Junior Cyber Security Analyst (Digital Forensics & Incident Response)

Job2Go

  • Melbourne, VIC
  • $77,000 per year
  • Permanent
  • Full-time
  • 1 day ago
  • Apply easily
Position: Junior Cyber Security Analyst (Digital Forensics & Incident Response)Position Type: Full-TimeSalary: $77,000 plus superannuation per annumLocation: Melbourne VIC 3000Our client is seeking Junior Cyber Security Analyst to join their team located in Melbourne, Victoria.As a Cyber Security Analyst you will be responsible for investigating, responding to, and preventing cyber threats through Digital Forensics and Incident Response (DFIR) practices, as well as implementing protective security measures across systems and networks. This role requires a hands-on practitioner with deep technical expertise in DFIR, cyber defence, and secure system operations. The position involves teaching and mentoring responsibilities.Duties and Responsibilities:Cybersecurity Operations & Incident Response
  • Conduct threat monitoring, detection, and analysis across multiple environments, including on-premises, cloud, and hybrid.
  • Investigate and respond to cyber incidents, including ransomware attacks, endpoint compromises, and business email compromises.
  • Perform digital forensic investigations on Windows, Linux, macOS, and Android environments.
  • Analyse network traffic (PCAP, NetFlow, proxy, DNS) and telemetry from EDR and SIEM platforms.
  • Support incident lifecycle management including triage, containment, eradication, and recovery.
  • Conduct malware reverse engineering and IOC (Indicators of Compromise) development.
Cyber Defence & Protection
  • Evaluate the security posture of IT infrastructure, applications, and databases; provide recommendations for improvements.
  • Conduct regular vulnerability assessments, penetration testing, and security patch management.
  • Implement security upgrades, controls, and monitoring systems to reduce attack surfaces.
  • Ensure compliance with security standards and data protection requirements.
Forensic Evidence & Reporting
  • Manage forensic evidence collection and chain of custody.
  • Produce detailed investigation reports, timelines, and technical analysis for internal stakeholders and external compliance.
  • Develop and maintain DFIR playbooks, runbooks, and response frameworks.
Content Development & Continuous Improvement
  • Contribute to the design and enhancement of DFIR labs, simulations, and scenarios (e.g., ransomware, insider threats, cloud intrusions).
  • Collaborate with product and curriculum teams to ensure the accuracy and integrity of training content.
Teaching & Mentoring
  • Deliver live, high-energy classes & workshops to demonstrate incident response methodologies.
  • Provide technical guidance and mentoring to learners.
  • Contribute to knowledge base articles and internal playbooks.
Requirements:Qualifications & Experience
  • Bachelor's degree in relevant field required
  • MDFIR (MCSI) certification required
  • Experience with the MCSI Platform required
  • Minimum 3 years of highly relevant experience is required
  • Demonstrated experience in Digital Forensics and Incident Response (DFIR).
  • Strong knowledge of cybersecurity operations, threat detection, and blue-team defence practices.
  • Proven experience with:
  • Malware analysis and reverse engineering.
  • OS and network forensics.
  • Cloud incident response (Azure, AWS, GCP).
  • Security monitoring tools (EDR, SIEM).
  • Experience conducting security assessments and implementing remediation strategies.
  • Excellent written and verbal communication skills.
Working Style & Attributes
  • Structured, reliable, and calm under time pressure.
  • Strong analytical and evidence-driven mindset.
  • High level of professional ethics, including data privacy and chain of custody practices.
  • Able to work collaboratively with technical and non-technical stakeholders.

Job2Go