CrawlJobs Logo

Cyber Operations Analyst

boeing.com Logo

Boeing

Location Icon

Location:
Australia , Edinburgh

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

At Boeing, we innovate and collaborate to make the world a better place. We’re committed to fostering an environment for every teammate that’s welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us.

Job Responsibility:

  • Monitor and Analyse network traffic and event logs to identify potential threats and vulnerabilities
  • Assist in assessment of security control effectiveness
  • Support Incident response activities and post incident analysis
  • Assist in developing strategies to detect and prevent cyber attacks, including the deployment of security tools and technologies
  • Collaborate with the Commonwealth partner and other stakeholders to investigate and respond to security incidents, ensuring timely resolution and mitigation
  • Support and manage security technologies such as Firewalls and IDS/IPS
  • Support security assessments and audits to identify weaknesses and recommend appropriate security measures
  • Support the maintenance of incident response plans and procedures

Requirements:

  • Relevant or working towards a degree in a cyber related field or demonstrated experience
  • Hold an NV1 clearance
  • Ability to obtain an NV2 security clearance
  • Applicants must be Australian Citizens to meet Defence security requirements

Nice to have:

  • Digital Forensics (DFIR) certifications such as SANS or GIAC are desirable
  • Knowledge the Australian Information Security Manual (ISM), Defence Security Principles Framework (DSPF) and the Protective Security Policy Framework (PSPF) is a bonus
What we offer:
  • Work on cutting edge projects with opportunities to work across platforms
  • Attractive remuneration and annual bonus
  • Formal mentoring and training as well as on the job learning
  • Formal reward and recognition program
  • Access discounts for health insurance, travel and accommodation
  • Paid study leave, paid parental leave and Defence leave
  • Salary packaging options available
  • Health and wellbeing benefits including annual flu vaccinations and Employee Assistance Program
  • Social and community groups
  • working from home
  • compressed work weeks
  • opportunities for part time arrangements

Additional Information:

Job Posted:
May 17, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Operations Analyst

Principal Cyber Operations Analyst Trainer

Knight Federal Solutions Inc. is seeking a Principal Cyber Operations Analyst Tr...
Location
Location
United States , Suffolk
Salary
Salary:
Not provided
knightfederal.com Logo
Knight Federal Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree with a minimum of 10 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Master’s degree with a minimum of 6 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Joint Forces Staff College or Service equivalent
  • Thorough understanding of cyber operations and experience at the operational level
  • Must be willing to travel worldwide, to include areas considered hazardous duty (up to 25% of the time)
  • Must have an active U.S. Department of Defense (DoD) Secret security clearance with the ability to obtain a DoD Top Secret security clearance once aboard
  • Must be able to work on-site in Suffolk, Virginia
Job Responsibility
Job Responsibility
  • Acts as a subject matter expert and trainer in cyber operations in joint, multinational, interagency, and globally integrated exercises and operations
  • Integrates into, contributes to, and provides functional continuity in the DTD’s Fires and Effects Section
  • Mentors, trains, and supports new OTs
  • Participates as a member of Deployable Training Teams (DTTs)
  • Ascertains key command challenges at the operational and strategic levels of war and conducts cross-functional analysis of information gathered from joint exercises and training events for the development of lessons learned, insights, and best practices
  • Understands strategic thought and direction as it guides and is influenced by campaign, deliberate, and crisis planning at the operational level
  • Researches national strategic documents, historical exercise documents, real world operations, the operating environment, command mission, organization, plans, and orders, as well as interagency and coalition policies, strategies, and plans
  • Conducts trend analysis, understands and improves battle rhythms, provides observation and training, ties phased operational planning to strategic thought, and develops feedback
  • Develops the Commander’s Facilitated After-Action Review (FAAR), Executive Summary Report (ESR), Combined Functional Report (CFR), and Internal After Action Review (IAAR), Post-event debriefs and summaries, and input into the Joint Lessons Learned Information System (JLLIS)
  • Updates and maintains documents, articles, and periodicals
Read More
Arrow Right

Cyber Threat Analyst

AnaVation is seeking a Cyber Threat Analyst to join our team and support our mis...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 1-8 years of experience related to specific functional area (May substitute Master’s degree in lieu of 4 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CEH, CySA+, CFR)
  • Working collaboratively across cross-functional teams of all experience levels
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
  • Experience completing and coordinate tasks across cross-functional teams in either a lead or supporting role
  • Ability to provide recommendations for enhancing views of device data in bulk and to view associations of all the data related to those devices
  • Experience leading, developing, and delivering inter-discipline and inter-organizational capabilities and processes to improve performance
  • Technical understanding of classified networks, servers, storage, operating systems, applications, and the full stack of supporting technologies
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
Job Responsibility
Job Responsibility
  • Create analysis products based on cyber threat fusion to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Focus on collectively building higher value fusion products, expanding effective lines of communication, knowing lanes of responsibility, and building trust in consistently improving capabilities
  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develops technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
Read More
Arrow Right

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Senior Cyber Security Analyst

In the Bosch Cyber Security Organization, we coordinate the vulnerability manage...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree (Master/Diploma/PhD) in Information Security, Computer Science, Software Development, Electrical Engineering, Mathematics, or a comparable field of study
  • Team player who is familiar with both cooperation and delegation
  • Versatile and communicative individual who enjoys preparing and sharing information tailored to the target audience
  • Strong technical background in security and several years of professional experience in multiple of the following fields: IT Security, Cloud Security, Embedded Security, Industrial Control Systems (ICS), Industrial IoT (IIoT), Consumer IoT, Software Security and Security Research, Vulnerability Management process design and execution
  • ideally basic knowledge in the operational management of a CSIRT, CERT, or Product-CERT
  • Love challenges, while defining and implementing processes in a new, effective, and user-oriented manner
  • Very good English, written and spoken
  • German would be an important asset
Job Responsibility
Job Responsibility
  • Investigate and assess vulnerabilities within their operational environment, providing the basis for prioritizing the follow-up of vulnerability remediation
  • Work closely with development and operations teams in Poland, as well as tracking teams in India, supporting the further development of our Enterprise Security Advisory Services and the tracking of risks through vulnerabilities
  • Continuously identify process improvements for enhanced tool support and coordinate their implementation with the respective international teams
  • Actively work as a team to network with external stakeholders
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December
  • Fulltime
Read More
Arrow Right

Senior Cyber Security Analyst

In the Bosch Cyber Security Organization, we coordinate the vulnerability manage...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree (Master/Diploma/PhD) in Information Security, Computer Science, Software Development, Electrical Engineering, Mathematics, or comparable field
  • Team player familiar with cooperation and delegation
  • Versatile and communicative individual who enjoys preparing and sharing information tailored to target audience
  • Strong technical background in security and several years of professional experience in multiple fields: IT Security, Cloud Security, Embedded Security, Industrial Control Systems (ICS), Industrial IoT (IIoT), Consumer IoT, Software Security and Security Research, Vulnerability Management process design and execution
  • Ideally basic knowledge in operational management of CSIRT, CERT, or Product-CERT
  • Love challenges while defining and implementing processes in new, effective, and user-oriented manner
  • Very good English written and spoken
  • German would be an important asset
Job Responsibility
Job Responsibility
  • Investigate and assess vulnerabilities within operational environment
  • Provide basis for prioritizing vulnerability remediation follow-up
  • Work closely with development and operations teams in Poland and tracking teams in India
  • Support further development of Enterprise Security Advisory Services
  • Track risks through vulnerabilities
  • Continuously identify process improvements for enhanced tool support
  • Coordinate implementation of improvements with international teams
  • Actively work as team to network with external stakeholders
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Professional support and knowledge sharing
  • Ongoing development opportunities in multinational environment
  • Broad access to professional trainings including language courses, conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits including MultiSport, shopping vouchers, cinema tickets
  • Prepaid Lunch Card
  • Fulltime
Read More
Arrow Right

Cyber Crime Analyst

The cyber crime analysts participate in the full lifecycle of intelligence produ...
Location
Location
United States , Miami
Salary
Salary:
Not provided
q6cyber.com Logo
Q6 Cyber
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BA degree or analytical experience from military / intelligence agencies, or similar experience from private sector
  • Strong team and interpersonal skills along with the ability to work independently and achieve individual goals
  • Excellent English verbal and written communication skills
  • Skilled at WEBINT operations
  • High level of interest in combating cybercrime and fraud
  • Can-do attitude
  • Ability to work from our Miami
Job Responsibility
Job Responsibility
  • Identify and evaluate new data sources
  • Conduct web-based research on “open” sources as well as the Darknet, Deep Web, and other restricted information sources
  • Develop and execute advanced analytics using our proprietary intelligence platform
  • Make fact-based assessments on a wide range of threats and risks affecting our clients
  • Generate intelligence reports and other deliverables
  • Regularly engage with clients to deliver intelligence and make recommendations
  • Fulltime
Read More
Arrow Right

Cyber Defense Analyst

The cyber defense analyst for Services within the Business, Functions and Techno...
Location
Location
Mexico , Ciudad De Mexico
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders’ pain-points (data/reporting, false positives, processes)
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Conduct security reviews to check for security compliance to Bank’s requirements
  • Identify areas of repeating SIRT incidents, related trending and work with technology team and ISO contacts in reducing repeat volume instances
  • Identify opportunities for improving SIRT workflow efficiencies and developing reporting which better reports on root causes for bringing down repeat instance volumes
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
Job Responsibility
Job Responsibility
  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders’ pain-points (data/reporting, false positives, processes)
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Conduct security reviews to check for security compliance to Bank’s requirements
  • Identify areas of repeating SIRT incidents, related trending and work with technology team and ISO contacts in reducing repeat volume instances
  • Identify opportunities for improving SIRT workflow efficiencies and developing reporting which better reports on root causes for bringing down repeat instance volumes
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
  • Fulltime
Read More
Arrow Right