Aurizon Brisbane City, Queensland, Australia Location
Brisbane Remuneration/Benefit
Negotiable Responsibilities
Support incident response by automating tasks such as data collection, threat analysis, and remediation. Administer and optimise SOAR, TIP, and security enforcement platforms. Onboard current data sources and asset types into logging and detection systems. Continuously refine and improve automation processes to keep ahead of emerging threats. Maintain documentation, playbooks, and workflows for incident response. Stay across the latest cyber threat trends and best practices. Qualifications
Relevant tertiary qualification and professional certifications in SOC operations. 3+ years’ experience in a similar role within a large enterprise. Strong scripting skills to automate security tasks and workflows. Solid hands‑on experience with SIEM tools (e.g., Splunk, Microsoft Sentinel). Expertise across system and cloud administration, network security, and next‑gen firewalls. Experience with EDR tools, incident response, and investigation activities. Advanced knowledge of Terraform, Ansible, and containerisation (Docker, Kubernetes). Exposure to frameworks such as MITRE ATT&CK;, D3FEND, plus threat intelligence and deception technologies. Benefits
Development and growth opportunities. Access to mentoring and development programs. Discounts on selected health insurance funds, personal travel, gyms, vehicles and retail brands. Parental leave program and super booster. At Aurizon, we support the development and growth of our employees. With a national portfolio of operations, we offer long‑term and exciting career opportunities. Applications close 28th August
#J-18808-Ljbffr