Group Cybersecurity Threat Intelligence Lead
Melbourne, Victoria, Australia
Datacom
We work across Australia and New Zealand to make a difference in people’s lives by turning the imaginable into reality.Our Purpose
Here at Datacom, we connect people and technology in order to solve challenges, create opportunities and discover new possibilities for the communities we live in.
About the Role
The Cybersecurity Threat Intelligence Lead is a key part of Datacom's Internal Security Group. This is an internal facing role where you will be responsible for the identification of intelligence requirements, signs of compromise and providing thorough analysis of such compromises and other threat activities/actors. You will be managing, developing and contextualizing intelligence and communicating the nature and impact of applicable security threats, risks, and vulnerabilities, and sharing and escalating threat indicators with Operations, Incident Response teams and management as appropriate.
What you’ll do
The Cybersecurity Threat Intelligence Lead is responsible for (but not limited to):
- In-depth threat intel research and analysis, to identify threat tactics, patterns and methodologies
- Evaluate, analyse, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
- Provide subject matter expertise to the development of cyber operations specific indicators.
- Monitor operational environment and report on adversarial activities.
- Assist in the identification of intelligence gaps, intelligence collection shortfalls.
- Collaborate with intelligence Incident Response Analyst/Threat Hunters involved in related areas.
- Provide subject-matter expertise and identify opportunities to share TI with wider communities
- Make recommendations to improve security services
What you’ll bring
- Strong understanding Threat Intel Research concepts and functionality
- Security industry frameworks such as NIST 800-61r2, NZISM
- Cyber-attack methodologies and techniques such as MITRE Att&ck, Diamond Model and Lockheed Martin Cyber Kill Chain and other common cybersecurity threats
- Strong scripting languages (e.g. Python, Power Shell)
- Minimum 5 years in a similar security analyst role and security incident response and resolution handling.
- Deep technical knowledge of the cyber threat landscape including threat actors, attack types, tactics, tools and procedures, and effective counter measures
- Experience in working with security tools such as: SIEM, anti-malware, endpoint security and EDR, URL and application control, IDS/IPS, email filtering
Qualifications and Certifications
- Vendor neutral certifications (such as CompTIA Security+, CompTIA Analyst+ etc.)
- Security related vendor qualifications (such as Microsoft AZ-500, MS-500, SC-200, Splunk certifications, CrowdStrike Certifications etc.)
- SANS GDAT - GIAC Defending Advanced Threats
- SANS GCTI – GIAC Cyber Threat Intelligence
Why Datacom
We have over 6,200 people across our global offices, and generate an annual revenue of over $1.2 billion, this makes us one of Australasia’s largest professional IT services companies. We have extensive expertise in operating data centres, providing IT services, software engineering and application management, as well as payroll and customer service design and operations. With this comes a long list of significant clients Datacom is committed to hiring, developing, and promoting the best talent from a diverse range of backgrounds. We are local at heart, yet world-class in capability.
If you are keen to be part of a great team, please apply online! All applications will be treated in the strictest confidence.
Tags: CompTIA CrowdStrike Cyber Kill Chain EDR Endpoint security GIAC IDS Incident response IPS Malware MITRE ATT&CK NIST Python SANS Scripting SIEM Splunk Threat intelligence Vulnerabilities
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open IT Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open IAM-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs