This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are seeking a proactive Cyber Security SOC Analyst to join an enterprise level Security Operations Centre. In this role, you will be the first line of defense, responsible for the persistent monitoring, identification, and triaging of security threats across a diverse digital landscape including cloud environments, enterprise applications, and complex network infrastructures. You will combine technical expertise in threat detection with a disciplined approach to incident response, ensuring our security posture remains resilient against evolving cyber threats.
Job Responsibility:
Actively monitor and evaluate alerts generated by SIEM, SOAR, EDR, and cloud-native security tools to identify potential breaches
Deep-dive into suspicious activities across identities, endpoints, and networks to assess impact and urgency
Provide high-quality analysis and actionable recommendations when escalating verified threats to senior responders
Assist in the early stages of evidence collection to facilitate containment and detailed post-incident forensic analysis
Monitor application-layer events and collaborate with DevOps teams to patch vulnerabilities and fix misconfigurations
Assist in refining detection logic, tuning SIEM rules, and developing automated workflows to reduce "noise" and improve response times
Review assessment reports, validate security flaws, and monitor the progress of remediation efforts
Maintain accurate incident logs, update operational runbooks, and ensure alignment with NIST, ISM, and ASD Essential Eight frameworks
Requirements:
Proven track record in a SOC or incident triage role within large-scale enterprise or government sectors
Proficiency with major SIEM platforms (specifically Microsoft Sentinel or Splunk) and exposure to XDR/SOAR technologies
Solid grasp of the OWASP Top 10, secure development lifecycles, and common attack vectors
Ability to dissect complex logs and telemetry data to make informed decisions under pressure
Familiarity with Australian security standards, including the ISM and ASD Essential Eight
Strong interpersonal skills to bridge the gap between technical security findings and operational stakeholders
Practical experience securing Azure (preferred), AWS, or GCP environments
Exposure to SAST, DAST, or SCA testing methodologies
Industry-standard credentials such as Security+, CCNA Security, or Microsoft Cybersecurity Analyst
Hands-on experience navigating the full incident lifecycle, from initial detection through to eradication and recovery