CrawlJobs Logo

Cyber Threat Specialist

woolworths.com.au Logo

Woolworths Supermarkets

Location Icon

Location:
Australia , Victoria

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Critical role within the Cyber Threat Intelligence Team. As a Threat Specialist within our expanding Cyber Threat Intelligence Team, you’ll be protecting an Australian icon. At Woolworths, our brands are woven into the fabric of daily life, and you will be the shield that keeps them secure.

Job Responsibility:

  • Maintain awareness of the cyber threat landscape by conducting research to contribute to formal threat reports and curate actionable intelligence
  • Triage, tune, and customise threat alerts while incorporating curated Indicators of Compromise (IOCs) into the existing threat framework
  • Identify and prioritise detection opportunities using SIEM and EDR tools, mapped against the Mitre ATT&CK framework for comprehensive coverage
  • Conduct threat hunting, trigger incident response workflows, and provide dedicated intelligence support during major security incidents
  • Proactively raise security risks and recommend appropriate controls to strengthen the organisation's defensive posture
  • Assist with the zero-day vulnerability process and ensure all technical documentation remains current and accurate
  • Drive continuous improvement by streamlining workflows through the strategic use of automation and advanced tooling

Requirements:

  • 7+ years of tested cyber security experience within high-pressure environments, including SOC, NOC, and CIRT ecosystems
  • Expert-level mastery in network intrusion, detection, and response, with a current and sharp understanding of the modern threat landscape
  • Deep-seated intuition for malicious code, with the specialised skills required to understand the anatomy of an attack
  • Seamlessly applying the MITRE ATT&CK® framework and Cyber Kill Chain methodology to map adversary behavior and anticipate the 'next move'
  • Broad spectrum confidence across an array of security applications, ensuring the right tool is leveraged for the right threat at the right time
  • Advanced proficiency in Open Source Intelligence, turning public data into actionable defensive strategies
  • A rare ability to translate complex cyber risks into tangible business outcomes, ensuring security initiatives drive organisational value rather than just technical compliance
  • Comprehensive end-to-end exposure to Incident Response (IR), from initial triage through to post-mortem and long-term hardening
  • Equally effective as an individual contributor or a collaborative team player, maintaining peak performance in both autonomous and integrated environments

Additional Information:

Job Posted:
January 25, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Threat Specialist

Cyber Analysis Support Specialist

The Cyber Analysis Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree in liberal arts or sciences or equivalent military training
  • Experience with computer network operations and SIGINT tools and databases
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
  • The ability to work non-standard hours when needed
Job Responsibility
Job Responsibility
  • Conduct research, evaluate technical threat data, and leverage all-source intelligence in a network operations and cyber warfare environment
  • Evaluate cyber threat events to determine their impact on DoD and US Government operations and understand adversary capabilities
  • Leverage multiple analytic tools to conduct research and analyze data
  • Analyze vulnerabilities associated with DoD and US Government networks to determine risk
  • Write collection requirements and tasking for signals intelligence collection systems based on analytic assessments
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Network Threat Support Specialist

The Network Threat Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree or equivalent military training
  • Experience discovering threats and/or anomalies in network data
  • Experience discovering and responding to network intrusions
  • Experience adjusting security controls to prevent malware and/or intrusion activity
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
Job Responsibility
Job Responsibility
  • Identify adversarial threats and activities against DoD and US government network
  • Analyze and discover threat and intrusion events
  • Leverage technical analysis capabilities to analyze malware and develop methods to defend against malicious activity
  • Respond to and analyze network intrusion and attack events
  • Characterize the capabilities of malware, document how to detect malware, and assess it’s impact
  • Analyze systems and networks of interest, identify network vulnerabilities, and create techniques to exploit networks
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Cyber Security Specialist

Security is a strategic pillar for us. Our modern, distributed architecture dema...
Location
Location
Italy , Milan
Salary
Salary:
Not provided
livestory.nyc Logo
Live Story
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience in cloud security (AWS/Azure/GCP), IAM/SSO, SIEM, WAF, endpoint security
  • Strong understanding of threat modelling, vulnerabilities (e.g., OWASP Top 10), MITRE ATT&CK
  • Experience with compliance frameworks and certification processes
  • Hands‑on problem solver, able to translate technical issues into business risks and vice versa
  • Excellent communication skills and teamwork orientation
  • English fluency
  • Italian is a plus
Job Responsibility
Job Responsibility
  • Monitor and manage the attack surface: applications, infrastructure, APIs
  • Perform vulnerability assessments, penetration testing, risk analysis and remediation
  • Define, implement and maintain security policies, procedures and controls (e.g., ISO 27001, SOC2, GDPR)
  • Collaborate with engineering, product and legal teams to ensure compliance and risk mitigation
  • Manage incident response: alerting, logging, encryption, forensic analysis
  • Drive continuous improvement of our security posture and culture
  • Fulltime
Read More
Arrow Right

Head of cyber threat exposure and attack surface management

Lead the enterprise-wide Continuous Threat Exposure Management (CTEM) strategy, ...
Location
Location
United Kingdom , Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in cybersecurity with direct exposure to vulnerability management, red teaming, or threat exposure reduction
  • Proven track record leading programs integrating CSPM, SSPM, ASM, BAS, or exposure correlation technologies
  • Strong understanding of attack paths, adversary emulation, and continuous validation concepts
Job Responsibility
Job Responsibility
  • Own and drive the global CTEM strategy, establishing a continuous, threat-driven exposure management lifecycle aligned with NIST, MITRE, and CISA Secure-by-Design principles
  • Lead and develop a high-performing CTEM team, fostering collaboration, technical excellence, and an outcome-driven culture
  • Integrate and oversee key exposure management technologies, including Cloud Security Posture Management (CSPM), SaaS Security Posture Management (SSPM), Attack Surface Management (ASM), Breach & Attack Simulation (BAS), and other exposure correlation platforms
  • Correlate assets, identity, vulnerability, and configuration to identify high-impact, exploitable attack paths and inform prioritized remediation strategies
  • Collaborate with Application Security, Vulnerability Management, Red Team, and Security Operations to synchronize discovery, validation, and remediation of exposures across the enterprise
  • Align CTEM outputs with real-world adversary behaviors, leveraging Red Team and Threat Intelligence input to validate attack paths and focus on exploitable conditions
  • Drive automation and AI-enabled analytics to continuously map, assess, and measure reductions in the organization’s attack surface
  • Translate technical findings into business risk language, enabling senior leadership and risk committees to make data-driven investment decisions
  • Define and lead CTEM governance and operating models, ensuring exposure assessments, validation, and remediation tracking are embedded in operational processes
  • Establish clear KRIs and maturity metrics that demonstrate continuous improvement in visibility, validation, and response effectiveness
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right

Cyber Security Specialist

Cybersecurity is an always-on field, so you’ll stay advised of all the latest tr...
Location
Location
Netherlands , Nieuwegein
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A completed HBO or WO education with a focus on IT or Cybersecurity
  • At least 2 years of experience as a cybersecurity specialist in the field of security engineering, security monitoring and/or incident response
  • Certifications such as GSEC, GCIH, Security+ or certifications in Azure (e.g. AZ900 and AZ500), Microsoft SC-200, AWS, Splunk or Elastic
  • Languages: Dutch (required) and English
Job Responsibility
Job Responsibility
  • Conduct threat analysis, incident response
  • Ensure assets meet security standards, maintain confidentiality, and contribute to safeguarding the systems
  • Implement new solutions to protect companies against incidents
  • Share knowledge with colleagues
What we offer
What we offer
  • Mobility options (including a company car), insurance coverage, meal vouchers, eco-cheques
  • Continuous learning opportunities through the Sopra Steria Academy
  • Opportunity to connect with fellow Sopra Steria colleagues at various team events
Read More
Arrow Right

Threat Intelligence Analyst

Threat Intelligence Analyst - initial 3-6 month contract. We're seeking a highly...
Location
Location
United Kingdom , Portsmouth or London
Salary
Salary:
Not provided
triarecruitment.com Logo
TRIA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years' experience in Threat Intelligence, SOC or Incident Response
  • Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis
  • Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar
  • Strong experience with Microsoft security tooling, ideally Sentinel and Defender
  • Proficiency in KQL and working knowledge of Python for automation and enrichment
  • Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.)
  • Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats
  • Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams
Job Responsibility
Job Responsibility
  • Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns
  • Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks
  • Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI)
  • Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams
  • Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts
  • Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives
  • Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value
  • Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks
  • Fulltime
Read More
Arrow Right

TPRM Specialist

A highly motivated and hands-on professional to join the Supply Chain Security (...
Location
Location
Netherlands , Amsterdam
Salary
Salary:
Not provided
levy-professionals.com Logo
Levy Professionals
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Knowledge and experience with setting up projects & deliverables within supply chain security / Third-Party Risk Management (TPRM)
  • Proven experience in executing information security risk assessments
  • Knowledgeable on one or more areas such as security processes, technology architectures, network security, application security, and vulnerability management
  • Experience with the ServiceNow TPRM module is a significant advantage
  • HBO or University degree
  • Excellent stakeholder management skills
  • A strong ability to translate technical risks into business risks and vice versa
  • Hands-on, self-organised, willing to finish and deliver (execution power)
  • Service-oriented professional who enjoys taking on an internal consultancy role
  • The working language within the team is English
Job Responsibility
Job Responsibility
  • Govern and manage IT vendor relationships concerning performance on the security aspects of underlying contractual obligations
  • Execute Vendor Security Risk Assessments and perform necessary follow-up actions, focusing on material risks
  • Ensure that information security risks are identified and managed effectively throughout all stages of the relationship with external vendors
  • Review the applicability and quality level of assurance reports issued by third parties
  • Manage the IT security-related part of vendor contracts, working closely with 2nd line functions such as legal, compliance, and procurement on contractual changes
  • Actively stay up-to-date with emerging cyber security trends, risk, and threat developments, and share this knowledge to help integrate them into the assessment program
  • Help solve security-related questions, take initiative, and escalate in time if needed
  • Signal improvements related to the way of working inside the team and contribute to improving the excellence of the service offering
  • Work according to the DevOps & Agile methodology, improving Supply Chain Security services based on user stories
  • Occasionally investigate and resolve incidents as they occur
Read More
Arrow Right
New

Cyber Security Operations Specialist

A Cyber Security Operations Specialist is a professional responsible for protect...
Location
Location
Congo, the Democratic Republic of the , Kinshasa
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 3-5 years of experience in Security Operations and Threat hunting
  • Bachelor's degree in computer science, information technology, cyber security, or a related field
  • Proficiency in security tools (e.g., SIEM, IDS/IPS, firewalls)
  • Knowledge of networking protocols and architecture
  • Familiarity with operating systems (Windows, Linux) and cloud environments
  • Strong analytical and problem-solving abilities to assess risks and respond effectively to incidents
  • Excellent analytical and problem-solving skills
  • Strong communication skills to effectively convey technical information to non-technical stakeholders. [French and English]
  • Ability to work independently and as part of a team in a fast-paced environment
  • A keen eye for detail to detect anomalies in data and logs
Job Responsibility
Job Responsibility
  • Continuously monitor security systems and networks for unusual activity or potential threats
  • Analyse security alerts and logs to identify and respond to incidents
  • Investigate security incidents and breaches to determine their cause and impact
  • Coordinate the response to security incidents, including containment, eradication, and recovery
  • Maintain a concise, audit-ready Incident Response Plan that defines severity matrix, escalation paths, decision authority, evidence handling, and communications (internal, executive, legal, regulator)
  • Own a version-controlled repository of actionable playbooks (phishing, business email compromise, ransomware, webshell, data exfiltration, insider risk, credential theft, cloud token abuse)
  • Ensure that logs from servers, cloud apps, domain controllers, proxies, domain controllers, email and smtp gateways, PUAM, firewalls are collected, easy to read, time-synchronized, and stored securely
  • Build and maintain smart alert rules that spot real attacks (based on MITRE ATT&CK) and reduce noisy false alarms
  • Create dashboards and weekly reports that show what we’re seeing and how fast we respond
  • Stay updated on the latest cyber threats, vulnerabilities, and attack vectors
Read More
Arrow Right