Apply

Senior Security Operations Center Analyst - Australia

Posted about 2 months agoViewed

View full description

💎 Seniority level: Senior, 4+ years

📍 Location: Australia

💸 Salary: 165000.0 - 185000.0 AUD per year

🔍 Industry: Cybersecurity

🗣️ Languages: English

⏳ Experience: 4+ years

🪄 Skills: CybersecurityLinuxScripting

Requirements:
  • 4+ years of experience in SOC, Incident Response, Managed Detection and Response, or Digital Forensics.
  • In-depth knowledge of Windows OS attack surfaces, malware analysis techniques, and threat actor tools.
  • Understanding of system administration skills and their abuse by threat actors.
  • Familiarity with MITRE ATT&CK tactics and techniques.
  • Strong communication skills for conveying complex technical findings.
  • Demonstrated self-motivated learning or a relevant academic background.
Responsibilities:
  • Investigate, respond to, and remediate alerts generated by the Huntress platform.
  • Utilize forensic artifacts and telemetry to uncover threat actor activity and develop remediation plans.
  • Perform malware analysis to extract indicators of compromise.
  • Contribute to detection capabilities by crafting and tuning alerts.
  • Investigate Microsoft 365 activity and deliver remediation advice.
  • Mentor junior analysts and contribute to external content like blogs and webinars.
  • Grow skills using real-world intrusion data and training opportunities.
Apply

Related Jobs

Apply

📍 Australia

🧭 Full-Time

💸 165000.0 - 185000.0 AUD per year

🔍 Cybersecurity

🏢 Company: Huntress👥 251-500💰 $60,000,000 Series C over 1 year agoSecurityInformation TechnologyCyber SecuritySoftware

  • 4+ years of experience in a SOC, Incident Response, or Forensics role.
  • Excellent verbal and written communication skills.
  • Proven mentoring ability for junior team members.
  • Equivalent self-guided study experience or a Bachelor's degree in Information Technology, Computer Science, System Administration, or Cyber Security.
  • Understanding of Malware Analysis.
  • Experience with Windows OS and/or Mac OS.
  • Familiarity with basic Threat Actor tools and techniques.
  • Network Administration skills, including knowledge of various network protocols and security measures.
  • Understanding of web technologies.
  • Triage, investigate, and respond to alerts from the Huntress platform.
  • Perform tactical forensic timelining and analysis to identify root causes of attacks and provide remediation.
  • Conduct senior-level malware analyses during investigations.
  • Investigate suspicious Microsoft M365 activity.
  • Assist with escalations from the product support team regarding threat-related issues.
  • Engage with customers for limited SOC support interactions.
  • Contribute to detection efforts and collaborate with the team for mentorship.
  • Assist in creating external content like blogs, webinars, and presentations.

CybersecurityMac OS XScripting

Posted about 2 months ago
Apply