About the Company
A leading global technology and cybersecurity services provider, delivering innovative solutions that help organisations solve complex business challenges. With a strong presence across enterprise and government sectors, the business specialises in end-to-end managed security services, enabling clients to protect, detect, and respond to cyber threats with confidence.
The Role
As an Information Security Manager, you will lead the ANZ Cyber Defence team, driving high-performing security operations, uplifting detection and response capabilities, and delivering strategic cybersecurity outcomes across a diverse client base.
This role is ideal for a hands‐on leader with deep SIEM/SOAR engineering expertise, strong threat operations experience, and a passion for building scalable, intelligence-led security environments.
Key Responsibilities
* Lead and mentor a multidisciplinary team across SOC operations, detection engineering, and incident response
* Oversee the design, configuration, and continuous improvement of SIEM and SOAR platforms (e.g. Microsoft Sentinel, Splunk, Swimlane)
* Drive 24x7 operational excellence, including incident readiness, response uplift, and threat monitoring maturity
* Design and implement scalable, multi‐tenant SIEM environments and detection frameworks aligned to MITRE ATT&CK
* Lead threat operations, including threat hunting, intelligence integration, and proactive detection use case development
* Partner with clients and internal stakeholders to define SOC architecture and security strategy
* Champion automation and orchestration initiatives (e.g. API integrations, scripting, infrastructure-as-code) to improve efficiency and reduce alert fatigue
* Support solutioning activities, including contributing to proposals and client engagements
Skills & Experience
* Proven experience leading SOC, cyber defence, or security engineering teams in enterprise or consulting environments
* Strong hands‐on expertise across SIEM and SOAR technologies (e.g. Microsoft Sentinel, Splunk, Defender XDR)
* Experience designing detection engineering frameworks and improving visibility using MITRE ATT&CK or similar models
* Background in threat intelligence, threat hunting, and incident response within complex environments
* Experience working across cloud‐native security platforms (Azure, Microsoft 365, AWS or GCP)
* Strong automation capability (e.g. PowerShell, Bash, Terraform, API integrations)
* Experience building or supporting multi‐tenant or large‐scale security environments
* Proven ability to engage stakeholders, deliver client briefings, and drive operational improvements
* Exposure to AI/security analytics is highly regarded
* Relevant certifications such as AZ‐500, CISSP, CISM, GIAC, or Splunk certifications are advantageous
Requirements
* Australian Citizenship (mandatory)
* Ability to obtain or currently hold an Australian Federal Government Security Clearance (Baseline minimum; NV1 highly regarded)
#J-18808-Ljbffr