Skip to main contentA logo with &quat;the muse&quat; in dark blue text.

Cyber Security Architect(Contract)

AT Wipro
Wipro

Cyber Security Architect(Contract)

Melbourne, Australia

WHAT IS THE PURPOSE OF MY ROLE?

This role exists to execute the cyber-security incident detection and response function within Security Services. The role is also responsible for contributing to the on-going maturity of the team, processes and frameworks.

The role requires strong technical skills and experience in incident detection and response.

Accountabilities

  • Respond to cyber-security threats, vulnerabilities, events and incidents
  • Act as technical contributor during major security incidents
  • Contribute to improvement in the team's capability, including:
    • Operational maturity, including processes/methodologies, playbooks, automation, efficiency, quality
    • Detection strategies, including attack models, use cases, tuning, R&D
    • Mitigation strategies, including proactive planning, new controls, optimising existing controls
    • Participate and contributing to the planning and executing of purple teaming activities
  • Meet team operational metrics
  • Maintain an up-to-date knowledge of cyber threats
  • Drive continuous learning and knowledge sharing within the team
  • As required, support internal stakeholders and projects
  • Work in a 'business hours + rostered on-call' environment
  • Other related activities as required by Management or Cyber Response Leads

Want more jobs like this?

Get jobs in Melbourne, Australia delivered to your inbox every week.

By signing up, you agree to our Terms of Service & Privacy Policy.

DBACKGROUND INFORMATION ABOUT MY ROLE:

Who does my role report to?
Manager, Cyber Response

Do I lead a team in this role? NO

COMMON NEXT CAREER MOVES:

Coming into this role:

Experience

Please include

See Essential Capabilities

Essential capabilities

Good understanding and experience with:

  • Incident response methodologies and techniques
  • Detection and mitigation strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltration
  • Common cloud platforms/technologies, such as Azure, AWS and Google cloud
  • Common enterprise technologies, such as Windows, Linux, Active Directory, DNS, DHCP, web proxies, SMTP, TCP/IP
  • Malware analysis and reverse engineering, including dynamic and static analysis
  • Operational usage of common analysis and response tooling, including Splunk, Crowdstrike, Microsoft Defender, FireEye, Akamai, etc
  • Performing vulnerability assessments and penetration testing, including network, infrastructure and application exploitation
  • The Lockheed Martin Cyber Kill Chain™ or similar methodologies

Essential non-technical skills:

  • Demonstrated ability to stay calm and lead under pressure
  • Experience working in a CSOC / CIRT performing 2 and/or level 3 support
  • Experience in a complex enterprise environment
  • Demonstrated willingness to engage in self-learning or security research outside of standard business hours
  • Good analytical, problem solving and lateral thinking skills
  • Good verbal and written communication skills
  • Good time management and prioritisation skills
  • Basic consulting and stakeholder management

Qualification Requirements

Tertiary qualifications preferably in technology and cyber-security subjects.

Preferably:

  • SANS GIAC Certified Incident Handler (GCIH) or similar
  • SANS GIAC Certified Forensic Analyst (GCFA) or similar
  • SANS GIAC Reverse Engineering Malware (GREM) or similar
  • SANS GIAC Penetration Tester (GPEN) or Offensive Security Certified Professional (OSCP) or similar

Common next career moves (please list and include roles in T&EO outside of Security if applicable):
Senior Consultant (Lead) Cyber Response Analysts
Senior Consultant (Lead) Cyber Threat Intelligence

A TYPICAL DAY FOR ME INVOLVES:

Please include

  • Respond to cyber-security threats, vulnerabilities, events and incidents
  • Act as technical contributor during major security incidents
  • Contribute to improvement in the team's capability, including:
    • Operational maturity, including processes/methodologies, playbooks, automation, efficiency, quality
    • Detection strategies, including attack models, use cases, tuning, R&D
    • Mitigation strategies, including proactive planning, new controls, optimising existing controls
    • Participate and contributing to the planning and executing of purple teaming activities
  • Meet team operational metrics
  • Maintain an up-to-date knowledge of cyber threats
  • Drive continuous learning and knowledge sharing within the team
  • As required, support internal stakeholders and projects

If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at helpdesk.recruitment@wipro.com. Do not email your resume to this ID as it is not monitored for resumes and career applications.

Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at ombuds.person@wipro.com.

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.

Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.

Client-provided location(s): Melbourne VIC, Australia
Job ID: Wipro-1145881055
Employment Type: Other