13 Vulnerability Assessment jobs in Australia
Job No Longer Available
This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.
However, we have similar jobs available for you below.
Penetration Testing Specialist - M365 - Offensive Security
Posted 7 days ago
Job Viewed
Job Description
Are you passionate about identifying and exploiting security vulnerabilities that impact hundreds of millions of users across the world? Join the M365 Security organization, where you will emulate real-world advanced persistent threats against Microsoft. Our mission is to ensure Microsoft is prepared to face and respond to even the most determined adversaries by exploring innovative ways to identify and prevent security flaws.
We are looking for a **Penetration Testing Specialist** to execute operations and collaborate with other experienced pen testers in identifying and exploiting vulnerabilities across all layers of services, including application, cloud, network, hardware, and operational security domains. You will work closely with developers and security personnel from multiple teams across Microsoft. Additionally, as a Security Engineer in M365, you will be responsible for executing tactics, techniques, and procedures of potential attackers, while providing critical insights that empower our security teams to strengthen defenses and protect against the evolving landscape of digital threats.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
+ Discover and exploit vulnerabilities end-to-end in order to assess the security of services.
+ Execute operations using real world adversarial tactics and techniques to validate a production service's ability to detect, investigate, and respond.
+ Advocate for security change across the company through building partnerships and clearly communicating impact of risks.
+ Analyze a wide array of data sources to identify potential security weaknesses and breach points within Microsoft's infrastructure.
+ Prototype tools and techniques to scale and accelerate offensive emulation and vulnerability discovery.
+ Collaborate with Blue Teams to improve readiness and produce solutions for defenders and customers.
+ Analyze simulated adversary tactics and communications, enriching our defensive tactics and threat intelligence.
**Qualifications**
**Required Qualifications:**
+ 3+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
**Other Requirements:**
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:
+ **Microsoft Cloud Background Check** : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Preferred Qualifications:**
+ Master's Degree in Statistics, Mathematics, Computer Science
+ OR related field
+ OR 4+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Penetration Testing Specialist - M365 - Offensive Security
Posted 7 days ago
Job Viewed
Job Description
Are you passionate about identifying and exploiting security vulnerabilities that impact hundreds of millions of users across the world? Join the M365 Security organization, where you will emulate real-world advanced persistent threats against Microsoft. Our mission is to ensure Microsoft is prepared to face and respond to even the most determined adversaries by exploring innovative ways to identify and prevent security flaws.
We are looking for a **Penetration Testing Specialist** to execute operations and collaborate with other experienced pen testers in identifying and exploiting vulnerabilities across all layers of services, including application, cloud, network, hardware, and operational security domains. You will work closely with developers and security personnel from multiple teams across Microsoft. Additionally, as a Security Engineer in M365, you will be responsible for executing tactics, techniques, and procedures of potential attackers, while providing critical insights that empower our security teams to strengthen defenses and protect against the evolving landscape of digital threats.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
+ Discover and exploit vulnerabilities end-to-end in order to assess the security of services.
+ Execute operations using real world adversarial tactics and techniques to validate a production service's ability to detect, investigate, and respond.
+ Advocate for security change across the company through building partnerships and clearly communicating impact of risks.
+ Analyze a wide array of data sources to identify potential security weaknesses and breach points within Microsoft's infrastructure.
+ Prototype tools and techniques to scale and accelerate offensive emulation and vulnerability discovery.
+ Collaborate with Blue Teams to improve readiness and produce solutions for defenders and customers.
+ Analyze simulated adversary tactics and communications, enriching our defensive tactics and threat intelligence.
**Qualifications**
**Required Qualifications:**
+ 3+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
**Other Requirements:**
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:
+ **Microsoft Cloud Background Check** : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Preferred Qualifications:**
+ Master's Degree in Statistics, Mathematics, Computer Science
+ OR related field
+ OR 4+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Penetration Testing Specialist - M365 - Offensive Security
Posted 7 days ago
Job Viewed
Job Description
Are you passionate about identifying and exploiting security vulnerabilities that impact hundreds of millions of users across the world? Join the M365 Security organization, where you will emulate real-world advanced persistent threats against Microsoft. Our mission is to ensure Microsoft is prepared to face and respond to even the most determined adversaries by exploring innovative ways to identify and prevent security flaws.
We are looking for a **Penetration Testing Specialist** to execute operations and collaborate with other experienced pen testers in identifying and exploiting vulnerabilities across all layers of services, including application, cloud, network, hardware, and operational security domains. You will work closely with developers and security personnel from multiple teams across Microsoft. Additionally, as a Security Engineer in M365, you will be responsible for executing tactics, techniques, and procedures of potential attackers, while providing critical insights that empower our security teams to strengthen defenses and protect against the evolving landscape of digital threats.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
+ Discover and exploit vulnerabilities end-to-end in order to assess the security of services.
+ Execute operations using real world adversarial tactics and techniques to validate a production service's ability to detect, investigate, and respond.
+ Advocate for security change across the company through building partnerships and clearly communicating impact of risks.
+ Analyze a wide array of data sources to identify potential security weaknesses and breach points within Microsoft's infrastructure.
+ Prototype tools and techniques to scale and accelerate offensive emulation and vulnerability discovery.
+ Collaborate with Blue Teams to improve readiness and produce solutions for defenders and customers.
+ Analyze simulated adversary tactics and communications, enriching our defensive tactics and threat intelligence.
**Qualifications**
**Required Qualifications:**
+ 3+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
**Other Requirements:**
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:
+ **Microsoft Cloud Background Check** : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Preferred Qualifications:**
+ Master's Degree in Statistics, Mathematics, Computer Science
+ OR related field
+ OR 4+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Penetration Testing Specialist - M365 - Offensive Security
Posted 7 days ago
Job Viewed
Job Description
Are you passionate about identifying and exploiting security vulnerabilities that impact hundreds of millions of users across the world? Join the M365 Security organization, where you will emulate real-world advanced persistent threats against Microsoft. Our mission is to ensure Microsoft is prepared to face and respond to even the most determined adversaries by exploring innovative ways to identify and prevent security flaws.
We are looking for a **Penetration Testing Specialist** to execute operations and collaborate with other experienced pen testers in identifying and exploiting vulnerabilities across all layers of services, including application, cloud, network, hardware, and operational security domains. You will work closely with developers and security personnel from multiple teams across Microsoft. Additionally, as a Security Engineer in M365, you will be responsible for executing tactics, techniques, and procedures of potential attackers, while providing critical insights that empower our security teams to strengthen defenses and protect against the evolving landscape of digital threats.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day.
**Responsibilities**
+ Discover and exploit vulnerabilities end-to-end in order to assess the security of services.
+ Execute operations using real world adversarial tactics and techniques to validate a production service's ability to detect, investigate, and respond.
+ Advocate for security change across the company through building partnerships and clearly communicating impact of risks.
+ Analyze a wide array of data sources to identify potential security weaknesses and breach points within Microsoft's infrastructure.
+ Prototype tools and techniques to scale and accelerate offensive emulation and vulnerability discovery.
+ Collaborate with Blue Teams to improve readiness and produce solutions for defenders and customers.
+ Analyze simulated adversary tactics and communications, enriching our defensive tactics and threat intelligence.
**Qualifications**
**Required Qualifications:**
+ 3+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
**Other Requirements:**
Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include but are not limited to the following specialized security screenings:
+ **Microsoft Cloud Background Check** : This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
**Preferred Qualifications:**
+ Master's Degree in Statistics, Mathematics, Computer Science
+ OR related field
+ OR 4+ years experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection.
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Security Analyst
Posted 9 days ago
Job Viewed
Job Description
Do you have a passion for application security and working on one of the most important security challenges of current software development? We are looking for a Security Analyst with experience of using static analyzers. As a Security Analyst, you will work collaboratively with other engineers in the Security Tools engineering team to extend and support an in-house static application security testing tool. We value software analysts with initiative and agency who have a passion to learn, build and deploy production-quality application security software.
About the role
In this role of a Security Analyst you will be conducting and documenting a highly complex information security risk assessments, developing and implementing security processes. As a member of the Software Assurance central services team you will be responsible for the configuration and deployment of SAST tools, as well as reviewing and reporting vulnerability reports issued by SAST and SCA tooling. Upon finding vulnerabilities you will be required to deep dive into each of them individually, performing further analysis, in order to avoid false positives and ensure high accuracy of findings. You will be responsible for planning, developing processes, documenting them while interacting with a variety of teams across our Software Assurance organisation, train staff, and be the go-to person for such security processes. You foster the collaborative atmosphere to enable buy-in into security processes and cross-team collaboration. You are ambitious, yet humble - you realise there are always opportunities for improvement, you take on feedback from team members and introspect to raise the bar for yourself and your organization. You are comfortable with ambiguity. Your responsibilities also include contributing to the design, implementation, integration and testing of analysis support in the tool for a variety of languages including C/C++, Objective-C, Java, Python, and Go.
This position will require 100% onsite work in our office in North Ryde.
What You'll Bring
- Bachelor's Degree in Computer Science, Software Engineering or related disciplines
- Good understanding of application security, CVE classification system (Common Vulnerabilities and Exposures) and OWASP top 10
- Experience in program analysis, compilers, or web application security
- Have worked and understand report outputs through SAST and SCA tooling.
- Ability to review vulnerabilities in open-source software written in Java and/or GoLang, C/C++, Python.
- Foundational skills in Python programming
- Familiar with SCM/software version control tools (e.g., Git)
- A strong interest in application security, willingness to learn and seek out information to solve challenging problems is essential
--- Strong analytical skills combined with good communication skills and fluent English
-- Eligibility to work in Australia without sponsorship is essential
-- Ability to work as part of a team as well as independently
Nice to Have
-- Masters or PhD in Computer Science, Software Engineering in a field related to program analysis or application security
-- Prior experience in a software development role
-- Knowledge and experience of security testing tools
- DevSecOps and/or CI/CD experience
--- Automation experience using Python
-- Experience working with geographically distributed teams
What We'll Give You
- An organization filled with smart, enthusiastic, and supportive colleagues
- A team of very skilled and diverse personnel across the globe
- The resources of a large, global operation while still having the start-up feel of a small team
Work You'll Do
- Review and categorize software security analysis vulnerability findings
- Report and document vulnerability findings
-- Identify duplications and false positive vulnerability reports
-- Review commonly used software libraries to model their behaviour for SAST tools
- Partner with software development through ongoing security identification
--- Partner with Site reliability engineering to help identify and work with them to improve automation mechanisms
--- Seek out opportunities to improve systems and reporting mechanisms
Who We Are
We are a world-class team of high-caliber security software developers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on advancing the state-of-the-art for developers through SAST and SCA tools. The Security Tools organization has the mission to make application security, at scale, a reality. We are a dedicated team, leveraging each other's insights and abilities to produce cutting edge solutions for today's complex codebases. We value people who can use their Program Analysis and/or Data Analytics skills to further develop and enhance our tools, as well as support new language features or vulnerability types. Join us to grow your career and create the future of application security at scale together.
_#LI-DNI_
Career Level - IC2
Career Level - IC2
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Analyst
Posted 9 days ago
Job Viewed
Job Description
Do you have a passion for application security and working on one of the most important security challenges of current software development? We are looking for a Security Analyst with experience of using static analyzers. As a Security Analyst, you will work collaboratively with other engineers in the Security Tools engineering team to extend and support an in-house static application security testing tool. We value software analysts with initiative and agency who have a passion to learn, build and deploy production-quality application security software.
About the role
In this role of a Security Analyst you will be conducting and documenting a highly complex information security risk assessments, developing and implementing security processes. As a member of the Software Assurance central services team you will be responsible for the configuration and deployment of SAST tools, as well as reviewing and reporting vulnerability reports issued by SAST and SCA tooling. Upon finding vulnerabilities you will be required to deep dive into each of them individually, performing further analysis, in order to avoid false positives and ensure high accuracy of findings. You will be responsible for planning, developing processes, documenting them while interacting with a variety of teams across our Software Assurance organisation, train staff, and be the go-to person for such security processes. You foster the collaborative atmosphere to enable buy-in into security processes and cross-team collaboration. You are ambitious, yet humble - you realise there are always opportunities for improvement, you take on feedback from team members and introspect to raise the bar for yourself and your organization. You are comfortable with ambiguity. Your responsibilities also include contributing to the design, implementation, integration and testing of analysis support in the tool for a variety of languages including C/C++, Objective-C, Java, Python, and Go.
This position will require 100% onsite work in our office in North Ryde.
What You'll Bring
- Bachelor's Degree in Computer Science, Software Engineering or related disciplines
- Good understanding of application security, CVE classification system (Common Vulnerabilities and Exposures) and OWASP top 10
- Experience in program analysis, compilers, or web application security
- Have worked and understand report outputs through SAST and SCA tooling.
- Ability to review vulnerabilities in open-source software written in Java and/or GoLang, C/C++, Python.
- Foundational skills in Python programming
- Familiar with SCM/software version control tools (e.g., Git)
- A strong interest in application security, willingness to learn and seek out information to solve challenging problems is essential
--- Strong analytical skills combined with good communication skills and fluent English
-- Eligibility to work in Australia without sponsorship is essential
-- Ability to work as part of a team as well as independently
Nice to Have
-- Masters or PhD in Computer Science, Software Engineering in a field related to program analysis or application security
-- Prior experience in a software development role
-- Knowledge and experience of security testing tools
- DevSecOps and/or CI/CD experience
--- Automation experience using Python
-- Experience working with geographically distributed teams
What We'll Give You
- An organization filled with smart, enthusiastic, and supportive colleagues
- A team of very skilled and diverse personnel across the globe
- The resources of a large, global operation while still having the start-up feel of a small team
Work You'll Do
- Review and categorize software security analysis vulnerability findings
- Report and document vulnerability findings
-- Identify duplications and false positive vulnerability reports
-- Review commonly used software libraries to model their behaviour for SAST tools
- Partner with software development through ongoing security identification
--- Partner with Site reliability engineering to help identify and work with them to improve automation mechanisms
--- Seek out opportunities to improve systems and reporting mechanisms
Who We Are
We are a world-class team of high-caliber security software developers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on advancing the state-of-the-art for developers through SAST and SCA tools. The Security Tools organization has the mission to make application security, at scale, a reality. We are a dedicated team, leveraging each other's insights and abilities to produce cutting edge solutions for today's complex codebases. We value people who can use their Program Analysis and/or Data Analytics skills to further develop and enhance our tools, as well as support new language features or vulnerability types. Join us to grow your career and create the future of application security at scale together.
_#LI-DNI_
Career Level - IC2
Career Level - IC2
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing or by calling in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Cyber Security Analyst
Posted 7 days ago
Job Viewed
Job Description
+ **Leidos Life Hub** provides access to discount offers or cashback rewards with over 400 Australian and International retailers.
+ Due to the nature of the role, **you must be an Australian Citizen and hold either a NV-1 or NV-2 Security Clearance**
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Leidos Australia is expanding our 24x7x365 Central Processing Cyber Security Operations Centre (CP SOC) capability with the Department of Defence. CP SOC works collaboratively with the Defence Security Operations Centre (DSOC) to assist in defending one of the largest and most complex ICT networks in the southern hemisphere.
We seek Cyber Security Analysts to work on a rotating shift roster (typically 12-hour shifts) onsite at HMAS Harman in Canberra.
The roles and responsibilities extend to:
+ **Monitor and Analyse Security Events:** Continuously monitor networks and endpoints for security alerts, threats, and intrusions using SIEM tools, IDS/IPS, and endpoint protection systems.
+ **Incident Response and Management:** Triage, investigate, and manage security incidents end-to-end, including escalation and reporting as required.
+ **Threat and Vulnerability Management:** Assess emerging threats and vulnerabilities, develop custom detection signatures, and implement measures to mitigate risks.
+ **Security Tool Administration and Process Improvement:** Maintain and support security tools, review and improve operational processes, and ensure the health of deployed security systems.
+ **Stakeholder Communication and Reporting:** Collaborate with internal teams and stakeholders, produce reports, and contribute to the development of SOC tactics, techniques, and procedures.
**What You'll Bring to Make an Impact**
+ **Technical Cyber Security Knowledge:** Working knowledge of industry and government cybersecurity frameworks, SIEM tools, IDS/IPS, and endpoint security solutions.
+ **Analytical and Problem-Solving Skills:** Ability to identify, analyse, and resolve complex security issues with a proactive and self-starting approach.
+ **Incident Response Expertise:** Experience in detecting, responding to, and mitigating cyber threats using adversary TTPs and IOCs.
+ **Communication and Stakeholder Management:** Strong verbal and written communication skills for incident reporting and stakeholder engagement.
+ **Adaptability and Continuous Learning:** Willingness to rapidly upskill, work in a 24/7 rotating shift environment, and stay updated on evolving cyber threats.
Don't worry if you don't tick all the boxes - if you meet most of them, we encourage you to submit your application. We're most interested in your strengths, what you want to learn and how far you want to go.
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - 1 virtual interview and/or 1 face-to-face & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please get in touch with our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now."
If you're already scheming step 20 while everyone else is still debating step 2. good. You'll fit right in.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R- -OTHLOC-PL-2D0397
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
Be The First To Know
About the latest Vulnerability assessment Jobs in Australia !
Cyber Security Analyst
Posted 7 days ago
Job Viewed
Job Description
+ **Leidos Life Hub** provides access to discount offers or cashback rewards with over 400 Australian and International retailers.
+ Due to the nature of the role, **you must be an Australian Citizen and hold either a NV-1 or NV-2 Security Clearance**
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Leidos Australia is expanding our 24x7x365 Central Processing Cyber Security Operations Centre (CP SOC) capability with the Department of Defence. CP SOC works collaboratively with the Defence Security Operations Centre (DSOC) to assist in defending one of the largest and most complex ICT networks in the southern hemisphere.
We seek Cyber Security Analysts to work on a rotating shift roster (typically 12-hour shifts) onsite at HMAS Harman in Canberra.
The roles and responsibilities extend to:
+ **Monitor and Analyse Security Events:** Continuously monitor networks and endpoints for security alerts, threats, and intrusions using SIEM tools, IDS/IPS, and endpoint protection systems.
+ **Incident Response and Management:** Triage, investigate, and manage security incidents end-to-end, including escalation and reporting as required.
+ **Threat and Vulnerability Management:** Assess emerging threats and vulnerabilities, develop custom detection signatures, and implement measures to mitigate risks.
+ **Security Tool Administration and Process Improvement:** Maintain and support security tools, review and improve operational processes, and ensure the health of deployed security systems.
+ **Stakeholder Communication and Reporting:** Collaborate with internal teams and stakeholders, produce reports, and contribute to the development of SOC tactics, techniques, and procedures.
**What You'll Bring to Make an Impact**
+ **Technical Cyber Security Knowledge:** Working knowledge of industry and government cybersecurity frameworks, SIEM tools, IDS/IPS, and endpoint security solutions.
+ **Analytical and Problem-Solving Skills:** Ability to identify, analyse, and resolve complex security issues with a proactive and self-starting approach.
+ **Incident Response Expertise:** Experience in detecting, responding to, and mitigating cyber threats using adversary TTPs and IOCs.
+ **Communication and Stakeholder Management:** Strong verbal and written communication skills for incident reporting and stakeholder engagement.
+ **Adaptability and Continuous Learning:** Willingness to rapidly upskill, work in a 24/7 rotating shift environment, and stay updated on evolving cyber threats.
Don't worry if you don't tick all the boxes - if you meet most of them, we encourage you to submit your application. We're most interested in your strengths, what you want to learn and how far you want to go.
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - 1 virtual interview and/or 1 face-to-face & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please get in touch with our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now."
If you're already scheming step 20 while everyone else is still debating step 2. good. You'll fit right in.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
It security analyst
Posted 7 days ago
Job Viewed
Job Description
Robert Walters in Brisbane are seeking a Cyber Security Analyst for a Cyber Security Consultancy in Brisbane. This Full-time, Permanent role presents an exciting opportunity to make a meaningful impact by protecting critical systems and data from emerging threats. You will be part of a supportive environment that values your expertise and encourages ongoing professional development through training opportunities.
Salary: $93000+Super
Location: Brisbane
Flexibility: Hybrid
Roles and Responsibilities
- Monitor security alerts and events generated by various security tools and systems to identify potential security incidents across multiple platforms.
- Conduct thorough analysis of security events to assess the extent and impact of possible breaches or vulnerabilities within organisational infrastructure.
- Investigate and triage security incidents efficiently, escalating complex cases to senior analysts or incident response teams as required for swift resolution.
- Develop and maintain comprehensive documentation related to incident response procedures, including detailed playbooks for consistent operations.
- Collaborate closely with other members of the Security Operations Centre (SOC) team to enhance detection capabilities and streamline response processes for improved outcomes.
- Provide timely and accurate reports on security incidents, including root cause analysis and actionable recommendations for remediation to minimise future risks.
- Stay up-to-date with emerging threats, vulnerabilities, and advancements in security technologies to continuously strengthen the effectiveness of security operations.
- Participate actively in an on-call roster for out-of-hours alert management and incident response duties as part of a dependable team approach.
- Engage in set-piece project work aimed at improving customers' cyber security posture through targeted initiatives and best practice implementation.
The Ideal Candidate:
- The successful applicant will need to hold at least a bachelor's degree in a relevant field such as Information Technology, Computer Science or Cyber Security which provides you with foundational knowledge essential for this role.
- At least two years of hands-on experience working within cyber security environments where you have demonstrated your ability to monitor alerts and respond effectively to incidents.
- Your excellent analytical skills enable you to conduct thorough investigations into complex security events while assessing risk levels accurately.
- You possess strong written communication skills that allow you to produce clear documentation such as incident response runbooks and playbooks.
- Your interpersonal abilities foster collaboration within SOC teams as you work together towards shared goals of enhanced detection capability and streamlined responses.
- You demonstrate dependability by participating willingly in on-call rosters for out-of-hours incident management when required by business needs.
- Your commitment to continuous learning ensures that you remain current with emerging threats, vulnerabilities, and new technologies relevant to cyber defence.
- You show sensitivity towards customer needs when engaging in project work aimed at improving their overall cyber security posture through tailored solutions.
What's next:
If you are ready to take the next step in your cyber security career within a collaborative team environment that values your expertise-this is your opportunity!
Aboriginal and Torres Strait Islander Peoples are encouraged to apply.
To apply, please click "Apply" or contact Richard Lynch on or for a confidential discussion.
Personnel Security Analyst, AWS Security
Posted 7 days ago
Job Viewed
Job Description
Amazon Web Services (AWS) is the leading cloud service provider, providing virtualised infrastructure, storage, networking, messaging, and many other services to customers all over the world. AWS runs a globally distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises to large government customers, run their operations and applications on AWS' highly secure infrastructure.
The AWS Personnel Security (PerSec) team is responsible managing security clearance and vetting activities for AWS employees supporting programs, including continual assessments on suitability. As a Personnel Security Analyst, you will join a team of industry-leading security experts working with customer representatives to operate and continuously improve industry-leading personnel security programs and processes.
The AWS Security team requires innovative thinking that is balanced with a strong customer focus on quality and execution. You will have a strong track record of leading and supporting security programs, demonstrable program/project management experience, comprehensive knowledge of government clearance (e.g. AGSVA) process and reporting requirements, and a deep understanding of government security programs and processes (including securely on-boarding program staff). You will obsess over internal and external customers and successfully deliver support and services in an environment where priorities shift extremely fast. You must be able to operate independently to lead and manage personnel security projects, continuously triage and prioritise accordingly, communicate clearly and compellingly.
Key job responsibilities
- Process and review personnel security clearances and maintain all security documentation, files, and clearance and suitability rosters in accordance with government requirements.
- Contribute to the development and evolution of personnel security programs, ensuring they are operating in accordance with internal teams and external customers security policies and practices.
- Generate, track and report security metrics and activities.
- Monitor processes and drive improvements in efficiency and quality of our personnel security programs.
- Interface regularly with AWS stakeholders and government customers to support clearance activities.
Hold or be able to attain an Australian Government Security Vetting Agency clearance (see day in the life
A typical day in the life of a Personnel Security Analyst begins with supporting the Personnel Security team by processing security clearances, travel notifications, and other PerSec activities, ensuring all necessary protocols are followed meticulously. Throughout the day, you will actively identifies ways to invent and simplify processes and procedures, streamlining operations for increased efficiency. You will also dedicate time to creating comprehensive reports on PerSec data and metrics, providing valuable insights to stakeholders for informed decision-making. Additionally, you will offer advice on straightforward PerSec issues to stakeholders, leveraging their expertise to address concerns effectively. You will conducts security briefings and training sessions to educate staff on best practices and compliance measures. Managing a PerSec mailbox is another crucial aspect of their day, ensuring timely responses and resolution of security-related inquiries and requests. Overall, the personnel security specialist plays a vital role in maintaining a secure and compliant environment while actively contributing to process improvement and stakeholder support.
About the team
Diverse Experiences
AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying.
Why Amazon Security
At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores.
The team is comprised of security professionals with a cross section of national security and private sector experience, providing a range of perspectives required for creative problem solving. We value diversity of thought, creativity, and a strong Bias for Action and Earn Trust. We believe that there are no "perfect" security solutions and we develop and iterate using a continuous improvement process.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve.
Inclusive Team Culture
AWS values curiosity and connection. Our employee-led and company-sponsored affinity groups promote inclusion and empower our people to take pride in what makes us unique. Our inclusion events foster stronger, more collaborative teams. Our continual innovation is fueled by the bold ideas, fresh perspectives, and passionate voices our teams bring to everything we do.
Mentorship & Career Growth
We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Basic Qualifications
- Minimum 2 years of professional experience working on sensitive, high security programs, projects or environments
- Demonstrated experience as an analyst or similar in a government or commercial setting
- Proficient with government security frameworks, policies and standards (e.g. PSPF, ISM, DSPF. ASD Essential Eight
Preferred Qualifications
- Degree or equivalent experience in (Cyber Security, IT Security Management, Government Security, Personnel Security, Security Risk Management) a related security field
- Certificate IV in Government Security (Personnel Vetting)
- An entrepreneurial spirit; a passion to improve at every opportunity
Acknowledgement of country:
In the spirit of reconciliation Amazon acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.
IDE statement:
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.