Junior Security Analyst
Do you want to do impactful work that will be deployed to millions of citizens weekly? Do you want your input to be heard and taken into consideration? Apply and create a digital future with us!

25 000 - 30 000 USD per year

100% remote work

Full time

B2B contract

Direct employment by the client
We’re looking for a Junior Security Analyst to join the Australia-based company of cybersecurity pioneering company to develop and maintain large-scale, high-performance web applications and Implement frontend best practices and design patterns.
Requirements

Knowledge of penetration testing, malware/ransomware, OS and network security, security data analysis, etc.

1-2 years of relevant IT experience

Hands-on technologist – good working knowledge of Linux operating systems

Programming and scripting skills (Bash, Python, etc.)

Good understanding of security principles, such as access control, security protocols, vulnerability management, incident, and event management, etc.

Experience with packet capture tools and analysis of captures

Technical ability to resolve complex incidents and problems with a focus on security products

Tertiary degree in computer science or cyber security
Responsibilities

Being part of a 24×7 security operations team, security monitoring, and threat detection

Serving as the first line of response to reported security anomalies and incidents

Investigating and escalating security incidents

Documenting security breaches and assessing the damage they cause

SIEM configuration – dashboards, detection use cases

Managing customer service requests to ensure contracted service levels are met

Security system configuration and customization.
What do we offer?

Dynamic and collaborative work environment

Ability to work remotely

Paid leave

100% remote work

Long term cooperation
Please include GDPR consent
I acknowledge, that by submitting the form I give consent for my personal data included in the application to be processed by DevsData LLC for the purposes of current and future recruitment processes in accordance with Art. 6 paragraph 1 letter a of the Regulation of the European Parliament and of the Council (EU) 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
Copy GDPR formula