
Junior Cyber Security Analyst (Digital Forensics & Incident Response)
- Melbourne, VIC
- $77,000 per year
- Permanent
- Full-time
- Conduct threat monitoring, detection, and analysis across multiple environments, including on-premises, cloud, and hybrid.
- Investigate and respond to cyber incidents, including ransomware attacks, endpoint compromises, and business email compromises.
- Perform digital forensic investigations on Windows, Linux, macOS, and Android environments.
- Analyse network traffic (PCAP, NetFlow, proxy, DNS) and telemetry from EDR and SIEM platforms.
- Support incident lifecycle management including triage, containment, eradication, and recovery.
- Conduct malware reverse engineering and IOC (Indicators of Compromise) development.
- Evaluate the security posture of IT infrastructure, applications, and databases; provide recommendations for improvements.
- Conduct regular vulnerability assessments, penetration testing, and security patch management.
- Implement security upgrades, controls, and monitoring systems to reduce attack surfaces.
- Ensure compliance with security standards and data protection requirements.
- Manage forensic evidence collection and chain of custody.
- Produce detailed investigation reports, timelines, and technical analysis for internal stakeholders and external compliance.
- Develop and maintain DFIR playbooks, runbooks, and response frameworks.
- Contribute to the design and enhancement of DFIR labs, simulations, and scenarios (e.g., ransomware, insider threats, cloud intrusions).
- Collaborate with product and curriculum teams to ensure the accuracy and integrity of training content.
- Deliver live, high-energy classes & workshops to demonstrate incident response methodologies.
- Provide technical guidance and mentoring to learners.
- Contribute to knowledge base articles and internal playbooks.
- Bachelor's degree in relevant field required
- MDFIR (MCSI) certification required
- Experience with the MCSI Platform required
- Minimum 3 years of highly relevant experience is required
- Demonstrated experience in Digital Forensics and Incident Response (DFIR).
- Strong knowledge of cybersecurity operations, threat detection, and blue-team defence practices.
- Proven experience with:
- Malware analysis and reverse engineering.
- OS and network forensics.
- Cloud incident response (Azure, AWS, GCP).
- Security monitoring tools (EDR, SIEM).
- Experience conducting security assessments and implementing remediation strategies.
- Excellent written and verbal communication skills.
- Structured, reliable, and calm under time pressure.
- Strong analytical and evidence-driven mindset.
- High level of professional ethics, including data privacy and chain of custody practices.
- Able to work collaboratively with technical and non-technical stakeholders.