
SOC Analyst – Shift Lead
BAE Systems Digital Intelligence
full-time
Posted on:
Location Type: Office
Location: Canberra • Australia
Visit company websiteExplore more
Job Level
About the role
- Ensure shift handover brief is delivered
- Monitor, triage, analyze and investigate alerts
- Categorize suspected incidents
- Write high quality security incident tickets
- Support major incident response activities
- Produce security incident review reports
- Understand threat intelligence in an operational environment
- Work with other teams to improve services
Requirements
- Strong understanding of security operations
- Detection engineering skills
- Basic Python and/or scripting skills
- Experience using Splunk and Sentinel
- Experience with AWS and Azure security tooling
- Strong understanding of security architecture
- Detailed understanding of threat intelligence and threat actors
- Experience investigating complex network intrusions
- Understanding of AWS &/or Azure cloud services
- Hold suitable SAN certifications, such as GCFA, GCFE, GCFR
Benefits
- Health insurance
- Bonuses
- Professional development opportunities
- Coaching mindset
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
detection engineeringPythonscriptingsecurity operationssecurity architectureincident investigationnetwork intrusion investigationthreat intelligenceAWS security toolingAzure security tooling
Soft Skills
communicationcollaborationanalytical thinkingproblem-solving
Certifications
GCFAGCFEGCFR