Cyber Security Operations Senior Analyst

  • Australia
  • Sydney
  • Permanent
  • Negotiable

About the Role

Join a leading higher education institution with a dynamic and large-scale environment where no two days are the same. You’ll work closely with researchers, academics, students, and ICT professionals in an open and collaborative culture. This role offers variety, impact, and the opportunity to protect critical infrastructure in a complex and evolving environment.

As a Cyber Security Incident Response Analyst, you will be responsible for managing incidents in a large, cloud-based environment, supporting the higher education sector’s cyber defence capabilities, and coordinating with a managed security service provider. You will handle dozens of incidents daily, ranging from low-severity events to high-profile, complex threats, ensuring fast and effective containment and remediation.

Key Responsibilities

Provide operational cyber security advice to clients and ICT stakeholders.

Support cyber operations services including monitoring, detection, incident response, and vulnerability management.

Coordinate with third-party managed security service providers (MSSPs).

Investigate and respond to incidents, coordinating containment, eradication, and remediation actions.

Administer and support vulnerability assessments in coordination with MSSPs.

Ensure remediation actions are completed following incidents or assessments.

Support delivery of security assessments using accredited third-party assessors.

Maintain awareness of emerging threats and provide timely updates to leadership.

Administer cyber security controls within ICT Security Operations.

Escalate significant issues and risks to management as required.

Contribute to continuous improvement of security processes and tools.

Skills & Experience Required

4-6 years of experience in cyber security, with strong expertise in incident response.

Experience working in large, complex environments with public cloud exposure.

Strong analytical, problem-solving, and stakeholder management skills.

Ability to collaborate across diverse teams and translate technical detail for non-technical stakeholders.

High level of resilience, motivation, and ability to work effectively in teams.

Experience with vulnerability management, endpoint response, and network detection/response tools.

Demonstrated knowledge of core cybersecurity principles and practices.

Preferred: SANS/GIAC certifications or equivalent industry-recognised qualifications.

Working Conditions

Hybrid working: Standard hours 9am-5pm (flexible 8.30am-4.30pm).

On-campus: Minimum 2 days per week (anchor day Thursday).

On-call roster: Week on/week off for weekends and public holidays.

After-hours incidents: Rare, typically only a few per month.

Compensation: On-call allowance of $10,000-$15,000 per annum in addition to base salary.

Apply now

Submit your details and attach your resume below. Hint: make sure all relevant experience is included in your CV and keep your message to the hiring team short and sweet - 2000 characters or less is perfect.