Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Summary:
The ideal candidate will be responsible for monitoring, detecting, analyzing, and responding to security threats across our infrastructure. This role plays a critical part in safeguarding the confidentiality, integrity, and availability of our systems and data.
Responsibilities:
- Review and manage IT policies and procedures as it relates to Information Security and Cybersecurity operations within Certis.
- Monitor security information and event management (SIEM) systems for suspicious activity.
- Investigate and respond to security alerts, incidents, and breaches.
- Conduct root cause analysis and recommend mitigation strategies.
- Collaborate with IT, engineering, and third parties on incident response and remediation.
- Develop and maintain standard operating procedures (SOPs) and incident runbooks.
- Analyze threat intelligence feeds and incorporate them into detection strategies.
- Maintain logs, reports, and documentation in accordance with regulatory and compliance requirements.
- Perform regular vulnerability assessments and assist in patch management initiatives.
- Participate in red team/blue team exercises and tabletop simulations.
- Stay up to date on the latest cyber threats, trends, and best practices.
Requirements:
- Bachelor’s degree in Computer Science, Information Security, or related field; or equivalent work experience.
- 3–5 years of experience in a SOC, security analysis, or incident response role.
- Strong understanding of networking concepts, operating systems, and cloud environments.
- Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm), IDS/IPS.
- Knowledge and proficiency in working with endpoint management concepts and tooling (such as Microsoft Intune and Trendmicro Worry Free).
- Knowledge and experience in relation to forensics and investigation highly regarded.
- Familiarity with threat frameworks such as MITRE ATT&CK, NIST, and CIS Controls.
- Familiarity with Australian specific security standards and frameworks such as essential 8 and SOCI.
- Experience with scripting (Python, PowerShell, or Bash) is a plus.
- Excellent problem-solving and analytical skills.
- Strong communication and documentation abilities.
Key Skills
Ranked by relevanceReady to apply?
Join Certis and take your career to the next level!
Application takes less than 5 minutes

