Sekuro
Cyber Security Analyst
SekuroAustralia17 days ago
Full-timeConsulting, Information Technology

About Sekuro

We are the challenger in the cyber security market globally. We are founder-led and have a fresh and direct approach to working with our clients. Over our journey we have helped many organisations of different sizes in improving their understanding of cyber security through uplifting their existing capability. We do this by reducing risk, building business resilience, and promoting continuous innovation.


About the role

We're seeking a Cyber Security Analyst (L2) to join a highly talented Security Operations team. In this role, you'll be responsible for deploying and uplifting defensive actions to safeguard our clients.

This position will ultimately lead to a rare opportunity to work across both offensive and defensive domains and assist in enhancing our SOC's threat detection and response capabilities.


Key Responsibilities


Monitoring & Triage:

  • Review and analyse alerts from SIEM platforms (e.g., Splunk, Logscale, Sentinel, or Elastic) in a timely manner.
  • Perform initial assessments and triage of security anomalies, escalating issues appropriately or investigating incidents using available resources.


Incident Response & Threat Hunting:

  • Execute cloud incident response procedures, with strong working knowledge of AWS and Azure environments and service logs.
  • Conduct Proactive, Indicator and Exploratory threat hunting based on current threat intelligence and hypothesis development.
  • Perform incident response tasks to mitigate risks and limit potential damage.


Process Improvement & Documentation:

  • Review and update detection rules, process documentation, and playbooks.
  • Collaborate with other teams to enhance understanding of customer environments and emerging threats.
  • Identify deficiencies in monitoring systems and propose improvements.


Intelligence & Reporting:

  • Analyse regular intelligence briefs to stay updated on the evolving threat landscape.
  • Maintain and update dashboards, reports, and alerting mechanisms to ensure effective monitoring.
  • Contribute to continuous service improvements within the SOC.


Skills and Experience

Technical Expertise:

  • Proven experience with SIEM platforms such as Splunk, Logscale, Sentinel, or Elastic.
  • Strong cloud incident management and investigation skills, specifically within AWS and Azure environments.
  • Prior experience in system administration, threat detection, and threat hunting.
  • Proficiency in scripting (e.g., Python, PowerShell, or similar languages) to automate tasks and analyse data.
  • Minimum of 2 years' experience in a Cyber Security Operation Centre.


Certifications (Preferred):

  • OSCP, PNPT, EJPT, BTL1, BTL2, PJPT, PCSA, CDSA, or SANS GCIH


General Competencies:

  • Excellent analytical skills and attention to detail.
  • Ability to develop solutions to complex problems under pressure.
  • Understanding of best practices in network security, security operations, systems security, policy, and incident response.
  • Strong communication skills, both written and verbal.

Key Skills

Ranked by relevance