The Organisation The Australian Security Intelligence Organisation (ASIO) protects Australia and Australians from threats to their security. In complex, challenging and changing security environment, our success is built on the imagination and intelligence of our team. ASIO's people are ordinary Australians but they do extraordinary things - they are our most important asset. To be successful in our mission, we need talented people who are highly capable, dedicated, adaptable and resilient. We seek to reflect the diversity of the community we protect. ASIO is committed to fostering a diverse and inclusive environment, where all staff are valued and respected. We welcome applications from all eligible candidates, irrespective of gender, sexual orientation, ethnicity, religious affiliation, age or disability. Aboriginal and Torres Strait Islander Peoples are encouraged to apply. We are secretive about what we do, not what we value. The opportunity ASIO employs a diverse range of cyber security specialists across offensive and defensive functions. As a Cyber Security Specialist, you could be involved in the protection of ASIO from insider and cyber threats, or directly contribute to operational activities. At ASIO, you have the opportunity to develop, expand and apply your skills across the full breadth of its cyber security functions. We are seeking cyber security technologists across multiple levels to fill vacancies in our Cyber Security Operations Centre (SOC) and Cyber Security Assurance teams. This includes roles that specialise in: • Protective monitoring. • Incident response. • Platform and detection engineering. • Cyber threat intelligence. • Threat hunting. • Red teaming/attack modelling. • Vulnerability assessment. • Governance, Risk and Compliance (GRC). • Cyber Security Advisor. These roles are critical to ensuring that ASIO is effectively mitigating cyber security threats through the delivery of cyber security monitoring and response capabilities, vulnerability management, cyber security awareness campaigns, and the delivery of technical capabilities to support the cyber security functions. These positions may attract an additional technical skills allowance. A merit pool may be created to fill future vacancies which have the same or similar requirements to this position. This merit pool will be valid for up to 18 months. The key duties of the position include As a Cyber Security Operations Centre Analyst (ITE1/ITE2) in ASIO, you will: • Leverage your understanding of emerging cyber-attacks to develop mechanisms to monitor and detect malicious activity on ASIO systems. • Analyse security event logs, network traffic, and system activity to identify and understand security threats. • Respond to security incidents by investigating and resolving malicious activity. • Ingest and implement threat intelligence to improve threat detection and contribute to the creation of tactical and strategic intelligence. • Undertake threat hunts to proactively detect malicious activity on systems. • Develop and maintain documentation of security incidents, including root cause analysis and lessons learned. • Maintain up-to-date technical knowledge on the latest cyber security threats, technologies, and developments. As a Cyber Security Operations Centre Detection Engineer (ITE1/ITE2) in ASIO, you will: • Assess and determine detection requirements for each monitored environment using relevant frameworks, policies, system and application risks, business risk and threat intelligence. • Develop, test and deploy new and updated detection content across the monitored estate with support from the threat intelligence, protective monitoring and incident response teams. • Review and update existing detection content to ensure it remains relevant and appropriate to the monitored estate. • Provide operational support for a number of cyber security technologies such as endpoint security, network security, cloud security and vulnerability management to ensure they address detection requirements. • Maintain accurate documentation on deployed detection content to ensure the SOC has an accurate view of content coverage across the monitored estate. • Investigate and maintain up-to-date knowledge on the latest cyber security technologies, with particular focus on detection and security automation technologies, to contribute to Continuous Service Improvement efforts. As a Cyber Security Operations Centre Platform Engineer (ITE1/ITE2) in ASIO, you will: • Design, configure and manage complex infrastructure and security technologies across both cloud and on-premise environments in collaboration with internal SOC teams and external stakeholders. • Maintain the operational performance, availability, capacity and security of SOC platforms and infrastructure. • Conduct routine maintenance of SOC tooling and platforms to ensure they remain fully operational and fit-for-purpose. • Work with appropriate stakeholders to act on requests for changes to platforms, systems and configurations to ensure the on-going effective of SOC platforms. • Assist with maintaining and updating knowledge base articles associated with the SOC's use of technology including virtual and physical network/service diagrams, data flows, interfaces and build/configuration guides across the monitored estate. • Investigate and stay abreast of technological advancements that would be applicable to SOC operations and contribute to Continuous Service Improvement efforts. As a Cyber Security Technologist, Cyber Security Assurance (ITE1/ITE2) in ASIO, you will: • Promote, enable and provide specialist security advice on the design, architecture of new and emerging systems in alignment with industry and community best practices. • Collaborate with project teams in the development of securely designed systems through the development of supporting security documentation and risk assessments. • Lead and support compliance assessments of ASIO's systems against relevant Australian Government policies, standards and best practices such as: Protective Security Policy Framework (PSPF) and Information Security Manual (ISM). • Lead and facilitate cyber threat modelling and risk workshops, collaborating with stakeholders to identify, assess, and prioritise security threats and risks, and provide support and guidance to implement mitigation strategies. • Develop and maintain IT security policies. • Perform staff security awareness maturity assessments and deliver curated and interactive cyber security awareness campaigns to increase awareness. • Maintain up-to-date technical knowledge on the latest cyber security threats, technologies and developments. What you will bring We invite applications from people with some or all of the following attributes: • Relevant degree or equivalent experience working in a cyber security operations, engineering or assurance role with a strong curiosity to learn from subject matter experts. You will have some experience working in a role related to the field that you are applying for (i.e. operations, engineering and/or assurance). • Relevant certifications within cyber security (e.g. SANS GIAC certifications, CISSIP, CISM). • Experience with security technologies such as Security Information and Event Management (SIEM) systems (preferably Splunk and/or Sentinel), vulnerability management tools (e.g. Tenable), endpoint and network security tools, threat intelligence platforms (e.g. OpenCTI), incident response tools, and cloud environments (e.g. AWS Guard Duty and Microsoft Defender). • Experience in the design, implementation, and maintenance of on-premise and/or cloud enterprise systems using some or all relevant technologies such as the VMware ecosystem, enterprise operating systems, AWS services (EC2, ECS, CloudFormation, CodePipeline) and platform automation tools such as Ansible and Puppet. • Knowledge of security frameworks and standards such as the Information Security Manual (ISM). • Previous experience working in a Security Operations Centre would be highly desirable. • Strong analytical and problem-solving skills, with the ability to work under pressure. • Demonstrated ability to work closely with stakeholders, including internal technology teams, external managed service providers, vendor professional services, and domestic and international partners. • Excellent collaboration skills and demonstrated ability to lead the delivery outcomes. • Strong security awareness and risk management skills.