Jobs on PC World.


Security Operations Specialist

QLD, Brisbane
Posted on 01.08.2018
  • Cyber threat and vulnerability identification and mitigation experience required
  • Initial 6 month contract
  • Brisbane CBD based

New contract opportunity for an experienced Security Operations Specialist to join a Cyber Security team.


New Year, New Contract Brisbane based.

New contract opportunity for an experienced Security Operations Specialist to join a Cyber Security team.

In this role, you will be focussed on day to day security operations, you will undertake activates such as Cyber Security threat and vulnerability identification and mitigation, addressing security patch management. Configuration, maintenance and administration by applying industry standard techniques to resolve cyber security issues.

As the Security Operations Specialist, you will:

  • Gather and act on vulnerability information and conduct security risk assessments for business applications and computer installations; provides authoritative advice and guidance on security, and recommends appropriate control improvements. Interprets security policy and contributes to development of standards and guidelines that comply with this. Performs risk assessments, business impact analysis and accreditation for all major information systems within the organisation. Ensures proportionate response to vulnerability information, including appropriate use of forensics.
  • Assist to draft and maintain the policy standards, procedures and documentation for cyber security. Monitors the applications and compliance of security operations procedures and reviews information systems for actual or potential breaches in security. Ensures that all identified breaches in security are promptly and thoroughly investigated. Ensures that security records are accurate and complete.
  • Compile the findings of the operation and activities, including the scripts, frameworks, tools, and methods leveraged to facilitate the execution of the operations, including severity of findings and identify potential remediation or mitigation strategies.
  • Create extensive documentation and be able to present your findings to the rest of the team including training and education for technical staff on advanced exploits, tools, frameworks and techniques.

You will have
  • Knowledge in exploitation or enumeration techniques currently utilised on contemporary technologies. Ranging from but not limited to: Injection, privilege escalation, buffer overflows, fuzzing, Scanning, etc.
  • Experience with writing and demonstrating proof of concept work from an cyber security perspective
  • Capable to assist in the creation and employ modules and tailored payloads for common testing frameworks or tools.
  • Understanding of cryptography, its role in the enterprise, and its strengths as well as weaknesses
  • Knowledge of tactics, techniques, and procedures that could be used for recon, persistence, lateral movement, and exfiltration
  • Broad experience with reverse engineering, malware analysis, and/or forensic tools
  • Solid understanding of networking topologies, protocol usage, and enterprise hardware including switches, routers, firewalls, and their roles in security
  • Knowledge of access and security control methodologies; network / host intrusion detection, vulnerability management tools, patch management tools, penetration testing tools, and Anti-Virus solutions
  • Knowledge of and ability to apply security focused standards: ITIL such as awareness and methodologies, IS18, ISO27000 series, OWASP Top 10

To be considered for the role click the 'Apply' button or for more information about this and other opportunities please contact Anita Cunningham on 07 33395626. Please quote our job reference number: 200174260.

Reference Number: 200174260_1

Contact Details:

How to Apply?

Click on the link below

Click here for more information about this job

Jobs you may also be interested in ...

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?