* Large Federal Government Department | Canberra-Based | NV2 Clearance Required
 * Work On High-Impact National Cyber Defence Initiatives
 * No Payroll Fees | 2 Pay Runs Per Week | Easy Online Timesheets
Hunt threats. Protect a nation. NV2 preferred. Long-term federal contract | Splunk, Sentinel, MITRE ATT&CK
Your new company
We are working with a large federal government department at the forefront of Australia's cyber defence efforts, with a global footprint and a mission-critical network. Based in Canberra, the team is seeking a skilled Principal Cyber Threat Hunter to join their Cyber Operations division on a long-term contract. The initial engagement is for up to 12 months, with up to two 12-month extension options available. The department offers a hybrid working arrangement, and an active NV1 clearance is mandatory, with NV2 clearance highly desirable due to the sensitivity of the environment.
Your new role
You'll be part of a proactive cyber defence team tasked with identifying and mitigating threats across a complex, globally distributed network. This role blends threat intelligence, detection engineering, and incident response, and is aligned to SFIA Level 5+ in Security Operations (SCAD).
Key responsibilities include:
 * Conducting proactive threat hunts using structured and hypothesis-driven approaches.
 * Leveraging threat intelligence to inform detection strategies and investigations.
 * Designing, implementing, and testing custom use cases and detection rules.
 * Analysing logs and events using SIEM platforms such as Splunk or Microsoft Sentinel.
 * Applying frameworks like MITRE ATT&CK to map adversary behaviours and improve detection coverage.
 * Maintaining dashboards and threat detection tools.
 * Collaborating with internal teams to share knowledge and improve incident response readiness.
 * Documenting findings, methodologies, and recommendations in a clear and structured manner.
What you'll need to succeed
To be successful, you'll bring:
 * At least 3 years of experience in Cyber Threat Hunting or Incident Response.
 * Strong proficiency in log analysis and threat detection using SIEM platforms.
 * Experience designing and testing detection use cases and rules.
 * Familiarity with threat frameworks such as MITRE ATT&CK.
 * Excellent written communication skills and experience maintaining technical documentation.
 * A collaborative mindset and willingness to share knowledge within a team.
 * An active NV1 clearance is mandatory; NV2 clearance is strongly preferred.
 * Desirable: Tertiary qualifications in cybersecurity or IT, and certifications such as CISSP, GCIH, GCIA, Microsoft, or Splunk.
What you'll get in return
 * A long-term federal contract with potential for up to 3 years.
 * Flexible hybrid working arrangements.
 * The opportunity to work on high-impact national cyber defence initiatives.
 * A collaborative and mission-driven team environment.
 * Competitive daily rate and exposure to cutting-edge threat hunting practices.
What you need to do now
If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or reach out via email to If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion on your career.
Desired Skills and Experience
SENTINEL, Threat Hunter, Cyber Threat Analyst, Incident Responder, SPLUNK, MITRE ATT&CK, CISSP, NV2