SOC Analyst - Level 1/2/3 (multiple positions)
Overview:
Our client is a prominent Managed Security Services Provider seeking detailed-oriented SOC Analysts at multiple levels (L1, L2, L3) to enhance their cybersecurity operations.
As a SOC Analyst, you will be responsible for monitoring security alerts, investigating incidents, and responding to threats across various customer environments. This role is critical in ensuring the timely detection and mitigation of potential security incidents.
- Australian Citizenship (Mandatory)
- $85,000 – $130,000 + Super + Bonus
- Melbourne CBD based – WFH Flexibility (2/3 split)
- Must be available for 24×7 shift environment. Some travel may be required.
Required Skills:
- For Level 1 (entry level) – $85,000 – $90,000 + Super:
- Basic understanding of network fundamentals, including TCP/IP, DNS, and firewall concepts.
- Familiarity with operating systems (Windows and Linux) and their security features.
- Experience with security monitoring tools (SIEM, SOAR, EDR/XDR) preferred.
- Strong attention to detail and ability to document incident responses thoroughly.
- Basic problem-solving skills and ability to perform triage on security alerts.
- Strong written and verbal communication skills.
- Availability to work in shifts, including nights and weekends.
- Diploma or Bachelor’s degree in Information Security, Computer Science, or a related field. (Desirable)
- For Level 2/3 (senior) – $90,000 – $130,000 + Super:
- Bachelor’s degree in Information Security, Computer Science, or equivalent work experience.
- 3-5 years of experience in a SOC or in roles related to incident response and threat hunting.
- Extensive hands-on experience with SIEM tools (e.g., Splunk, Sentinel, Cortex XSIAM).
- Ability to conduct detailed forensic investigations, including malware analysis and network traffic analysis.
- Familiarity with advanced threat detection techniques and frameworks, particularly MITRE ATT&CK.
- Proficient in developing, fine-tuning, and validating detection use cases and security alerts.
- Experience in engaging with clients during incident response and security reviews.
- Ability to mentor junior staff and support continuous improvement initiatives.
- Strong analytical skills and capability to work under pressure.
- Availability to work in shifts, including nights and weekends.
Nice to Have Skills:
- For Level 1: Certifications such as CompTIA Security+, CySA+, Microsoft SC-200, or Palo Alto are a plus.
- For Level 3: Advanced certifications (e.g., GCIA, GCIH, GCFA, GREM, CISSP) are beneficial.
- Experience with cloud security monitoring (AWS, Azure, GCP) and IoT/OT security is advantageous.
- Knowledge of compliance frameworks and regulations (e.g., PCI DSS, ISO 27001) is preferred.
Preferred Education and Experience:
Level 1: Entry-level; recent graduates or those with relevant practical experience through internships or projects.
Level 2/3: 3-5 years of relevant work experience in a security operations environment, demonstrating a proven ability in incident response.
Other Requirements:
- Willingness to participate in ongoing training and development.
- Must be able to work a flexible 24×7 schedule, including overnight shifts and holidays if required.
- Some travel may be necessary for training or team collaboration purposes.
If you meet the above qualifications and are ready to contribute to a team dedicated to securing customer environments, we invite you to apply or contact Reece.Prideaux@TalentInternational.com for further information.