BAE Systems Digital Intelligence

SOC Analyst – Shift Lead

BAE Systems Digital Intelligence

full-time

Posted on:

Location Type: Office

Location: CanberraAustralia

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Ensure shift handover brief is delivered
  • Monitor, triage, analyze and investigate alerts
  • Categorize suspected incidents
  • Write high quality security incident tickets
  • Support major incident response activities
  • Produce security incident review reports
  • Understand threat intelligence in an operational environment
  • Work with other teams to improve services

Requirements

  • Strong understanding of security operations
  • Detection engineering skills
  • Basic Python and/or scripting skills
  • Experience using Splunk and Sentinel
  • Experience with AWS and Azure security tooling
  • Strong understanding of security architecture
  • Detailed understanding of threat intelligence and threat actors
  • Experience investigating complex network intrusions
  • Understanding of AWS &/or Azure cloud services
  • Hold suitable SAN certifications, such as GCFA, GCFE, GCFR
Benefits
  • Health insurance
  • Bonuses
  • Professional development opportunities
  • Coaching mindset
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
detection engineeringPythonscriptingsecurity operationssecurity architectureincident investigationnetwork intrusion investigationthreat intelligenceAWS security toolingAzure security tooling
Soft Skills
communicationcollaborationanalytical thinkingproblem-solving
Certifications
GCFAGCFEGCFR