drjobs EL2 Principal Cyber Threat Analyst

EL2 Principal Cyber Threat Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Canberra - Australia

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Description

Position Title: EL2 Principal Cyber Threat Analyst
Employment Type: Approx. 12-month contract with possibility of extension
Location: Canberra ACT
Hourly Pay Rate: $95.38 $107.72 12% superannuation
Security Clearance/Requirements: NV1 clearance required
Working Arrangements: Onsite in Canberra with potential for flexible arrangements

ABOUT THE ROLE
We are seeking an experienced Cyber Threat Analyst to join a large Federal Government Department. This role sits within the Cyber Operations Section and will focus on proactively hunting for threats across a global network leveraging both Threat Intelligence and Analyst skills to detect analyse and mitigate malicious activity.

This is an exciting opportunity to play a key role in protecting critical government systems and data while contributing to the ongoing development of advanced cyber threat detection and response capabilities.

KEY RESPONSIBILITIES

  • Proactively hunt for threats across complex global networks.

  • Utilise Cyber Threat Intelligence to inform and strengthen hunt activities.

  • Create and maintain detection tools custom use cases and dashboards.

  • Develop and refine hypotheses based on emerging threats and adversary behaviours.

  • Analyse logs and events to identify anomalies recommend enhancements and develop countermeasures.

SKILLS AND EXPERIENCE

Essential

  • Minimum 3 years experience as a Cyber Security Incident Responder or Threat Hunter.

  • Proficiency in log analysis and threat detection using SIEM platforms (e.g. Splunk Sentinel).

  • Experience applying attack frameworks such as MITRE ATT&CK to threat hunting or incident response.

  • Experience designing implementing and testing detection use cases.

  • Strong teamwork and knowledge-sharing skills.

  • Well-developed writing skills and experience in maintaining technical documentation.

Desirable

  • Tertiary qualifications in a relevant technical field Microsoft or Splunk certifications.

  • Industry certifications such as CISSP GCIH GCIA.

  • Current NV2 (or ability to obtain).

ELIGIBILITY

To be considered you must be an Australian Citizen with a Negative Vetting 1 clearance.

Apply now or contact Aiden McLeanon at SOS Recruitment for a confidential discussion.

PLEASE NOTE: Applications for this role will close on 8th September 2025. If your application is received after this date well be happy to keep your CV on file for similar opportunities. We encourage you to apply even if the closing date has passed.

SOS Recruitment is committed to diversity equity and inclusion. We strongly encourage applications from Aboriginal and Torres Strait Islander peoples people with disabilities women those with family responsibilities individuals from culturally and linguistically diverse backgrounds people of all religions and members of the LGBTIQ community.


Required Experience:

Staff IC

Employment Type

Contract

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.