Datacom

Cybersecurity Analyst – Level 2

Datacom

full-time

Posted on:

Location Type: Hybrid

Location: Auckland • 🇳🇿 New Zealand

Visit company website
AI Apply
Apply

Job Level

JuniorMid-Level

Tech Stack

Cyber Security

About the role

  • Action regular tasks and help define processes
  • Review/ respond to alerts/events/incidents and escalations from the 24/7 team
  • Security use case and correlation rule development
  • Identify and develop automations
  • Identify policy changes required based on analysis
  • Threat hunting
  • Interface directly with the customer on a fortnightly basis
  • Work collaboratively with team members, wider support groups and business units to ensure that agreed security policies and procedures are understood and followed, and that security risks are effectively managed.
  • Provide mentorship and direction to the junior team members

Requirements

  • Working experience on Security Information & Event Management (SIEM) and Endpoint Detection and Response (EDR) technologies
  • Experience using Cyber-attack methodologies and techniques such as MITRE and Lockheed Martin Cyber Kill Chain and other common cybersecurity frameworks such as NIST 800-61, NZISM
  • Experience in responding to cybersecurity incidents and working with stakeholders to minimize the impact of security breaches or incidents. This involves analysing security events, identifying security incidents, and developing response plans.
  • Experience on gathering and analysing intelligence about the latest security threats and vulnerabilities and identifying potential threats to our customer’s systems and data.
  • Excellent written and verbal communication skills
  • Ability to work independently and as part of a team
  • Minimum 2+ years in a similar security analyst role with experience in security incident response and resolution handling.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
Security Information & Event Management (SIEM)Endpoint Detection and Response (EDR)Cyber-attack methodologiesMITRELockheed Martin Cyber Kill ChainNIST 800-61NZISMsecurity incident responsethreat huntingautomation development
Soft skills
written communicationverbal communicationteam collaborationmentorshipindependent workprocess definitioncustomer interactionrisk managementanalytical skillsproblem-solving