Aurizon Brisbane City, Queensland, Australia
Location
Brisbane
Remuneration/Benefit
Negotiable
Responsibilities
- Support incident response by automating tasks such as data collection, threat analysis, and remediation.
- Administer and optimise SOAR, TIP, and security enforcement platforms.
- Onboard new data sources and asset types into logging and detection systems.
- Continuously refine and improve automation processes to keep ahead of emerging threats.
- Maintain documentation, playbooks, and workflows for incident response.
- Stay across the latest cyber threat trends and best practices.
Qualifications
- Relevant tertiary qualification and professional certifications in SOC operations.
- 3+ years’ experience in a similar role within a large enterprise.
- Solid scripting skills to automate security tasks and workflows.
- Solid hands‑on experience with SIEM tools (e.g., Splunk, Microsoft Sentinel).
- Expertise across system and cloud administration, network security, and next‑gen firewalls.
- Experience with EDR tools, incident response, and investigation activities.
- Advanced knowledge of Terraform, Ansible, and containerisation (Docker, Kubernetes).
- Exposure to frameworks such as MITRE ATT&CK;, D3FEND, plus threat intelligence and deception technologies.
Benefits
- Development and growth opportunities.
- Access to mentoring and development programs.
- Discounts on selected health insurance funds, personal travel, gyms, vehicles and retail brands.
- Parental leave program and super booster.
At Aurizon, we support the development and growth of our employees. With a national portfolio of operations, we offer long‑term and exciting career opportunities.
Applications close 28th August
#J-18808-Ljbffr