Jobs on CIO New Zealand.


Security Operations Specialist

QLD, Brisbane
Posted on 01.08.2018
  • Cyber threat and vulnerability identification and mitigation experience required
  • Initial 6 month contract
  • Brisbane CBD based

New contract opportunity for an experienced Security Operations Specialist to join a Cyber Security team.


New Year, New Contract Brisbane based.

New contract opportunity for an experienced Security Operations Specialist to join a Cyber Security team.

In this role, you will be focussed on day to day security operations, you will undertake activates such as Cyber Security threat and vulnerability identification and mitigation, addressing security patch management. Configuration, maintenance and administration by applying industry standard techniques to resolve cyber security issues.

As the Security Operations Specialist, you will:

  • Gather and act on vulnerability information and conduct security risk assessments for business applications and computer installations; provides authoritative advice and guidance on security, and recommends appropriate control improvements. Interprets security policy and contributes to development of standards and guidelines that comply with this. Performs risk assessments, business impact analysis and accreditation for all major information systems within the organisation. Ensures proportionate response to vulnerability information, including appropriate use of forensics.
  • Assist to draft and maintain the policy standards, procedures and documentation for cyber security. Monitors the applications and compliance of security operations procedures and reviews information systems for actual or potential breaches in security. Ensures that all identified breaches in security are promptly and thoroughly investigated. Ensures that security records are accurate and complete.
  • Compile the findings of the operation and activities, including the scripts, frameworks, tools, and methods leveraged to facilitate the execution of the operations, including severity of findings and identify potential remediation or mitigation strategies.
  • Create extensive documentation and be able to present your findings to the rest of the team including training and education for technical staff on advanced exploits, tools, frameworks and techniques.

You will have
  • Knowledge in exploitation or enumeration techniques currently utilised on contemporary technologies. Ranging from but not limited to: Injection, privilege escalation, buffer overflows, fuzzing, Scanning, etc.
  • Experience with writing and demonstrating proof of concept work from an cyber security perspective
  • Capable to assist in the creation and employ modules and tailored payloads for common testing frameworks or tools.
  • Understanding of cryptography, its role in the enterprise, and its strengths as well as weaknesses
  • Knowledge of tactics, techniques, and procedures that could be used for recon, persistence, lateral movement, and exfiltration
  • Broad experience with reverse engineering, malware analysis, and/or forensic tools
  • Solid understanding of networking topologies, protocol usage, and enterprise hardware including switches, routers, firewalls, and their roles in security
  • Knowledge of access and security control methodologies; network / host intrusion detection, vulnerability management tools, patch management tools, penetration testing tools, and Anti-Virus solutions
  • Knowledge of and ability to apply security focused standards: ITIL such as awareness and methodologies, IS18, ISO27000 series, OWASP Top 10

To be considered for the role click the 'Apply' button or for more information about this and other opportunities please contact Anita Cunningham on 07 33395626. Please quote our job reference number: 200174260.

Reference Number: 200174260_1

Contact Details:

How to Apply?

Click on the link below

Click here for more information about this job

Jobs you may also be interested in ...