16 Threat Analyst jobs in Australia
Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
How We Work:
At Proofpoint, you'll be part of a global team that breaks barriers to redefine cybersecurity, guided by our BRAVE core values: Bold in how we dream and innovate, Responsive to feedback, challenges, and opportunities, Accountable for results and best-in-class outcomes, Visionary in future-focused problem-solving, Exceptional in execution and impact.
**Company Overview**
Proofpoint is a leading cybersecurity company protecting organizations' greatest assets and biggest risks: vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions mitigating their most critical risks across email, the cloud, social media, and the web.
We are singularly devoted to helping our customers protect their greatest assets and biggest security risk: their people. That's why we're a leader in next-generation cybersecurity.
Protection Starts with People.
**The Role**
The Threat Intelligence Analyst is responsible for leveraging Proofpoint data and telemetry to deliver cyber threat intelligence reporting to customers, both through email and regular live customer-facing briefings and presentations. Candidates will conduct threat analysis, apply analytics to threat intelligence, conduct briefings, field customer inquiries, engage internal SMEs, and initiate improvements to existing program framework, processes, and deliverables.
This role is roughly 70% core analysis and production, 30% enablement - supporting sales with intelligence-backed narratives, demos, and customer engagement. This is a hybrid role at the intersection of intelligence and go-to-market, ideal for someone who wants to grow into a leadership or evangelist-type position.
**Your-day-to-day**
+ You will be assessing and analyzing a customer's security environment and ongoing threats, pointing out unusual or interesting threats, then recommending tactical (configuration, product/operational policy or implementation) and strategic improvements directly to customers through both email and regular live presentations.
+ This customer facing role requires hands-on preplanned investigations, on-demand inquiries, and unstructured data analysis, but also uses soft skills to discuss, recommend, advocate, and track changes and improvements to advance a customer's security posture.
+ Your success is incumbent on providing customers greater visibility, context, and insight into the threats they face and suggestions on how to respond to them. Collaborate with Sales on pre-sales calls and RFP responses, providing subject matter expertise.
+ Develop and present use-case driven briefings to prospective clients (threat landscape, sector-specific risks, adversary trends).
+ Create and maintain sales enablement materials (one-pagers, case studies, sample reports, FAQs).
+ Partner with customer account teams to ensure smooth onboarding and highlight service value during renewals.
+ Act as a bridge between intelligence operations and GTM teams, ensuring customer feedback informs intelligence priorities.
**What you bring to the team**
+ 5 + years of experience in the cyber security space, with at least 2 years delivering customer-facing presentations with an understanding of customer success, retention, and sales processes
+ Exposure to customer-facing work (consulting, advisory, or managed services).
+ Domain knowledge in cyber security, including the ability to speak and present directly to customers with authority on the broad threat landscape and in detail on email-based threats, exploits and threat actors, and incident analysis.
+ Ability to identify potential areas of concern for customers before or as they arise and take appropriate actions, such as proactive notification, recommending framework-based or ad hoc mitigations, and initiating additional research.
+ Knowledge of other technologies such as networking, internet technologies, and web servers is required
+ Document current processes and identify areas for improvement to improve customer experience and/or team efficiency.
+ Highly organized and the ability to lead through influence and coordination, as well as facilitate communication with SMEs, account teams, and other stakeholders as necessary.
+ Strong interpersonal skills and excellent oral and written communication skills.
+ Passion for working closely with customers to inform and protect them, including the ability to maintain close communication with multiple large organizations simultaneously.
+ Customer facing presentation experience
+ Knowledge of Python is a plus but not required
+ Proficiency in Microsoft Office 365 Suite including Excel w/pivot tables and Powerpoint
+ Demonstrated ability to learn new technologies, systems, and subjects quickly
**Additional skills that are added bonuses include**
+ Analytics tools and experience such as Tableau, SQL, R Studio, Python pandas
**Why Proofpoint**
Protecting people is at the heart of our award-winning lineup of cybersecurity solutions, and the people who work here are the key to our success. We're a customer-focused and a driven-to-win organization with leading-edge products. We are an inclusive, diverse, multinational company that believes in culture fit, but more importantly 'culture-add', and we strongly encourage people from all walks of life to apply.
We believe in hiring the best and the brightest to help cultivate our culture of collaboration and appreciation. Apply today and explore your future at Proofpoint! #LifeAtPFPT
#LI-ML
Why Proofpoint? At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you'll love working with us:
- Competitive compensation
- Comprehensive benefits
- Learning & Development: We are committed to the growth and development of our team members, offering a range of programs including leadership and professional development workshops, stretch project assignments, and mentoring opportunities to help employees reach their full potential.
- Flexible work environment: (Remote options, hybrid schedules, flexible hours, etc.).
- Annual wellness and community outreach days
- Always on recognition for your contributions
- Global collaboration and networking opportunities
Our Culture:
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone. We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to . How to Apply Interested? Submit your application here . We can't wait to hear from you!
Proofpoint has been honored with six Best Places to Work Awards in 2024 by workplace culture leader Comparably, including Best Company Career Growth, Best Company Outlook, Best Global Culture, Best Engineering Teams, Best Sales Teams, and Best HR Teams.
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
Our BRAVE Values:
At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow.
We seek people who are bold enough to challenge the status quo, responsive in the face of ever-evolving threats, and accountable for delivering real impact.
We value those with a visionary mindset who anticipate what's next and push cybersecurity forward, and we celebrate exceptional execution that ensures we continue to defend data and protect people.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Find your network, your allies, and your biggest fans. We know that work is simply better when you're surrounded by people who inspire you-who share ideas, cheer you on, and genuinely want to see you succeed. That's why we offer social circles, sponsored networks, and connection points across teams and time zones-to help you find your people, build your community, and thrive together.
This isn't just a job-it's a mission to protect people and defend data in a world that never slows down. We're building the future of human-centric cybersecurity, and that future belongs to all of us. We take ownership, move fast, and hold ourselves accountable-because that's what it takes to stay ahead. And we do it together, winning as one.
Be empowered to reach your full potential through meaningful challenges and personalized support-designed around you and your goals. Whether you're growing as a leader or leveling up from great to exceptional as an individual contributor, we're here to help you get there.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
How We Work:
At Proofpoint, you'll be part of a global team that breaks barriers to redefine cybersecurity, guided by our BRAVE core values: Bold in how we dream and innovate, Responsive to feedback, challenges, and opportunities, Accountable for results and best-in-class outcomes, Visionary in future-focused problem-solving, Exceptional in execution and impact.
**Company Overview**
Proofpoint is a leading cybersecurity company protecting organizations' greatest assets and biggest risks: vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions mitigating their most critical risks across email, the cloud, social media, and the web.
We are singularly devoted to helping our customers protect their greatest assets and biggest security risk: their people. That's why we're a leader in next-generation cybersecurity.
Protection Starts with People.
**The Role**
The Threat Intelligence Analyst is responsible for leveraging Proofpoint data and telemetry to deliver cyber threat intelligence reporting to customers, both through email and regular live customer-facing briefings and presentations. Candidates will conduct threat analysis, apply analytics to threat intelligence, conduct briefings, field customer inquiries, engage internal SMEs, and initiate improvements to existing program framework, processes, and deliverables.
This role is roughly 70% core analysis and production, 30% enablement - supporting sales with intelligence-backed narratives, demos, and customer engagement. This is a hybrid role at the intersection of intelligence and go-to-market, ideal for someone who wants to grow into a leadership or evangelist-type position.
**Your-day-to-day**
+ You will be assessing and analyzing a customer's security environment and ongoing threats, pointing out unusual or interesting threats, then recommending tactical (configuration, product/operational policy or implementation) and strategic improvements directly to customers through both email and regular live presentations.
+ This customer facing role requires hands-on preplanned investigations, on-demand inquiries, and unstructured data analysis, but also uses soft skills to discuss, recommend, advocate, and track changes and improvements to advance a customer's security posture.
+ Your success is incumbent on providing customers greater visibility, context, and insight into the threats they face and suggestions on how to respond to them. Collaborate with Sales on pre-sales calls and RFP responses, providing subject matter expertise.
+ Develop and present use-case driven briefings to prospective clients (threat landscape, sector-specific risks, adversary trends).
+ Create and maintain sales enablement materials (one-pagers, case studies, sample reports, FAQs).
+ Partner with customer account teams to ensure smooth onboarding and highlight service value during renewals.
+ Act as a bridge between intelligence operations and GTM teams, ensuring customer feedback informs intelligence priorities.
**What you bring to the team**
+ 5 + years of experience in the cyber security space, with at least 2 years delivering customer-facing presentations with an understanding of customer success, retention, and sales processes
+ Exposure to customer-facing work (consulting, advisory, or managed services).
+ Domain knowledge in cyber security, including the ability to speak and present directly to customers with authority on the broad threat landscape and in detail on email-based threats, exploits and threat actors, and incident analysis.
+ Ability to identify potential areas of concern for customers before or as they arise and take appropriate actions, such as proactive notification, recommending framework-based or ad hoc mitigations, and initiating additional research.
+ Knowledge of other technologies such as networking, internet technologies, and web servers is required
+ Document current processes and identify areas for improvement to improve customer experience and/or team efficiency.
+ Highly organized and the ability to lead through influence and coordination, as well as facilitate communication with SMEs, account teams, and other stakeholders as necessary.
+ Strong interpersonal skills and excellent oral and written communication skills.
+ Passion for working closely with customers to inform and protect them, including the ability to maintain close communication with multiple large organizations simultaneously.
+ Customer facing presentation experience
+ Knowledge of Python is a plus but not required
+ Proficiency in Microsoft Office 365 Suite including Excel w/pivot tables and Powerpoint
+ Demonstrated ability to learn new technologies, systems, and subjects quickly
**Additional skills that are added bonuses include**
+ Analytics tools and experience such as Tableau, SQL, R Studio, Python pandas
**Why Proofpoint**
Protecting people is at the heart of our award-winning lineup of cybersecurity solutions, and the people who work here are the key to our success. We're a customer-focused and a driven-to-win organization with leading-edge products. We are an inclusive, diverse, multinational company that believes in culture fit, but more importantly 'culture-add', and we strongly encourage people from all walks of life to apply.
We believe in hiring the best and the brightest to help cultivate our culture of collaboration and appreciation. Apply today and explore your future at Proofpoint! #LifeAtPFPT
#LI-ML
Why Proofpoint? At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you'll love working with us:
- Competitive compensation
- Comprehensive benefits
- Learning & Development: We are committed to the growth and development of our team members, offering a range of programs including leadership and professional development workshops, stretch project assignments, and mentoring opportunities to help employees reach their full potential.
- Flexible work environment: (Remote options, hybrid schedules, flexible hours, etc.).
- Annual wellness and community outreach days
- Always on recognition for your contributions
- Global collaboration and networking opportunities
Our Culture:
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone. We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to . How to Apply Interested? Submit your application here . We can't wait to hear from you!
Proofpoint has been honored with six Best Places to Work Awards in 2024 by workplace culture leader Comparably, including Best Company Career Growth, Best Company Outlook, Best Global Culture, Best Engineering Teams, Best Sales Teams, and Best HR Teams.
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
Our BRAVE Values:
At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow.
We seek people who are bold enough to challenge the status quo, responsive in the face of ever-evolving threats, and accountable for delivering real impact.
We value those with a visionary mindset who anticipate what's next and push cybersecurity forward, and we celebrate exceptional execution that ensures we continue to defend data and protect people.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Find your network, your allies, and your biggest fans. We know that work is simply better when you're surrounded by people who inspire you-who share ideas, cheer you on, and genuinely want to see you succeed. That's why we offer social circles, sponsored networks, and connection points across teams and time zones-to help you find your people, build your community, and thrive together.
This isn't just a job-it's a mission to protect people and defend data in a world that never slows down. We're building the future of human-centric cybersecurity, and that future belongs to all of us. We take ownership, move fast, and hold ourselves accountable-because that's what it takes to stay ahead. And we do it together, winning as one.
Be empowered to reach your full potential through meaningful challenges and personalized support-designed around you and your goals. Whether you're growing as a leader or leveling up from great to exceptional as an individual contributor, we're here to help you get there.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Vice President, Incident Response Manager, Global Information Security, Australia
Posted 11 days ago
Job Viewed
Job Description
Sydney, Australia
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge ( Description:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
**Your background**
+ Proven experience handling Information Security related events and incidents.
+ Experience in an operations focused role with an emphasis on cyber incident response.
+ Demonstrable experience in the coordination of containment activities related to cyber security incidents.
+ Familiarity with security vulnerabilities exploits and APT tools, techniques, and procedures.
+ Familiarity with network security vulnerabilities, exploits, malware, and digital forensics desirable.
+ An excellent verbal and written communicator who can adapt to their audience.
+ Decisive and can make difficult decisions in what can be a high-pressure environment.
+ Exercise independent judgment in methods, techniques, and evaluation criteria for obtaining results.
+ Able to handle multiple competing priorities in a fast-paced environment and act without causing an undue delay.
+ Supportive and can work well as part of a team as well as independently.
+ Ability to remain calm under pressure.
+ Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
+ Must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks whilst remaining risk and objective focused, with an investigative mindset.
+ Security+ or equivalent certification.
+ GCIH or equivalent certification required within six months of employment.
**What you can expect**
Cyber Incident Response and Management is part of the Cyber Response & Recovery division who provides a globally coordinated and managed response capability for information security events and incidents that may impact the confidentiality, integrity, and/or availability of the Bank's information and information systems or has privacy implications.
The role of the Senior Incident Manager is to coordinate the response and recovery activities from information security incidents. This includes collaboration with appropriate response, assist with determining the root cause of incidents and work with stakeholders and responsible parties to remediate any identified control gaps or failures; Escalate issues to management in a timely manner with appropriate information regarding severity, exposure, and action items; this role requires critical thinking and investigative mindset coupled effective written, and verbal communication skills.
This is a senior role on the team with high visibility at the global level including interacting with and providing direct updates to executives and senior leadership stakeholders. A Senior Incident Manager provides their knowledge and expertise in incident response to lead, mentor, and challenge associates on the team. The team conducts follow-the-sun (FTS) operations which you will work closely with AMRS and APAC regions.
**What you will do**
+ Establish oversight of information security events and cyber incidents and communicate analysis, containment and remediation efforts to all business partners.
+ Cyber incident response and recovery plans will be available to use and should be maintained by the team. Any issues that require management escalation will be expected to be completed in a timely manner including all appropriate information in relation to risk and action times.
+ The Cyber Incident Manager will be expected to provide status updates and post-incident findings for executives and stakeholders in non-technical terms encompassing risk, impact, likelihood, containment and remediation activities and threat actors.
+ Risk management including briefing and recommending actions to executive leadership within Global Information Security and other business partners on events and incidents.
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
To view the "Know your Rights" poster, CLICK HERE ( .
View the LA County Fair Chance Ordinance ( .
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Vice President, Cyber Incident Response Manager, Global Information Security, Australia
Posted 11 days ago
Job Viewed
Job Description
Sydney, Australia
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge ( Description:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
**What you can expect**
Cyber Incident Response and Management is part of the Cyber Response & Recovery division who provides a globally coordinated and managed response capability for information security events and incidents that may impact the confidentiality, integrity, and/or availability of the Bank's information and information systems or has privacy implications.
The role of the Senior Incident Manager is to coordinate the response and recovery activities from information security incidents. This includes collaboration with appropriate response, assist with determining the root cause of incidents and work with stakeholders and responsible parties to remediate any identified control gaps or failures; Escalate issues to management in a timely manner with appropriate information regarding severity, exposure, and action items; this role requires critical thinking and investigative mindset coupled effective written, and verbal communication skills.
This is a senior role on the team with high visibility at the global level including interacting with and providing direct updates to executives and senior leadership stakeholders. A Senior Incident Manager provides their knowledge and expertise in incident response to lead, mentor, and challenge associates on the team. The team conducts follow-the-sun (FTS) operations which you will work closely with AMRS and APAC regions.
**What you will do**
+ Establish oversight of information security events and cyber incidents and communicate analysis, containment and remediation efforts to all business partners.
+ Cyber incident response and recovery plans will be available to use and should be maintained by the team. Any issues that require management escalation will be expected to be completed in a timely manner including all appropriate information in relation to risk and action times.
+ The Cyber Incident Manager will be expected to provide status updates and post-incident findings for executives and stakeholders in non-technical terms encompassing risk, impact, likelihood, containment and remediation activities and threat actors.
+ Risk management including briefing and recommending actions to executive leadership within Global Information Security and other business partners on events and incidents.
**Your background**
+ Proven experience handling Information Security related events and incidents.
+ Experience in an operations focused role with an emphasis on cyber incident response.
+ Demonstrable experience in the coordination of containment activities related to cyber security incidents.
+ Familiarity with security vulnerabilities exploits and APT tools, techniques, and procedures.
+ Familiarity with network security vulnerabilities, exploits, malware, and digital forensics desirable.
+ An excellent verbal and written communicator who can adapt to their audience.
+ Decisive and can make difficult decisions in what can be a high-pressure environment.
+ Exercise independent judgment in methods, techniques, and evaluation criteria for obtaining results.
+ Able to handle multiple competing priorities in a fast-paced environment and act without causing an undue delay.
+ Supportive and can work well as part of a team as well as independently.
+ Ability to remain calm under pressure.
+ Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
+ Must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks whilst remaining risk and objective focused, with an investigative mindset.
+ Security+ or equivalent certification.
+ GCIH or equivalent certification required within six months of employment.
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
To view the "Know your Rights" poster, CLICK HERE ( .
View the LA County Fair Chance Ordinance ( .
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Do you have a passion for application security and working on one of the most important security challenges of current software development? We are looking for a Security Analyst with experience of using static analyzers. As a Security Analyst, you will work collaboratively with other engineers in the Security Tools engineering team to extend and support an in-house static application security testing tool. We value software analysts with initiative and agency who have a passion to learn, build and deploy production-quality application security software.
About the role
In this role of a Security Analyst you will be conducting and documenting a highly complex information security risk assessments, developing and implementing security processes. As a member of the Software Assurance central services team you will be responsible for the configuration and deployment of SAST tools, as well as reviewing and reporting vulnerability reports issued by SAST and SCA tooling. Upon finding vulnerabilities you will be required to deep dive into each of them individually, performing further analysis, in order to avoid false positives and ensure high accuracy of findings. You will be responsible for planning, developing processes, documenting them while interacting with a variety of teams across our Software Assurance organisation, train staff, and be the go-to person for such security processes. You foster the collaborative atmosphere to enable buy-in into security processes and cross-team collaboration. You are ambitious, yet humble - you realise there are always opportunities for improvement, you take on feedback from team members and introspect to raise the bar for yourself and your organization. You are comfortable with ambiguity. Your responsibilities also include contributing to the design, implementation, integration and testing of analysis support in the tool for a variety of languages including C/C++, Objective-C, Java, Python, and Go.
This position will require 100% onsite work in our office in North Ryde.
What You'll Bring
- Bachelor's Degree in Computer Science, Software Engineering or related disciplines
- Good understanding of application security, CVE classification system (Common Vulnerabilities and Exposures) and OWASP top 10
- Experience in program analysis, compilers, or web application security
- Have worked and understand report outputs through SAST and SCA tooling.
- Ability to review vulnerabilities in open-source software written in Java and/or GoLang, C/C++, Python.
- Foundational skills in Python programming
- Familiar with SCM/software version control tools (e.g., Git)
- A strong interest in application security, willingness to learn and seek out information to solve challenging problems is essential
--- Strong analytical skills combined with good communication skills and fluent English
-- Eligibility to work in Australia without sponsorship is essential
-- Ability to work as part of a team as well as independently
Nice to Have
-- Masters or PhD in Computer Science, Software Engineering in a field related to program analysis or application security
-- Prior experience in a software development role
-- Knowledge and experience of security testing tools
- DevSecOps and/or CI/CD experience
--- Automation experience using Python
-- Experience working with geographically distributed teams
What We'll Give You
- An organization filled with smart, enthusiastic, and supportive colleagues
- A team of very skilled and diverse personnel across the globe
- The resources of a large, global operation while still having the start-up feel of a small team
Work You'll Do
- Review and categorize software security analysis vulnerability findings
- Report and document vulnerability findings
-- Identify duplications and false positive vulnerability reports
-- Review commonly used software libraries to model their behaviour for SAST tools
- Partner with software development through ongoing security identification
--- Partner with Site reliability engineering to help identify and work with them to improve automation mechanisms
--- Seek out opportunities to improve systems and reporting mechanisms
Who We Are
We are a world-class team of high-caliber security software developers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on advancing the state-of-the-art for developers through SAST and SCA tools. The Security Tools organization has the mission to make application security, at scale, a reality. We are a dedicated team, leveraging each other's insights and abilities to produce cutting edge solutions for today's complex codebases. We value people who can use their Program Analysis and/or Data Analytics skills to further develop and enhance our tools, as well as support new language features or vulnerability types. Join us to grow your career and create the future of application security at scale together.
_#LI-DNI_
Career Level - IC2
Career Level - IC2
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Analyst
Posted 13 days ago
Job Viewed
Job Description
Do you have a passion for application security and working on one of the most important security challenges of current software development? We are looking for a Security Analyst with experience of using static analyzers. As a Security Analyst, you will work collaboratively with other engineers in the Security Tools engineering team to extend and support an in-house static application security testing tool. We value software analysts with initiative and agency who have a passion to learn, build and deploy production-quality application security software.
About the role
In this role of a Security Analyst you will be conducting and documenting a highly complex information security risk assessments, developing and implementing security processes. As a member of the Software Assurance central services team you will be responsible for the configuration and deployment of SAST tools, as well as reviewing and reporting vulnerability reports issued by SAST and SCA tooling. Upon finding vulnerabilities you will be required to deep dive into each of them individually, performing further analysis, in order to avoid false positives and ensure high accuracy of findings. You will be responsible for planning, developing processes, documenting them while interacting with a variety of teams across our Software Assurance organisation, train staff, and be the go-to person for such security processes. You foster the collaborative atmosphere to enable buy-in into security processes and cross-team collaboration. You are ambitious, yet humble - you realise there are always opportunities for improvement, you take on feedback from team members and introspect to raise the bar for yourself and your organization. You are comfortable with ambiguity. Your responsibilities also include contributing to the design, implementation, integration and testing of analysis support in the tool for a variety of languages including C/C++, Objective-C, Java, Python, and Go.
This position will require 100% onsite work in our office in North Ryde.
What You'll Bring
- Bachelor's Degree in Computer Science, Software Engineering or related disciplines
- Good understanding of application security, CVE classification system (Common Vulnerabilities and Exposures) and OWASP top 10
- Experience in program analysis, compilers, or web application security
- Have worked and understand report outputs through SAST and SCA tooling.
- Ability to review vulnerabilities in open-source software written in Java and/or GoLang, C/C++, Python.
- Foundational skills in Python programming
- Familiar with SCM/software version control tools (e.g., Git)
- A strong interest in application security, willingness to learn and seek out information to solve challenging problems is essential
--- Strong analytical skills combined with good communication skills and fluent English
-- Eligibility to work in Australia without sponsorship is essential
-- Ability to work as part of a team as well as independently
Nice to Have
-- Masters or PhD in Computer Science, Software Engineering in a field related to program analysis or application security
-- Prior experience in a software development role
-- Knowledge and experience of security testing tools
- DevSecOps and/or CI/CD experience
--- Automation experience using Python
-- Experience working with geographically distributed teams
What We'll Give You
- An organization filled with smart, enthusiastic, and supportive colleagues
- A team of very skilled and diverse personnel across the globe
- The resources of a large, global operation while still having the start-up feel of a small team
Work You'll Do
- Review and categorize software security analysis vulnerability findings
- Report and document vulnerability findings
-- Identify duplications and false positive vulnerability reports
-- Review commonly used software libraries to model their behaviour for SAST tools
- Partner with software development through ongoing security identification
--- Partner with Site reliability engineering to help identify and work with them to improve automation mechanisms
--- Seek out opportunities to improve systems and reporting mechanisms
Who We Are
We are a world-class team of high-caliber security software developers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on advancing the state-of-the-art for developers through SAST and SCA tools. The Security Tools organization has the mission to make application security, at scale, a reality. We are a dedicated team, leveraging each other's insights and abilities to produce cutting edge solutions for today's complex codebases. We value people who can use their Program Analysis and/or Data Analytics skills to further develop and enhance our tools, as well as support new language features or vulnerability types. Join us to grow your career and create the future of application security at scale together.
_#LI-DNI_
Career Level - IC2
Career Level - IC2
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Cyber Security Analyst
Posted 11 days ago
Job Viewed
Job Description
+ **Leidos Life Hub** provides access to discount offers or cashback rewards with over 400 Australian and International retailers.
+ Due to the nature of the role, **you must be an Australian Citizen and hold either a NV-1 or NV-2 Security Clearance**
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Leidos Australia is expanding our 24x7x365 Central Processing Cyber Security Operations Centre (CP SOC) capability with the Department of Defence. CP SOC works collaboratively with the Defence Security Operations Centre (DSOC) to assist in defending one of the largest and most complex ICT networks in the southern hemisphere.
We seek Cyber Security Analysts to work on a rotating shift roster (typically 12-hour shifts) onsite at HMAS Harman in Canberra.
The roles and responsibilities extend to:
+ **Monitor and Analyse Security Events:** Continuously monitor networks and endpoints for security alerts, threats, and intrusions using SIEM tools, IDS/IPS, and endpoint protection systems.
+ **Incident Response and Management:** Triage, investigate, and manage security incidents end-to-end, including escalation and reporting as required.
+ **Threat and Vulnerability Management:** Assess emerging threats and vulnerabilities, develop custom detection signatures, and implement measures to mitigate risks.
+ **Security Tool Administration and Process Improvement:** Maintain and support security tools, review and improve operational processes, and ensure the health of deployed security systems.
+ **Stakeholder Communication and Reporting:** Collaborate with internal teams and stakeholders, produce reports, and contribute to the development of SOC tactics, techniques, and procedures.
**What You'll Bring to Make an Impact**
+ **Technical Cyber Security Knowledge:** Working knowledge of industry and government cybersecurity frameworks, SIEM tools, IDS/IPS, and endpoint security solutions.
+ **Analytical and Problem-Solving Skills:** Ability to identify, analyse, and resolve complex security issues with a proactive and self-starting approach.
+ **Incident Response Expertise:** Experience in detecting, responding to, and mitigating cyber threats using adversary TTPs and IOCs.
+ **Communication and Stakeholder Management:** Strong verbal and written communication skills for incident reporting and stakeholder engagement.
+ **Adaptability and Continuous Learning:** Willingness to rapidly upskill, work in a 24/7 rotating shift environment, and stay updated on evolving cyber threats.
Don't worry if you don't tick all the boxes - if you meet most of them, we encourage you to submit your application. We're most interested in your strengths, what you want to learn and how far you want to go.
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - 1 virtual interview and/or 1 face-to-face & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please get in touch with our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now."
If you're already scheming step 20 while everyone else is still debating step 2. good. You'll fit right in.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R- -OTHLOC-PL-2D0397
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
Be The First To Know
About the latest Threat analyst Jobs in Australia !
Cyber Security Analyst
Posted 11 days ago
Job Viewed
Job Description
+ **Leidos Life Hub** provides access to discount offers or cashback rewards with over 400 Australian and International retailers.
+ Due to the nature of the role, **you must be an Australian Citizen and hold either a NV-1 or NV-2 Security Clearance**
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Leidos Australia is expanding our 24x7x365 Central Processing Cyber Security Operations Centre (CP SOC) capability with the Department of Defence. CP SOC works collaboratively with the Defence Security Operations Centre (DSOC) to assist in defending one of the largest and most complex ICT networks in the southern hemisphere.
We seek Cyber Security Analysts to work on a rotating shift roster (typically 12-hour shifts) onsite at HMAS Harman in Canberra.
The roles and responsibilities extend to:
+ **Monitor and Analyse Security Events:** Continuously monitor networks and endpoints for security alerts, threats, and intrusions using SIEM tools, IDS/IPS, and endpoint protection systems.
+ **Incident Response and Management:** Triage, investigate, and manage security incidents end-to-end, including escalation and reporting as required.
+ **Threat and Vulnerability Management:** Assess emerging threats and vulnerabilities, develop custom detection signatures, and implement measures to mitigate risks.
+ **Security Tool Administration and Process Improvement:** Maintain and support security tools, review and improve operational processes, and ensure the health of deployed security systems.
+ **Stakeholder Communication and Reporting:** Collaborate with internal teams and stakeholders, produce reports, and contribute to the development of SOC tactics, techniques, and procedures.
**What You'll Bring to Make an Impact**
+ **Technical Cyber Security Knowledge:** Working knowledge of industry and government cybersecurity frameworks, SIEM tools, IDS/IPS, and endpoint security solutions.
+ **Analytical and Problem-Solving Skills:** Ability to identify, analyse, and resolve complex security issues with a proactive and self-starting approach.
+ **Incident Response Expertise:** Experience in detecting, responding to, and mitigating cyber threats using adversary TTPs and IOCs.
+ **Communication and Stakeholder Management:** Strong verbal and written communication skills for incident reporting and stakeholder engagement.
+ **Adaptability and Continuous Learning:** Willingness to rapidly upskill, work in a 24/7 rotating shift environment, and stay updated on evolving cyber threats.
Don't worry if you don't tick all the boxes - if you meet most of them, we encourage you to submit your application. We're most interested in your strengths, what you want to learn and how far you want to go.
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - 1 virtual interview and/or 1 face-to-face & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please get in touch with our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now."
If you're already scheming step 20 while everyone else is still debating step 2. good. You'll fit right in.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
It security analyst
Posted 10 days ago
Job Viewed
Job Description
Robert Walters in Brisbane are seeking a Cyber Security Analyst for a Cyber Security Consultancy in Brisbane. This Full-time, Permanent role presents an exciting opportunity to make a meaningful impact by protecting critical systems and data from emerging threats. You will be part of a supportive environment that values your expertise and encourages ongoing professional development through training opportunities.
Salary: $93000+Super
Location: Brisbane
Flexibility: Hybrid
Roles and Responsibilities
- Monitor security alerts and events generated by various security tools and systems to identify potential security incidents across multiple platforms.
- Conduct thorough analysis of security events to assess the extent and impact of possible breaches or vulnerabilities within organisational infrastructure.
- Investigate and triage security incidents efficiently, escalating complex cases to senior analysts or incident response teams as required for swift resolution.
- Develop and maintain comprehensive documentation related to incident response procedures, including detailed playbooks for consistent operations.
- Collaborate closely with other members of the Security Operations Centre (SOC) team to enhance detection capabilities and streamline response processes for improved outcomes.
- Provide timely and accurate reports on security incidents, including root cause analysis and actionable recommendations for remediation to minimise future risks.
- Stay up-to-date with emerging threats, vulnerabilities, and advancements in security technologies to continuously strengthen the effectiveness of security operations.
- Participate actively in an on-call roster for out-of-hours alert management and incident response duties as part of a dependable team approach.
- Engage in set-piece project work aimed at improving customers' cyber security posture through targeted initiatives and best practice implementation.
The Ideal Candidate:
- The successful applicant will need to hold at least a bachelor's degree in a relevant field such as Information Technology, Computer Science or Cyber Security which provides you with foundational knowledge essential for this role.
- At least two years of hands-on experience working within cyber security environments where you have demonstrated your ability to monitor alerts and respond effectively to incidents.
- Your excellent analytical skills enable you to conduct thorough investigations into complex security events while assessing risk levels accurately.
- You possess strong written communication skills that allow you to produce clear documentation such as incident response runbooks and playbooks.
- Your interpersonal abilities foster collaboration within SOC teams as you work together towards shared goals of enhanced detection capability and streamlined responses.
- You demonstrate dependability by participating willingly in on-call rosters for out-of-hours incident management when required by business needs.
- Your commitment to continuous learning ensures that you remain current with emerging threats, vulnerabilities, and new technologies relevant to cyber defence.
- You show sensitivity towards customer needs when engaging in project work aimed at improving their overall cyber security posture through tailored solutions.
What's next:
If you are ready to take the next step in your cyber security career within a collaborative team environment that values your expertise-this is your opportunity!
Aboriginal and Torres Strait Islander Peoples are encouraged to apply.
To apply, please click "Apply" or contact Richard Lynch on or for a confidential discussion.
Personnel Security Analyst, AWS Security
Posted 11 days ago
Job Viewed
Job Description
Amazon Web Services (AWS) is the leading cloud service provider, providing virtualised infrastructure, storage, networking, messaging, and many other services to customers all over the world. AWS runs a globally distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises to large government customers, run their operations and applications on AWS' highly secure infrastructure.
The AWS Personnel Security (PerSec) team is responsible managing security clearance and vetting activities for AWS employees supporting programs, including continual assessments on suitability. As a Personnel Security Analyst, you will join a team of industry-leading security experts working with customer representatives to operate and continuously improve industry-leading personnel security programs and processes.
The AWS Security team requires innovative thinking that is balanced with a strong customer focus on quality and execution. You will have a strong track record of leading and supporting security programs, demonstrable program/project management experience, comprehensive knowledge of government clearance (e.g. AGSVA) process and reporting requirements, and a deep understanding of government security programs and processes (including securely on-boarding program staff). You will obsess over internal and external customers and successfully deliver support and services in an environment where priorities shift extremely fast. You must be able to operate independently to lead and manage personnel security projects, continuously triage and prioritise accordingly, communicate clearly and compellingly.
Key job responsibilities
- Process and review personnel security clearances and maintain all security documentation, files, and clearance and suitability rosters in accordance with government requirements.
- Contribute to the development and evolution of personnel security programs, ensuring they are operating in accordance with internal teams and external customers security policies and practices.
- Generate, track and report security metrics and activities.
- Monitor processes and drive improvements in efficiency and quality of our personnel security programs.
- Interface regularly with AWS stakeholders and government customers to support clearance activities.
Hold or be able to attain an Australian Government Security Vetting Agency clearance (see day in the life
A typical day in the life of a Personnel Security Analyst begins with supporting the Personnel Security team by processing security clearances, travel notifications, and other PerSec activities, ensuring all necessary protocols are followed meticulously. Throughout the day, you will actively identifies ways to invent and simplify processes and procedures, streamlining operations for increased efficiency. You will also dedicate time to creating comprehensive reports on PerSec data and metrics, providing valuable insights to stakeholders for informed decision-making. Additionally, you will offer advice on straightforward PerSec issues to stakeholders, leveraging their expertise to address concerns effectively. You will conducts security briefings and training sessions to educate staff on best practices and compliance measures. Managing a PerSec mailbox is another crucial aspect of their day, ensuring timely responses and resolution of security-related inquiries and requests. Overall, the personnel security specialist plays a vital role in maintaining a secure and compliant environment while actively contributing to process improvement and stakeholder support.
About the team
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying.
Why Amazon Security
At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores.
The team is comprised of security professionals with a cross section of national security and private sector experience, providing a range of perspectives required for creative problem solving. We value diversity of thought, creativity, and a strong Bias for Action and Earn Trust. We believe that there are no "perfect" security solutions and we develop and iterate using a continuous improvement process.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve.
Inclusive Team Culture
AWS values curiosity and connection. Our employee-led and company-sponsored affinity groups promote inclusion and empower our people to take pride in what makes us unique. Our inclusion events foster stronger, more collaborative teams. Our continual innovation is fueled by the bold ideas, fresh perspectives, and passionate voices our teams bring to everything we do.
Mentorship & Career Growth
We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Basic Qualifications
- Minimum 2 years of professional experience working on sensitive, high security programs, projects or environments
- Demonstrated experience as an analyst or similar in a government or commercial setting
- Proficient with government security frameworks, policies and standards (e.g. PSPF, ISM, DSPF. ASD Essential Eight
Preferred Qualifications
- Degree or equivalent experience in (Cyber Security, IT Security Management, Government Security, Personnel Security, Security Risk Management) a related security field
- Certificate IV in Government Security (Personnel Vetting)
- An entrepreneurial spirit; a passion to improve at every opportunity
Acknowledgement of country:
In the spirit of reconciliation Amazon acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.
IDE statement:
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.