About the job
APPLICATIONS CLOSE ON MONDAY, 9TH MARCH AT 5PM
Position: Cybersecurity Analyst L1
Location: Auckland, New Zealand
Security Requirements: Open to New Zealand Residents and Citizens only.
Employment Type: Full-Time, Permanent Position
Our Mission
At Datacom, we partner with organizations and communities across Australia and New Zealand, empowering them to leverage technology for innovation and growth.
About Our Team
Our Cybersecurity Defence Operations Centre (SOC) operates from Wellington, Auckland, and Brisbane, delivering a comprehensive suite of managed SIEM and cybersecurity services. Our established team comprises Cybersecurity Analysts, Engineers, DevOps Engineers, and Incident Responders, collectively managing diverse clientele, including commercial and government sectors, for over a decade. We are a mature operational team focused not only on responding to security events but also on proactively hunting for anomalous activities within our clients' environments.
Collaborating with industry leaders allows us to enhance our service offerings and equips you with a robust technical skill set, certifications, and practical experience. We seek Analysts at various experience levels, from junior to senior, who are eager to advance their careers.
Role Overview
As a Cybersecurity Analyst, your primary responsibilities will include analyzing security events, managing incidents from initiation to resolution, and refining alerts. Employing defensive strategies and insights from multiple sources, you will identify, analyze, and report on events that may pose threats to our network. This proactive approach is critical in safeguarding our information systems and networks.
Note: Given the nature of our clientele, candidates must be New Zealand Citizens or Permanent Residents capable of passing additional background and security checks.
Key Responsibilities:
- Execute regular tasks and processes
- Review and respond to alerts and tickets
- Conduct incident response investigations
- Manage escalations of Events of Interest
- Perform initial triage
- Analyze security events
- Log and escalate tickets as needed
- Identify necessary policy changes based on analysis
- Develop security use cases and correlation rules
- Monitor emerging threats

