The New Zealand Green List

Get New Zealand residency the day you land: check out the Green List jobs with residency pathways! Immigration New Zealand created the Green List to fast-track residency pathways for certain occupations, and consists of two tiers.


View the Green List

Find out if you can move to New Zealand

We’ve created a free 2-minute appraisal form to give you an idea of your chances to get a job in New Zealand and make the move here.


Get your free appraisal

Live UK event for teachers

Our New Zealand based recruiter is flying over to join our UK team in Manchester and meet Teachers just like you on October 19! If you’re considering New Zealand, there has never been a better time and we are the trusted global experts to get you here.


Book your tickets

Register for updates

We post regular news, host events (both live and online), and keep you informed about moving to and working in New Zealand.


Sign up to our updates
Cyber Security Specialist | Jobs in New Zealand




Cyber Security Specialist

Cyber Security Specialists there has never been a better time than now to move to New Zealand, with the occupation being selected by the New Zealand Government to be eligible for the straightforward ‘Straight to Residency’ pathway on tier 1 of the Green list.   

 

As international recruitment and immigration specialists, we have been helping professionals find their home in New Zealand for 25 years, from jobs to visas and relocation we’re with you every step of the way. 

 

We are partnered with a large number of employers throughout New Zealand and as the preferred agency for overseas applicants, we will consider all applications.   

 

Once we have reviewed your application, we will advise you of next steps. 

 

Please note, that as immigration specialists, the initial contact will be with our immigration team as it’s important that we know your immigration eligibility before you apply for actual roles.

 

We are looking for people who are passionate about the Cybersecurity sector  who have a solid understanding of networks, firewalls, proxies, SIEM, Endpoint controls, DLP concepts and technologies.

 

Your day-to-day responsibilities will include:

  • Configuring and updating hardware and software
  • Establishing and managing user accounts
  • Overseeing or conducting backup and recovery tasks
  • Implementing operational and technical security controls
  • Adhering to organizational security policies and procedures.
  • Monitor and analyze various open-source and proprietary threat intelligence feeds to identify emerging cyber threats and vulnerabilities.
  • Conduct extensive research and analysis of threat actors, their TTPs (Tactics, Techniques, and Procedures), and motives.
  • Lead and coordinate incident response efforts, working closely with cross-functional teams to contain and mitigate the impact of security breaches.

Ideally, your experience to date will include:

  • You will have at least 3-5 years’ experience in a Cybersecurity related role and ideally have exposure to security technologies such as Crowdstrike, Azure, Sentinel, Check Point, Palo Alto, Fortinet etc.
  • It is vital you have a solid understanding of ITIL and experience troubleshooting and resolving application and network problems.
  • Exposure to Security Orchestration and Automation, Threat Intelligence or Threat Hunting are highly regarded.
  • Advanced understanding of tools, techniques, and procedures that modern attackers use to compromise organizations.
  • Knowledge of networks, firewalls, proxies concepts, and technologies
  • Knowledge of operating system command-line tools.
  • Knowledge of system/server diagnostic tools and fault identification techniques.
  • Knowledge of systems engineering theories, concepts, and methods.
  • Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control).
  • Knowledge of systems administration concepts.
  • Skills in Sentinel are highly desirable and preferred.
  • Knowledge of measures or indicators of system performance and availability.
  • Familiarity with common threat intelligence frameworks and standards (e.g., MITRE ATT&CK, STIX/TAXII).