Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Cyber Security Analyst (Blue Team)
Location: Sydney (Hybrid)
Employment Type: Permanent
About the Company
Our client is an award-winning financial services organisation that is entering an exciting phase of expansion with a strong focus on strengthening its cyber security capability.
echnology and security sit at the heart of the organisation, supported by award-winning leadership and a culture recognised for high team satisfaction.
The Opportunity
We are hiring a Cyber Security Analyst (Blue Team) to join a growing and mature security function. This is a hands-on, defensive role, sitting close to live incidents and real-world outcomes.
You’ll work alongside an experienced Head of Cyber and small cyber security team to take ownership across core security tooling including CrowdStrike Falcon, you will work in collaboration with the wider tech team as part of a wider tech function.
This role is ideal for someone who enjoys being close to the action, taking ownership of defensive outcomes, and continuously improving detection and response capability.
What You’ll Do
- Monitor and investigate security alerts across endpoint, identity, cloud, email, and external threat surfaces
- Lead or support incident response from detection through containment and resolution
- Use CrowdStrike Falcon to analyse endpoint activity, malware, persistence, and lateral movement
- Take decisive action during incidents, including containment, access revocation, and coordination of takedowns
- Distinguish genuine threats from noise and prioritise response based on risk
- Document incidents, root causes, and remediation actions
- Improve detection quality by tuning alerts and reducing false positives
- Develop and maintain investigation playbooks and response procedures
- Work closely with engineering and infrastructure teams to remediate systemic weaknesses
- Contribute to threat hunting and post-incident reviews
What We’re Looking For
- Degree in Information Technology, Computer Science, Cyber Security, or a related discipline
- 5+ years’ experience in a Blue Team, SOC, or Security Operations role
- Hands-on experience with CrowdStrike Falcon (essential)
- Strong incident investigation and response capability
- Solid understanding of endpoint, identity, and foundational cloud security concepts
- Ability to operate calmly and decisively during high-severity incidents
Desirable Experience
- Cloud security exposure (AWS)
- Threat hunting or detection engineering experience
- Scripting or automation skills (Python, PowerShell, Bash)
Certifications (Highly Regarded)
- CrowdStrike Certified Falcon Administrator or Responder
- Blue Team Level 1 or 2
- GCIA, GCIH, SC-200, AZ-500, or equivalent
Why Join?
- Be close to real incidents and defensive outcomes
- Work with modern, best-in-class security tooling
- Join a collaborative, high-performing security team
- Genuine autonomy and ownership
- Competitive salary with regular reviews
- Opportunity to make measurable improvements to how the organisation detects and responds to threats
Key Skills
Ranked by relevanceReady to apply?
Join Salient Group and take your career to the next level!
Application takes less than 5 minutes

