meeting your sales and utilisation targets.
* Work with clients to establish a vision, gather requirements, and lead the development of winning solutions which meet client requirements, and maximize IBM's strengths
* Lead and manage the Managed Security Services (MSS) team, ensuring high performance and adherence to service level agreements (SLAs).
* Work closely with colleagues to develop client presentations and Statement of Works (SOWs) based on internal processes for release
* Analyzing and defining a client's threat management strategy based on the business strategy
* Drawing from primary and existing IBM research on evolving market trends
* Identifying issues, creating hypotheses, and executing analysis, to develop decision-ready recommendations for our clients
* Analyse and interpret test results to provide actionable recommendations for remediation, mitigation, and security enhancements.
* Communicate findings and insights to technical and non-technical stakeholders through detailed and concise reports, presentations, and discussions.
* Stay up to date with the latest cybersecurity trends to continuously improve testing methodologies and approaches.
* Provide leadership in use case design and implementation, runbook design and implementation, policy, process, technology assessment and build, governance, or organisational areas.
* Mentor and provide guidance to junior members of the team, fostering skill development and knowledge sharing.
**Required technical and professional expertise**
You understand and how to build use-cases because you know what you're looking for. For example, you understand how ransomware and other malware, or threats technically works, which logs they write to, their IOCs, network flows, and behaviors; thus, you are adapt at building custom use-cases that hunt for early indicators. Additionally, you understand how to hunt for threats, the relationship it has with forensic investigations, and creating extracts that divulge targets and areas of interest. Also, you can design Threat Hunting programs which can be taught to other analysts, or even be automated using artificial intelligence. False positives are your sworn enemies.
You must have experience writing your own queries and scripts that will allow you to search through logs, network flows, and other areas to correlate security events of interest. You are able to de-construct attacks and threats.
* Strong financial acumen and proven sales experience in Micorsoft, Palo Alto or related security technology solutions.
* At least 8-10 years' related experience in design of enterprise security service solutions (advisory, systems integration, and/or managed security services);
* Should have depth of knowledge and experience in core security domains SOC Assessments, Use Cases, SOC Runbooks, SOC Processes, SOC Operations, SIEM, Threat Hunting, Threat Intelligence, IOC's.
* Hands on experience with SIEM solutions such as Microsoft Sentinel highly desired
* Hand on SOAR: Resilient and others (SOAR workflow and playbook skill set)
* Knowledge of Palo Alto Cortex solution and XSIAM
* Knowledge and working experience with EDR, Attack Surface Management, Threat Intelligence tools
* Expert knowledge of Mitre Framework, NIST framework and Cyber Kill Chain Process.
* Scripting and custom parser knowledge required for integrations.
* An understanding of Threat Intelligence and Threat Hunting
* Proficient in incident response processes - detection, triage, incident analysis, remediation, and reporting.
* Understanding of compliance issues (ISO 27001, PCI, COBIT, GDPR, POPII, etc.) and market regulations
* Knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
* Knowledge of malware operation and indicators
* Knowledge of threat landscape (threat actors, APT, cyber-crime, etc
* Knowledge of Windows and Linux
* Knowledge in penetration techniques. Extensive experience in documentation and reporting.
* Well-developed presentation skills.
* Strong communications skills both oral and written, and solid organisational skills.
* University degree in computer science, natural sciences or mathematics, engineering or an equivalent activity
**Preferred technical and professional experience**
.
IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity Jobs in Australia !

Senior Network Security Automation Engineer

Melbourne, Victoria Microsoft Corporation

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day and we need you as a **Senior Network Security Automation Engineer** .
Microsoft's Cloud Operations & Innovation (CO+I) is the engine that powers our cloud services. As a Senior Cyber Security Engineer, you will perform a key role in delivering the core infrastructure and foundational technologies for Microsoft's online services including Bing, Office 365, Xbox, OneDrive, and the Microsoft Azure platform. You will drive our technology strategy, lead by example, and support team members on their learning journey. You will implement and operate modern cloud and on premises cybersecurity controls to defend Microsoft datacenter critical infrastructure from threat actors. Leveraging multiple solutions and partnering with internal and external teams, you will be at the forefront of advancing industrial network cybersecurity capabilities.
Through on the job learning and bi-directional mentorship, this opportunity will allow you to gain cyber defense, automation, and networking skills and experiences that are rare in both networking and security organizations, and in high demand across multiple industries. This is a flexible work opportunity for you to work from home partially or fully if desired.
As a group, CO+I is focused on personal and professional development for all employees and offers trainings and growth opportunities including Career Rotation Programs, Diversity & Inclusion trainings and events, and professional certifications.
Our infrastructure is comprised of a large global portfolio of more than 100 datacenters and 1 million servers. Our foundation is built upon and managed by a team of subject matter experts working to support services for more than 1 billion customers and 20 million businesses in over 90 countries worldwide.
With environmental sustainability and optimization at the forefront of our datacenter design and operations, we continue to grow and evolve as we meet the ever-changing business demands that hold Microsoft as a world-class cloud provider.
Do you want to empower billions across the world? Come and join us in CO+I and be at the forefront of the action!
**Responsibilities**
**Responsibilities:**
+ Manage and optimize network security infrastructure including NGFWs (e.g., Palo Alto Networks, Checkpoint), IDS/IPS, and segmentation.
+ Develop and maintain secure Azure cloud environments using Infrastructure-as-Code (IaC) tools such as Terraform or ARM templates.
+ Build and maintain CI/CD pipelines in Azure DevOps with integrated security controls.
+ Document automation workflows, APIs, scripts, and system designs.
+ Proactively identify and investigate potential issues and patterns in security controls and drive mitigation strategies, while also implementing automation to improve efficiency and effectiveness across the network.
+ Install, upgrade, and maintain security hardware, operating system and software.
+ Identify gaps in security policy and administration, recommend solutions, and implement new and revised security standards, while working with partner teams to drive consistency and awareness.
+ Maintain standards and drive improvements for our customer and partner experience, responding appropriately to emerging issues and advocating for our customer experience through development and analyzation of key metrics, performance indicators, and other data sources (e.g. bugs, unhealthy data pipeline). Respond to escalations and recommend improvements as appropriate to address gaps.
+ Participate in on-call rotation to support security services.
+ With minimal guidance, analyze attempted or successful efforts to compromise systems security and, alongside partner teams, create recommendations to limit exposure, implement response plans, and take action.
+ Analyze potential or actual intrusions identified from monitoring activities and create detections based on available data (e.g., Indicators of Compromise (IOC) and Tools Tactics Procedures (TTP)).
**Other**
+ Embody our culture ( and values ( .
**Qualifications**
**Required Qualifications:**
+ 4+ years of experience in Network Security Engineering (multi-vendor next-gen firewall experience, IDS/IPS, network engineering (routing/BGP) and network/infrastructure automation (Python, Ansible etc).
+ OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
+ Strong background in Firewalls or Intrusion detection or prevention systems.
+ High proficiency in Python
+ Hands-on experience with Ansible for network automation and configuration management.
+ Ability to design, develop, and integrate RESTful APIs
+ Networking & Security Fundamentals: Solid understanding of routing, IPSec, firewall policies
+ Proficiency with Git and collaborative development workflows
**Background Check Requirements:**
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
+ Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
While not required, we also look for the following **Preferred Qualifications:**
+ Cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), cloud security, and operations incident response.
+ CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, PCCSE, PCNSE, PCSAE, CCNP Security, CCIE Security and/or Security+ certification.
+ Any experience with industrial control systems is preferred (not mandatory).
+ Experience with Nautobot for network source-of-truth alignment, and Django would be considered highly beneficial
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
This advertiser has chosen not to accept applicants from your region.

Senior Network Security Automation Engineer

Sydney, New South Wales Microsoft Corporation

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day and we need you as a **Senior Network Security Automation Engineer** .
Microsoft's Cloud Operations & Innovation (CO+I) is the engine that powers our cloud services. As a Senior Cyber Security Engineer, you will perform a key role in delivering the core infrastructure and foundational technologies for Microsoft's online services including Bing, Office 365, Xbox, OneDrive, and the Microsoft Azure platform. You will drive our technology strategy, lead by example, and support team members on their learning journey. You will implement and operate modern cloud and on premises cybersecurity controls to defend Microsoft datacenter critical infrastructure from threat actors. Leveraging multiple solutions and partnering with internal and external teams, you will be at the forefront of advancing industrial network cybersecurity capabilities.
Through on the job learning and bi-directional mentorship, this opportunity will allow you to gain cyber defense, automation, and networking skills and experiences that are rare in both networking and security organizations, and in high demand across multiple industries. This is a flexible work opportunity for you to work from home partially or fully if desired.
As a group, CO+I is focused on personal and professional development for all employees and offers trainings and growth opportunities including Career Rotation Programs, Diversity & Inclusion trainings and events, and professional certifications.
Our infrastructure is comprised of a large global portfolio of more than 100 datacenters and 1 million servers. Our foundation is built upon and managed by a team of subject matter experts working to support services for more than 1 billion customers and 20 million businesses in over 90 countries worldwide.
With environmental sustainability and optimization at the forefront of our datacenter design and operations, we continue to grow and evolve as we meet the ever-changing business demands that hold Microsoft as a world-class cloud provider.
Do you want to empower billions across the world? Come and join us in CO+I and be at the forefront of the action!
**Responsibilities**
**Responsibilities:**
+ Manage and optimize network security infrastructure including NGFWs (e.g., Palo Alto Networks, Checkpoint), IDS/IPS, and segmentation.
+ Develop and maintain secure Azure cloud environments using Infrastructure-as-Code (IaC) tools such as Terraform or ARM templates.
+ Build and maintain CI/CD pipelines in Azure DevOps with integrated security controls.
+ Document automation workflows, APIs, scripts, and system designs.
+ Proactively identify and investigate potential issues and patterns in security controls and drive mitigation strategies, while also implementing automation to improve efficiency and effectiveness across the network.
+ Install, upgrade, and maintain security hardware, operating system and software.
+ Identify gaps in security policy and administration, recommend solutions, and implement new and revised security standards, while working with partner teams to drive consistency and awareness.
+ Maintain standards and drive improvements for our customer and partner experience, responding appropriately to emerging issues and advocating for our customer experience through development and analyzation of key metrics, performance indicators, and other data sources (e.g. bugs, unhealthy data pipeline). Respond to escalations and recommend improvements as appropriate to address gaps.
+ Participate in on-call rotation to support security services.
+ With minimal guidance, analyze attempted or successful efforts to compromise systems security and, alongside partner teams, create recommendations to limit exposure, implement response plans, and take action.
+ Analyze potential or actual intrusions identified from monitoring activities and create detections based on available data (e.g., Indicators of Compromise (IOC) and Tools Tactics Procedures (TTP)).
**Other**
+ Embody our culture ( and values ( .
**Qualifications**
**Required Qualifications:**
+ 4+ years of experience in Network Security Engineering (multi-vendor next-gen firewall experience, IDS/IPS, network engineering (routing/BGP) and network/infrastructure automation (Python, Ansible etc).
+ OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
+ Strong background in Firewalls or Intrusion detection or prevention systems.
+ High proficiency in Python
+ Hands-on experience with Ansible for network automation and configuration management.
+ Ability to design, develop, and integrate RESTful APIs
+ Networking & Security Fundamentals: Solid understanding of routing, IPSec, firewall policies
+ Proficiency with Git and collaborative development workflows
**Background Check Requirements:**
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:
+ Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
While not required, we also look for the following **Preferred Qualifications:**
+ Cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), cloud security, and operations incident response.
+ CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, PCCSE, PCNSE, PCSAE, CCNP Security, CCIE Security and/or Security+ certification.
+ Any experience with industrial control systems is preferred (not mandatory).
+ Experience with Nautobot for network source-of-truth alignment, and Django would be considered highly beneficial
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Officer - Defence Sector

Canberra, Australian Capital Territory KBR

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Title:
Senior Information Security Officer - Defence Sector
Your KBR future - delivering solutions and changing the world
About KBR:
We are a company of innovators, thinkers, creators, explorers, volunteers and dreamers who all share one goal - to improve the world.
KBR delivers science, technology and engineering solutions to governments and companies around the world. KBR employs approximately 34,000 people performing diverse, complex, and mission-critical roles in 33 countries.
For 65 years, KBR and its heritage companies are proud to have delivered some of Australia's largest and most complex projects.
With around 2,000 employees in 6 primary offices throughout Australia, we are committed to social and environmental sustainability and delivering projects with a digital mindset driving innovation within our business and for our customers.
We help ensure mission success on land, in the air, at sea, in space and cyberspace for our Defence customers. From individual technologies and services to comprehensive project delivery and mission execution, no other company can match the breadth and depth of KBR.
KBR comprises a talented team who provide a broad spectrum of capabilities across Australia and the Asia Pacific. Our proven project teams readily address complex and multi-disciplinary activities, providing low-risk and cost-effective solutions to the Defence force.
The Opportunity:
KBR is inviting expressions of interest from highly skilled and experienced Senior Information Security Officers to support critical Defence programs based in Brisbane or Canberra.
As a Senior Information Security Officer, you will play a vital role in ensuring the protection of Defence systems, information, and assets, supporting the ongoing delivery of secure, reliable, and compliant Defence capabilities. This is an exciting opportunity to contribute to national security outcomes and work with a diverse team of experts on high-impact Defence projects.
The key responsibilities of the role will include, but is not limited to:
+ Lead the development, implementation, and maintenance of Information Security Management Systems (ISMS) to ensure Defence compliance with ISO 27001, ACSC Essential 8, and Defence Security requirements.
+ Conduct risk assessments and vulnerability management, ensuring appropriate information security controls are in place to protect Defence systems and data across their lifecycle.
+ Develop and enforce information security policies, procedures, and best practices, ensuring Defence IT infrastructure and systems are protected against cyber threats and vulnerabilities.
+ Support the implementation and maintenance of cybersecurity frameworks and ensure compliance with national and international information security standards.
+ Provide expert advice to Defence stakeholders and project teams on information security best practices, emerging threats, and mitigation strategies.
+ Collaborate with cross-functional teams, including Defence security, engineering, and project management, to ensure robust security governance for all Defence programs.
+ Conduct security audits, assessments, and incident response activities to ensure the availability, integrity, and confidentiality of Defence information assets.
+ Maintain awareness of current cybersecurity trends and emerging threats, and continuously update security practices to protect Defence information systems.
As the ideal candidate you will bring:
+ Tertiary qualifications in Information Security, Computer Science, Information Technology, or a related discipline.
+ Minimum 5 years of experience in an Information Security role, ideally within Defence, Government, or similarly regulated industries.
+ Expertise in implementing and managing Information Security Management Systems (ISMS) and conducting security risk assessments.
+ Strong knowledge of Defence security policies, standards, and frameworks, including ISO 27001, NIST, ACSC Essential 8, and DEF(AUST) 3000.
+ Experience with security tools, such as SIEM, firewalls, endpoint protection, and vulnerability scanning tools.
+ Proven ability to communicate effectively with senior stakeholders, providing expert guidance on complex security issues.
+ Australian Citizenship is essential due to security clearance requirements.
+ NV1 security clearance (or the ability to obtain) is highly desirable.
Benefits of KBR
+ A workplace culture certified as a Great Place To Work (Aus, India, UK & US)
+ Flexible working conditions
+ Competitive salary (including annual reviews)
+ Paid Parental leave
+ Paid Reservist leave
+ Income protection
+ Corporate rewards
+ Salary packaging/Novated leasing
+ Discounted employee stock purchase plans
+ Flu shots, skin checks and private health insurance discounts
+ Career development: Online learning, mentorship and career pathways
If you're ready to shape tomorrow, let's get started. Apply Now!
KBR acknowledges the Traditional Custodians of Country throughout Australia and their continuing connections to land, sea, community and culture. We pay our respects to Elders past and present.
As a Major Service Provider of the Australian Defence Force, an AGSVA security clearance will be required and compliance to International Traffic in Arms Regulations (ITAR). As such, our hiring decisions are based on the key requirements of each role and candidates are selected based on their unique strengths and experiences.
#LI-JAW1
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs