Security Operations Lead at AC3
AN2, , Australia -
Full Time


Start Date

Immediate

Expiry Date

02 Dec, 25

Salary

155000.0

Posted On

02 Sep, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Splunk, Carbon Black

Industry

Information Technology/IT

Description
  • Work with advanced security tools across cloud, enterprise, and gov environments
  • Be part of a team that backs your growth, learning, and shared success
  • Take the next step in your career - no prior leadership experience required

CULTURE

People here have real relationships that go beyond work, and maintaining our awesome culture is a top priority at AC3. We believe it’s important that everyone is heard and treated with respect, whether you have the next big idea or simply a question.

We keep it real and live by the AC3 way. The 3 simple elements of the AC3 Way are:

  • Work Wise As one AC3, we put our combined skills to work to ensure we do more good, for much less. All in service of our customers and each other.
  • Work Humble As a team, we bring our authentic selves to the world of tech. It’s our down-to-earth, humble nature that makes us unique and easy to work with.
  • Work Honest We’re here to do an honest day’s work, individually and as a team. We’re constantly looking for opportunities to take the initiative and implement practical solutions.

We’d love for you to experience the AC3 way for yourself!
Every position at AC3 will require to undergo a National Police Check

Responsibilities

ABOUT THE ROLE

As part of the Cyber Security Practice, this role leads frontline defence operations within our Cyber Security Operations Centre (CSOC).
You’ll manage a team of analysts, respond to emerging threats, and drive continuous improvement across incident response, monitoring, and threat intelligence while helping shape how security services are delivered to high-profile customers.

WHAT YOU’LL DO

  • Lead a high-performing SOC team and ensure customer High Value Assets (HVAs) are protected following the most relevant best practices
  • Oversee security monitoring, incident response, threat intel and reporting
  • Act as a technical escalation point and guide cyber incident response
  • Run team meetings, manage rosters, and drive capability uplift
  • Collaborate across teams to improve tools, processes, and service delivery
Loading...