
SOC Analyst – Shift Lead
BAE Systems Digital Intelligence
full-time
Posted on:
Location Type: Office
Location: Canberra • Australia
Visit company websiteExplore more
Job Level
About the role
- Ensure shift handover brief is delivered
- Monitor, triage, analyze and investigate alerts
- Categorize suspected incidents
- Write high quality security incident tickets
- Support major incident response activities
- Produce security incident review reports
- Understand threat intelligence in an operational environment
- Work with other teams to improve services
Requirements
- Strong understanding of security operations
- Detection engineering skills
- Basic Python and/or scripting skills
- Experience using Splunk and Sentinel
- Experience with AWS and Azure security tooling
- Strong understanding of security architecture
- Detailed understanding of threat intelligence and threat actors
- Experience investigating complex network intrusions
- Understanding of AWS &/or Azure cloud services
- Hold suitable SAN certifications, such as GCFA, GCFE, GCFR
Benefits
- Health insurance
- Bonuses
- Professional development opportunities
- Coaching mindset
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
detection engineeringPythonscriptingsecurity operationssecurity architectureincident investigationnetwork intrusion investigationthreat intelligenceAWS security toolingAzure security tooling
Soft skills
communicationcollaborationanalytical thinkingproblem-solving
Certifications
GCFAGCFEGCFR