About the job
Join Verra Mobility, a global leader in smart mobility solutions. We are committed to transforming transportation into a safer and more efficient experience for communities worldwide. Collaborating with police departments and municipalities across North America, the Asia Pacific, and Europe, we implement cutting-edge safety technologies, including red-light and speed cameras, and manage toll transactions for over 8.5 million vehicles. Our proprietary systems facilitate nearly 165 million transactions annually for over 50 tolling authorities.
We are on the lookout for a seasoned Information Security Analyst focused on Security Operations and Risk to enhance our information security framework in Australia and support our global operations.
This role is a permanent, full-time opportunity offering a hybrid work model, allowing you to work from home and our National Head Office located in South Melbourne.
Role Overview:
This is a hands-on position ideal for a security operations professional capable of functioning autonomously as a vital security asset within the organization. You will oversee security monitoring, vulnerability management, incident response, control enhancements, and security reporting.
In addition to monitoring security operations, you will delve into security incidents, coordinate remediation efforts, streamline processes, assist with audits, and collaborate with technology, operations, and corporate teams to mitigate security risks in a regulated environment.
Your responsibilities as an Information Security Analyst at Verra Mobility include:
- Monitoring, triaging, and analyzing security alerts across SIEM, EDR, network, and cloud environments.
- Coordinating security incidents, including investigations, escalation processes, documentation, containment, and post-incident reviews.
- Managing vulnerability activities, including scanning, prioritization, remediation tracking, and reporting.
- Reviewing security controls across cloud, endpoint, network, and application environments.
- Supporting penetration testing, external assessments, and remediation planning.
- Enhancing detection, response, and reporting capabilities across security tools and processes.
