About the job
Join NEXTDC as our Cyber Security Lead, where you will spearhead daily cybersecurity operations within our data center. Acting as the senior escalation point for security incidents across IT and OT environments, you will provide hands-on technical leadership, coordination, and mentorship to our security operations team.
Your primary responsibilities will include:
- Strategically leading the execution of cybersecurity initiatives, frameworks, and architectures to safeguard NEXTDC's operational environment.
- Developing and implementing advanced strategies for threat detection and vulnerability management using tools such as ClamAV, Junos, and EndPoint Security solutions.
- Designing and executing application security projects, which encompass vulnerability assessments, secure coding practices, and penetration testing.
- Implementing comprehensive data security strategies, ensuring measures for encryption, data loss prevention (DLP), and secure storage are effectively in place.
- Overseeing daily security operations (monitoring, triage, investigation, and response), serving as the technical escalation point for complex or high-severity incidents.
- Providing guidance to security analysts/engineers during incident handling, ensuring thorough investigation, containment, eradication, and recovery actions are documented appropriately.
- Mentoring junior security engineers/analysts, offering technical guidance and on-the-job training, and contributing to performance evaluations and development discussions.
- Acting as the technical escalation point for Cyber Security operations and related issues, including participation in after-hours support as required.
Your technical expertise will include:
- Extensive knowledge of current cybersecurity threats, vulnerability management techniques, and incident response protocols.
- Proficiency in managing cybersecurity tools including firewalls, IDS/IPS, VPNs, Zscaler, and Defender for endpoint protection, alongside policy configuration and troubleshooting.
- Strong hands-on experience with SIEM and log analysis tools (e.g., Splunk, Elastic, Microsoft Sentinel, or similar), including creating queries, correlation rules, and dashboards.
- Familiarity with vulnerability management platforms, ticketing/ITSM tools, and basic SOAR or automation playbooks for incident response.
- A solid grasp of common attack techniques, MITRE ATT&CK concepts, and incident response methodologies.
- Practical knowledge of security requirements for OT/ICS environments and associated zone/segmentation concepts.
- Exceptional troubleshooting and analytical skills, capable of leading investigations and making decisive technical decisions under pressure.
