Role: Cyber Security Analyst
About Us
We are a technology and professional services business delivering consulting, managed services, and cloud solutions to Australian organizations. Security is a core part of how we operate and how we protect our customers. Our approach is grounded in best-practice frameworks, practical implementation, and commercial reality.
The security team works closely with operations, cloud, network, and customer teams to prevent incidents, respond quickly when they occur, and continuously improve security posture.
Schedule
-
Full-time
-
Monday to Friday
-
9:00am – 6:00pm AEST
The Role
The Cyber Security Analyst is responsible for protecting internal and customer environments through proactive security operations, monitoring, and incident response. The role sits at the intersection of governance, tooling, and real-world security operations.
You’ll work closely with the Security Operations Centre (SOC), act as an escalation point for incidents, and contribute to both customer-facing and internal security initiatives. The role balances strong technical execution with risk management and business outcomes.
This role suits someone who enjoys hands-on security work, structured processes, and real accountability.
Key Responsibilities
Security Operations & Monitoring
-
Work closely with the SOC to monitor alerts, analyse data sources, and respond to security incidents
-
Act as an escalation point for L1–L3 SOC teams as a security SME
-
Participate in real-time incident response and “red team” style exercises
Security Posture & Risk Management
-
Assist in maintaining and improving the security posture of internal and customer environments
-
Ensure alignment with recognised security frameworks and best practices
-
Support avoidance, detection, and treatment of security incidents
Change & Project Support
-
Participate in change advisory processes with a focus on security review
-
Act as a security engineer on internal and customer-facing projects
-
Assist with deployment and commissioning of new security services and tools
Governance & Process
-
Ensure tickets, incidents, and actions are documented and updated in line with SLAs
-
Contribute to procedural correctness, tooling standards, and operational consistency
Requirements
Experience & Skills
-
2+ years’ experience in a cyber security role
-
Prior background in network, infrastructure, or endpoint support
-
Experience working in or alongside a SOC/NOC environment
-
Exposure to SIEM, CASB, vulnerability scanning, and security testing
-
Strong understanding of incident response and security operations
-
Solid time management and effort capture discipline
-
Clear communication with both technical teams and stakeholders
Frameworks & Standards
-
Familiarity with NIST, ISM, ISO 27001, PCI DSS, or similar frameworks
-
Understanding of ITIL processes (ITIL Foundation a plus)
Certifications
-
CEH, CISSP, CISM, or equivalent certifications
-
Vendor certifications across platforms such as Microsoft, VMware, Linux, or networking technologies
Key Performance Expectations
-
Consistent delivery of ~32.5 billable hours per week
-
Strong SLA adherence for alerts and incidents
-
Reduction in security incidents or severity over time
-
High customer satisfaction across engagements