BAE Systems Digital Intelligence

SOC Analyst – Shift Lead

BAE Systems Digital Intelligence

full-time

Posted on:

Location Type: Office

Location: CanberraAustralia

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Ensure shift handover brief is delivered
  • Monitor, triage, analyze and investigate alerts
  • Categorize suspected incidents
  • Write high quality security incident tickets
  • Support major incident response activities
  • Produce security incident review reports
  • Understand threat intelligence in an operational environment
  • Work with other teams to improve services

Requirements

  • Strong understanding of security operations
  • Detection engineering skills
  • Basic Python and/or scripting skills
  • Experience using Splunk and Sentinel
  • Experience with AWS and Azure security tooling
  • Strong understanding of security architecture
  • Detailed understanding of threat intelligence and threat actors
  • Experience investigating complex network intrusions
  • Understanding of AWS &/or Azure cloud services
  • Hold suitable SAN certifications, such as GCFA, GCFE, GCFR
Benefits
  • Health insurance
  • Bonuses
  • Professional development opportunities
  • Coaching mindset

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
detection engineeringPythonscriptingsecurity operationssecurity architectureincident investigationnetwork intrusion investigationthreat intelligenceAWS security toolingAzure security tooling
Soft skills
communicationcollaborationanalytical thinkingproblem-solving
Certifications
GCFAGCFEGCFR