
Senior Security Engineer – Microsoft Sentinel & Threat Detection
- Melbourne, VIC
- Permanent
- Full-time
- Lead the architecture, deployment, and continuous improvement of Microsoft Sentinel across Flybuys environments.
- Engineer scalable log ingestion pipelines and integrations to maximise visibility and threat detection coverage.
- Design and optimise KQL-based analytics rules, workbooks, playbooks, and automation workflows.
- Collaborate with engineering and platform teams to ensure telemetry is captured, enriched, and actionable.
- Provide strategic guidance on data normalisation, enrichment, and threat modelling within Sentinel.
- Work closely with security architects, product owners, delivery leads, and engineering teams to define and deliver sustainable, effective security outcomes.
- Identify risks and vulnerabilities in technical solutions and recommend appropriate controls or mitigations.
- Explain the purpose and operation of security controls to technical and non-technical stakeholders.
- Contribute to solution architecture and high-level design documentation with a security lens.
- Support the development and maintenance of security standards, patterns, and operational artefacts.
- Enhance cloud security posture across Azure and AWS through Sentinel-driven insights.
- Drive remediation of security gaps identified via Sentinel analytics and threat hunting.
- Ensure cloud infrastructure is securely configured and monitored using Sentinel and integrated tools.
- Champion modern detection engineering practices and continuous improvement.
- Evaluate emerging detection technologies and assess their applicability to Flybuys' security strategy.
- Make informed design decisions balancing detection fidelity, performance, and operational efficiency.
- Act as the technical lead for Microsoft Sentinel and related detection platforms.
- Support incident response activities with Sentinel-driven investigation and automation
- Proven experience in security engineering with a strong focus on Microsoft Sentinel, including:
- Log ingestion, parsing, and enrichment
- KQL-based rule development and alerting(Development of analytics rules and alerting mechanisms
- Integration with Microsoft Defender and other security platforms
- Automation using Logic Apps and Sentinel playbooks
- Deep understanding of cloud security principles in Azure and AWS.
- Hands-on experience with SIEM, EDR, and threat detection tooling.
- Strong analytical skills in interpreting telemetry and identifying threats.
- Experience designing and implementing detection controls across infrastructure and applications.
- Familiarity with agile delivery methodologies.
- Able to communicate effectively with technical teams.
- Able to clearly articulate detection strategies and technical issues to non-technical stakeholders.
- Bachelor's degree in Cybersecurity, Information Technology, or related field (desirable)
- Relevant industry certifications (e.g., SC-200, AZ-500, CISSP) (desirable)
- Experience in threat detection and threat hunting (desirable)
- Flybuysflex | work from anywhere, measured on outcomes
- Two well-being days per year!
- Volunteer leave
- Ongoing learning & development programs and opportunities
- My Coles and Wesfarmers team member discount card
- Be Well Programs - Mind/Body/Soul
- Quarterly All Team events
- Hybrid social events
- New starter kit merchandise