UNIFY Solutions provide technical direction to customers who are deploying, maintaining or innovating solutions using the latest technologies.

The ideal candidates will have the ability to combine their technical passion, creativity and customer focus to deliver and support great solutions to our customers and ensure they get the best out of our technologies and solutions. We need people who are enthusiastic to help ensure our customers IT environments are secure, optimised and healthy.

Position Details

UNIFY is looking for a number of Security Operations Centre (SOC) Analysts. This position supports the SOC by identifying suspicious activity, mitigating risks, and protecting critical infrastructure.

Responsibilities

Service Delivery

  • Assist in the completion of day-to-day checklist(s), including log review, alert analysis, and escalation follow up activity status
  • Perform event and incident analysis
  • Provide timely advice and guidance on the response action plans for events and incidents based on incident type and severity
  • Follow detailed operational processes and procedures to analyse, escalate, and support the remediation of critical information security incidents
  • Assist in the documentation and reporting of changes, trends and implications concerning the design and integration of evolving systems and solutions
  • Contribute to documentation owned by the SOC team including but not limited to Standard Operating Procedures (SOPs)
  • Remain current on cyber security trends and intelligence (open source and commercial) in order to assist in the security analysis & identification capabilities of the SOC team

Business Development and Relationship Management

  • When necessary, and with the SOC Managers guidance, devise and document new operational procedures

Collaboration

  • Collaborate with technical architects and partners to identify and validate emerging opportunities

Best Practice and Personal Development

  • Assist the SOC Manager in relevant compliance efforts
  • Utilise best practice and industry standards in performing daily operations
  • Work with customers and internal leads and architects in the delivery and ongoing management of secure Azure solutions

Reporting

  • Assist in the preparation of full, detailed and accurate security reports as required by the SOC Manager
  • Other relevant duties as required by the SOC Manager

Selection Criteria

Qualifications and Experience

  • Bachelor’s degree in Computer Science, Information Technology or equivalent educational or professional experience and/or qualifications;
  • Minimum 2 years’ of information security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, log analysis, intrusion detection;
  • Experience with ticketing systems and proven operational process knowledge;
  • Basic understanding of cloud computing/services, preferably Azure Security Services (e.g. Azure Advanced Threat Protection, Azure Information Protection, Azure Security Center, Azure Log Analytics);
  • Experience with at least two of the following technologies:
    • Azure Security;
    • Windows Server Administration
    • (Azure) Active Directory;
    • Windows Workstation;
    • Routers/Switches Management;
    • Unix administration, Firewall Management; or
    • SANS/NAS, Web servers, IAM/AAA, IDS/IPS, System vulnerability scanning tools, Application/Database vulnerability scanning tools, mobile device analysis or Secure coding.

Values and Communication

  • Exceptional communication skills;
  • Superior analytical and problem-solving skills;
  • Excellent organisational, coordination, interpersonal skills;
  • Self-motivated to improve knowledge and skills;
  • Strong attention to detail;
  • Works well both in a team environment as well as autonomously; and
  • A strong desire to understand the ‘what’ as well as the ‘why’ and the ‘how’ of security incidents.

Desirable Criteria

  • Experience with the following technologies:
    • Leading SIEM solutions (e.g. Azure Sentinel);
    • IDS/IPS, network- and host- based firewalls;
    • Data Loss Prevention (DLP);
    • Database Activity Monitoring (DAM);
  • Knowledge related to Microsoft security recommendations (e.g. Securing Privileged Access, Credential Theft Mitigations);
  • Understanding of attack vectors such as network probing/ scanning, DDOS, malicious code activity and possible abnormal activities, such as worms, Trojans, viruses, etc.;
  • Knowledge in system security architecture and security solutions;
  • Knowledge in networking, message transport, and endpoint security; and
  • Advanced level technical certifications or equivalent experience:
    • CISSP;
    • GSEC; or
    • GCIH

Other Requirements

  • Australia or New Zealand citizenship
  • Australia or New Zealand security clearance desirable
  • An understanding of and commitment to compliance of Occupational Health and Safety requirements
To enquire about this role, please enter the form below.
Looks good!
Please enter your name.
Looks good!
Please enter your e-mail address so we can contact you.
Looks good!
Please enter some details about your interest in the role.
This form uses Google ReCaptcha to ensure interactions with our site are from legitimate users. Please accept the use of recommended storage before submitting the form. Find out more at the Privacy Center.
Your message has been sent. You should hear from us soon.
Your message could not be sent. Try again later.