Launching in 2003, Tyro has grown to become Australia's largest EFTPOS provider of all ADI's outside of the big 4 banks. With almost 500 employees, $13.4 billion in transactions in 2018, we are much more than an EFTPOS provider - Tyro is an ASX listed Australian bank and operates under the supervision of the Australian Prudential Regulation Authority (APRA).
With 10 industry firsts to market, we're giving the business banking world a good shake up, with smart technology that saves Australian businesses time and money. Come and be a part of the Tyro journey.
Tyro Payments is Australia’s largest independent and fastest growing EFTPOS provider and Bank. We supply smart and simple payments solutions, deposits and loans to the SMB market. Upon our launch onto the ASX, Tyro is a going through an exciting period of growth and it’s a tremendously exciting time to become a part of the success story.
About the role We are looking for an experienced, energetic, hands-on team member to help us grow our security incident handling capabilities. As a security operations engineer you will:
· Lead and assist with security incident response across all Tyro environments. · Actively monitor systems for possible attacks and intrusions. · Conduct threat hunting exercises and search for anomalous behaviour. · Develop, automate, and orchestrate security incident alerts and processes. · Continually hone your skills with periodic drills and by participating in and sharing information in team learning sessions. · Build, maintain and continuously improve our technical controls helping us to better detect and respond to security incidents. · Continually measure the team and your outcomes to help determine and prioritise the next improvements to make. · Work five days a week during business hours. Some after hours work may be required in the instance that there is an incident.
About you We’re looking for someone who: · Possesses experience in security incident response or similar role. · UNIX/Linux, macOS or Windows system administration experience. · Has a strong foundation in system, network and infrastructure security. · Coding experience in at least one general purpose programming language (e.g. Python, C, Java). · Recognises attacker tools, tactics, and procedures within possible indicators of compromise (IOCs). · Ability to conduct host and network forensics, log analysis, and malware triage in support of incident response investigations. · Demonstrates outstanding verbal and written communication skills. · Understands that not everything is technical and that the processes and people are just as important. · Loves to both learn and share their acquired knowledge among the team. · Works well in a team but can manage their own tasks and doesn't need others to tell them what needs doing. · Leaves their ego at the door.
Desired skills · Familiar with cloud-based technologies and has had incident response experience in cloud-based ecosystems.