SR CYBER THREAT SECURITY ANALYST
Date: May 14, 2026
Location: MELBOURNE, AU
Company: Lumen Technologies
Lumen is the trusted network for AI. We’re transforming how businesses connect, secure, and scale in an AI-driven world.
By connecting people, data, and applications quickly, securely, and effortlessly, we help organizations move faster and unlock what’s next.
At Lumen, people power progress. Our culture is built on teamwork, trust, and transparency, giving you the flexibility, support, and opportunity to make a lasting impact. We’re looking for top-tier talent ready to take on the challenge. Join us in building the future.
The Role
We are seeking a skilled and experienced Threat Hunter to join our growing Security Operations team. The ideal candidate should be a proactive and resourceful individual with a passion for identifying and neutralizing advanced threats to strengthen customer defenses. This role requires a deep understanding of threat hunting methodologies, a strong analytical mindset, and exceptional communication skills. The role is expected to potentially work overtime in the event of responding to Security Incident to accommodate a global 24x7x365 Managed Threat Security Services program.
The Main Responsibilities
Threat Hunting and Analysis
- Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).
- Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.
- Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements.
- Deep technical knowledge of adversary tactics, malware analysis, intrusion detection and cloud security.
Tooling and Automation
- Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics.
- Develop custom scripts and tools to automate threat hunting processes and improve efficiency.
- Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis.
Incident Investigation
- Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.
- Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.
- Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.
Cyber Threat Intelligence (CTI)
- Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies.
- Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence.
- Share actionable intelligence with internal teams and external stakeholders.
- Present findings and recommendations to technical and executive audiences.
Continuous Improvement
- Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting.
- Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior.
- Drive maturing of the overall security operations service.
What We Look For in a Candidate
Qualifications
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- At least 3+ years of experience in cybersecurity, with a minimum of 1-2 years focused on threat hunting.
- Strong understanding of various operating systems (Windows, Linux, macOS).
- Experience with various security tools and technologies (SIEM, EDR, network monitoring tools).
- Proficiency in scripting (Python, PowerShell).
- Strong analytical and problem-solving skills.
- Excellent communication and presentation skills to translate technical findings into business impact.
Preferred
- Experience with threat intelligence platforms, feeds and CTI frameworks.
- Relevant security certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security, etc)
- Experience with cloud platforms (AWS, Azure, GCP) and containter security is a plus
Compensation
What to Expect Next
Requisition #: 342111
Background Screening
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page. Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Equal Employment Opportunities
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
Privacy Notice
Lumen is committed to protecting the privacy and security of personal information collected during the recruitment and hiring process. Our Privacy Notice explains how we collect, use, disclose, and protect applicant information, as well as how individuals may request access to or deletion of their personal data.
To review Lumen’s Privacy Notice, please visit:
https://jobs.lumen.com/global/en/privacy-notice
Disclaimer
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Job Segment:
Computer Science, Cyber Security, Linux, Technology, Security