* Large Federal Government Department | Canberra-Based | NV2 Clearance Required
* Work On High-Impact National Cyber Defence Initiatives
* No Payroll Fees | 2 Pay Runs Per Week | Easy Online Timesheets
Hunt threats. Protect a nation. NV2 preferred. Long-term federal contract | Splunk, Sentinel, MITRE ATT&CK
Your new company
We are working with a large federal government department at the forefront of Australia's cyber defence efforts, with a global footprint and a mission-critical network. Based in Canberra, the team is seeking a skilled Principal Cyber Threat Hunter to join their Cyber Operations division on a long-term contract. The initial engagement is for up to 12 months, with up to two 12-month extension options available. The department offers a hybrid working arrangement, and an active NV1 clearance is mandatory, with NV2 clearance highly desirable due to the sensitivity of the environment.
Your new role
You'll be part of a proactive cyber defence team tasked with identifying and mitigating threats across a complex, globally distributed network. This role blends threat intelligence, detection engineering, and incident response, and is aligned to SFIA Level 5+ in Security Operations (SCAD).
Key responsibilities include:
* Conducting proactive threat hunts using structured and hypothesis-driven approaches.
* Leveraging threat intelligence to inform detection strategies and investigations.
* Designing, implementing, and testing custom use cases and detection rules.
* Analysing logs and events using SIEM platforms such as Splunk or Microsoft Sentinel.
* Applying frameworks like MITRE ATT&CK to map adversary behaviours and improve detection coverage.
* Maintaining dashboards and threat detection tools.
* Collaborating with internal teams to share knowledge and improve incident response readiness.
* Documenting findings, methodologies, and recommendations in a clear and structured manner.
What you'll need to succeed
To be successful, you'll bring:
* At least 3 years of experience in Cyber Threat Hunting or Incident Response.
* Strong proficiency in log analysis and threat detection using SIEM platforms.
* Experience designing and testing detection use cases and rules.
* Familiarity with threat frameworks such as MITRE ATT&CK.
* Excellent written communication skills and experience maintaining technical documentation.
* A collaborative mindset and willingness to share knowledge within a team.
* An active NV1 clearance is mandatory; NV2 clearance is strongly preferred.
* Desirable: Tertiary qualifications in cybersecurity or IT, and certifications such as CISSP, GCIH, GCIA, Microsoft, or Splunk.
What you'll get in return
* A long-term federal contract with potential for up to 3 years.
* Flexible hybrid working arrangements.
* The opportunity to work on high-impact national cyber defence initiatives.
* A collaborative and mission-driven team environment.
* Competitive daily rate and exposure to cutting-edge threat hunting practices.
What you need to do now
If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or reach out via email to If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion on your career.
Desired Skills and Experience
SENTINEL, Threat Hunter, Cyber Threat Analyst, Incident Responder, SPLUNK, MITRE ATT&CK, CISSP, NV2