
SOC and Cyber Incident Management Analyst
DXC Technology
full-time
Posted on:
Location Type: Office
Location: Macquarie Park • 🇦🇺 Australia
Visit company websiteJob Level
Mid-LevelSenior
Tech Stack
AWSAzureCloudSplunk
About the role
- Perform monitoring, incident detection, and response for client environments
- Develop, tune, and maintain SIEM detections, dashboards, and correlation rules
- Conduct proactive threat hunting and analysis to identify suspicious behaviour
- Investigate, respond and be the escalation point for security alerts and incidents
- Support the integration and optimisation of security data sources within SIEM platforms
- Collaborate with internal teams and clients to strengthen their overall security posture
- Contribute to continuous improvement of SOC processes and automation initiatives
- Apply frameworks such as MITRE ATT&CK, NIST, and Cyber Kill Chain to guide operations
- Perform on-call out of hours escalation support
Requirements
- 3+ years’ experience in a SOC Analyst, Cyber Defence, or SIEM Engineering role
- Strong experience with SIEM tools (e.g., Splunk, Microsoft Sentinel, Sumo Logic, or similar)
- Solid understanding of incident response, threat detection, and security monitoring
- Experience with cloud environments (AWS, Azure, M365, Entra ID)
- Excellent analytical, problem-solving, and communication skills
- Knowledge of SOAR, EDR, and network monitoring tools is highly regarded
- Australian Citizenship required; eligibility for a Baseline Security Clearance preferred.
Benefits
- Competitive remuneration
- Benefits
- Training
- Career opportunities
- Inclusive environment
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
SIEMincident responsethreat detectionsecurity monitoringthreat huntingautomationMITRE ATT&CKNISTCyber Kill Chaincloud environments
Soft skills
analytical skillsproblem-solvingcommunication skills
Certifications
Baseline Security Clearance