Tesserent

Cyber Defence Analyst

  • Company
  • Job type
    Full-time
  • Workplace type
    Hybrid
  • Location
    Wellington
  • Posted
    28 days ago

As a Cyber Defence Analyst, you will be an integral part of our Security Operations Centre (SOC) team. You will be responsible for actively monitoring, investigating, and responding to security threats across our diverse range of clients. This role requires a combination of solid technical expertise, cyber threat awareness, and strong analytical skills to detect and respond to cyber threats.

 

This role also has a strong focus on ongoing security improvement. As a Cyber Defence Analyst you will contribute to the development and improvement of standard operating procedures (SOPs), security protocols, and keep your skills and knowledge up-to-date in the ever-changing landscape of cybersecurity. Tesserent will support you with a dedicated training budget, fully funded attendance at security conferences, as well as internal training and development programs.

 

In addition to technical expertise, this role demands a high level of collaboration, strong communication skills, and an ability to effectively manage time and priorities. The ideal candidate will have a solid understanding of various cybersecurity frameworks, standards, and security technologies.

 

   ACCOUNTABILITIES

  • Monitor and analyse logs and alerts from security tooling such as SIEM & EDR, detecting, validating and responding to security incidents
  • Conduct comprehensive investigations into security incidents across various client environments, determining root cause, impact, and remediation activities
  • Work collaboratively with other members of the SOC team to continually improve our security monitoring and response capabilities, and contribute to the development of standard operating procedures (SOPs)
  • Provide timely, comprehensive reports to clients and internal stakeholders detailing incident findings and remediation efforts
  • Continually update skills and knowledge relative to the ever-changing threat landscape

 

SKILLS & ATTRIBUTES

  • Strong analytical skills to dissect complex security data, identify patterns and trends, and make data-driven decisions
  • Demonstrated capacity to multitask and manage competing priorities effectively
  • Excellent verbal and written communication skills to effectively document processes, convey complex technical information to various audiences, and collaborate with other teams and stakeholders
  • Detail-oriented with a strong commitment to documentation, process improvement, and knowledge sharing
  • Strong problem-solving and decision-making skills, with the ability to work under pressure

 

EDUCATIONAL & PREVIOUS EXPERIENCE

  • Minimum of 2 years of experience in a security analytics position, particularly in a SOC or MSSP environment
  • In-depth knowledge of security analytics principles, methodologies, and technologies
  • Strong understanding of the cybersecurity threat landscape, threat actor tactics, techniques, and procedures (TTPs), and the MITRE ATT&CK framework
  • Excellent analytical and problem-solving skills, with the ability to analyse complex data and identify patterns and trends
  • (Highly Regarded) Experience working in a Security Operations Center (SOC)
  • (Highly Regarded) Microsoft Certifications including SC-200, MS-500 and AZ-500

 

ADDITIONAL ROLE REQUIREMENTS

  • Must be willing to obtain an NV1 security clearance
  • Role requires shift work – working 10 hour shifts, 4 days in a 7 day period
  • Role will include rostered night shifts approximately once a month

 

BENEFITS

  • Opportunities to undertake technical training and secure industry recognised certifications
  • Flexible working arrangements with a mix of remote and in-person work
  • Opportunities to work with some of the best cybersecurity professionals in the region and to grow and develop your career
  • Joining a team of highly skilled and multi-cultural security professionals


More information