Hey there, Cyber Security Engineers. Fancy a Fixed Term Contract to take you through Christmas/NY and well into 2025? Keen to see what an acquisition integration looks like? Want to wave goodbye to consultancy, MSP and vendor land, and work with an enterprise? Do you like free breakfast?
If you thought to yourself, “yes, I DO like free breakfast,” you might like this 9-month fixed-term contract in Sydney.
Firstly, please understand that this business spends 4/5 days per week in the (very nice Sydney CBD) office and expect the same from this Security Engineer. We understand that’s not for everyone, and that’s ok, but please understand this from the get-go.
Salary wise, you’re looking at an equivalent annual salary package inc. super around $140k – 165k, aligned with your experience.
So, what will you be stepping into? You’ll be joining a small-medium enterprise who’ve established a multi-year security journey, and you’ll be playing your part in moving things forward and supporting the cyber function.
Interestingly, this business is acquiring part of another organisation, hence the need for another set of hands to assist with integrating the two and seeing to a host of daily cyber tasks across this businesses’ security operations.
Will you be a one-person army? Nope. You’ll be part of a cyber team of 4 (you’ll be the 4th); a small but mighty cyber security team who own that function and deliver. You’ll have a colleague who’s in the tool/tech trenches with you, so rest assured you won’t be left alone in the corner.
So, what will you actually be doing day-to-day?
- Administering and managing cyber toolsets – mostly SaaS and cloud-based tools – like Netskope, R7, and CrowdStrike.
- Implementing and maintaining security services/tools, ensuring things are up-to-date and can effectively mitigate cyber risks.
- Responding to vulnerabilities and managing vulnerability remediation.
- Working closely with vendors to improve cyber hygiene and improve cyber posture. This cyber improvement piece is a large focus of the role.
- Assisting with coordinating pen tests with an external vendor.
In a role like this, the above bullets aren’t 100% of how you’ll be spending your time, but they do offer you a flavour of what you’ll be tackling.
If your interest is piqued but you’d like more info before deciding if this is for you, get in touch or please consider applying. There’s much more information – technical and contextual – that can be shared with you on a confidential basis which may help you decide if this is the job for you.
To succeed in a role like this, what will you need? - Prior experience in a security operations environment is a must.
- You’ll need broad technical experience, as you’ll be playing with a SIEM one minute, vulnerability management the next. Firewalls after that, then perhaps securing something in the cloud. Point is, from a tech standpoint, this will be a rather diverse role. Ergo, diverse experience is required.
- If you have even a basic understanding of application security concepts (AppSec testing, OWASP Top 10, DevOps methodologies, etc.), that’d be very well received.
- You’ll need a good understanding of security frameworks like NIST, E8, ISO27k.
- If you’re familiar with agile ways of working, you’ll be in a good position.
- You’ll need to be a dab hand with configs, patching and secure admin practices.
HOW TO APPLY Firstly, please know that any application you make is treated with abject confidentiality. The only people who will know you’ve applied are you & me. Reach out, and let’s chat about what you want.
Click APPLY and/or contact Michael directly on mpearman@decipherbureau.com for a 100% confidential, informal conversation where your privacy will absolutely be respected.
Decipher Bureau and the clients we partner with are committed to creating a diverse environment and are proud to be equal opportunity employers. All qualified applicants will be considered for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status.