Location Melbourne
Job type Temporary
Salary Negotiable
Specialisation ICT
Contact person James Griffiths
Reference TR/061856
Call Email James

Job Title: Cyber Security Engineer - 12 Month Contract

Location: Melbourne
Duration: 12 months (with potential for extension)
Company: Managed Security Service Provider (MSSP)
Clearance: No clearance needed, though having one is well received

Our MSSP client is seeking a skilled SIEM Engineer with expertise in Microsoft Sentinel and Splunk for a 12-month contract. The primary customers are a financial institution and a legal firm.



Key Responsibilities:

SIEM Tool Expertise:

  • Leverage extensive knowledge of Microsoft Sentinel and Splunk to enhance security operations.
  • Create and refine use cases for threat detection and response.
  • Perform log normalization to ensure consistent and usable data.

Playbooks and Incident Response:

  • Develop detailed playbooks for various security scenarios.
  • Document incident response processes and ensure they are followed rigorously.

Collaboration with SOC Engineering Team:

  • Work closely with the SOC engineering team to refine existing use cases.
  • Review threat intelligence and create new use cases based on emerging threats.

Client Interaction:

  • Understand client logging requirements and develop specific use cases for their applications.
  • Comprehend reporting needs and occasionally present findings or status updates on new functionalities to clients.

Reporting and Presentations:

  • Generate reports based on security findings and new functionality implementations.
  • Present findings to customers, demonstrating clear and professional communication.


Qualifications:

Experience:

  • Proven experience in working with Microsoft Sentinel and Splunk.
  • Strong background in creating and managing use cases, log normalization, and developing security playbooks.
  • Experience in documenting incident response processes and procedures.

Skills:

  • Expertise in SIEM tools, particularly Microsoft Sentinel and Splunk.
  • Ability to collaborate effectively with SOC teams and understand threat intelligence.
  • Strong communication skills to interact with clients and present findings clearly.
  • Familiarity with the logging requirements of financial institutions and legal firms is advantageous.

Other:

  • While security clearance is not required, having one is beneficial.


All applications should include your resume as a word document. For more information, visit our website, www.kinexus.com.au or contact James Griffiths on 03 9982 0314 #LI-JG