ParaFlare is…
…an innovative Australian cyber operations company focused on Managed Detection and Response, servicing the public and private sector.
Our purpose is to protect organisations and the people who work for them, own them and trade with them.
Our mission is to relentlessly patrol our client’s systems, detect, and immediately eliminate threats from their network.
ParaFlare has developed a strong and unique culture underpinned by our values:
ParaFlare’s team of experts have been involved in the delivery of cyber security and operational outcomes for Australian Government and international enterprises for, in some cases, over 20 years. This includes working in Australia, the Middle East, Africa, South-East Asia and the Americas.
Position Profile
· Have you been spending your evenings on TryHackMe but don’t have hands on experience in a SOC?
· Have you set yourself up with a lab at home and stuck an EDR agent on to see what happens, but never saw an actual incident occur in real life?
· Have you been doing some online learning but have never had a Senior Analyst walk you through an incident?
· Have you been trying to bring your passion for cyber security to a blue team, but everyone asks for 5 years’ experience? If you are a recent graduate, someone looking to change industries, or someone in IT looking to change lanes, this is the opportunity you’ve been waiting for! Show us your drive and determination, break into the industry and do something that really matters – keep Australian people and Australian companies safe.
ing to the Security Operations Centre (SOC) Team Lead, the Junior Cyber Security Analyst (Night Shift) will be part of the 24×7 SOC, whose mandate is to provide full managed detection and response capability to a suite of international clients. The Analyst will be part of the night shift roster, providing first class responses to identified threats and alerts using the latest tools, processes, and techniques during night shift.
The Analyst role sits within the shift roster system and is primarily responsible for using defensive measures and information collected from a variety of sources to identify, analyse, and events that occur or might occur within client networks in order to protect information, information systems, and networks from threats.
In addition to shift activities the Analyst will be asked to assist with other ad hoc tasks from time to time including working with other teams within the organisation such as Engineering or Digital Forensics and Incident Response. These tasks can include but are not limited to:
· Threat Intelligence gathering
· Threat Hunting
· Detection Engineering
· Automation and Orchestration
· Incident Response
General Tasks
· Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
· Use cyber defence tools for continual monitoring and analysis of system activity to identify malicious activity.
· Analyse identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
· Determine tactics, techniques, and procedures (TTPs) for intrusion sets.
· Isolate and remove malware.
· Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the client or ParaFlare’s environment.
· Receive and analyse alerts from various sources within the enterprise and determine possible causes of such alerts.
· Raise cyber security incidents using service management software (Jira) to inform customers and remediate threats.
Position Knowledge Sets
· Knowledge of cyber threats and vulnerabilities.
· Knowledge of cybersecurity principles.
· Knowledge of adversary tactics and techniques (Mitre ATT&CK Frameworks).
· Knowledge of authentication, authorization, and access control methods.
· Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, allow/deny listing).
· Knowledge of cyber operations terminology/lexicon.
· Knowledge of incident categories, incident responses, and timelines for responses.
· Knowledge of server and client operating systems.
· Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).
· Knowledge of virtual machine aware malware, debugger aware malware, and packing.
· Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.
Personal Attributes
Additional Information
To apply for this role, please apply via LinkedIn or e-mail careers@paraflare.com along with your resume.
We are a highly Supportive company. Kapitol is an innovation-driven construction company based in Melbourne set to outpace and disrupt...
Apply For This JobLocations: United States; Cary N.C .New hires must Live within a commutable Distance of the Cary, N.C Location Role Value...
Apply For This JobPERSOLKELLY is one of Australia’s largest and longest serving recruitment providers. Delivering both quality temporary and permanent options, we specialise...
Apply For This JobDollar General Fleet is Hiring Refrigerated Drivers! Home Weekly – Drivers Earn Up to $100,000/Year* + $5,000 Sign-On Bonus Zero...
Apply For This JobFull Job Description We are looking for T-LPN’s to join our team! Freshers Welcomed. Job – T-LPN Location – York,...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> ARE YOU A CURRENT US FOODS EMPLOYEE? PLEASE APPLY DIRECTLY THROUGH OUR INTERNAL WORKDAY CAREER...
Apply For This Job