Apply

Senior Security Operations Center Analyst - Australia

Posted 2024-11-20

View full description

💎 Seniority level: Senior, 4+ years

📍 Location: Australia

💸 Salary: 165000 - 185000 AUD per year

🔍 Industry: Cybersecurity

🗣️ Languages: English

⏳ Experience: 4+ years

🪄 Skills: CybersecurityMentoring

Requirements:
  • 4+ years of experience in a SOC, Incident Response, or Forensics role.
  • Excellent verbal and written communication skills.
  • Proven mentoring experience for junior team members.
  • Equivalent self-guided study experience or a Bachelor's degree in related fields.
  • Understanding of malware analysis and configuration.
  • Experience with Windows OS and/or Mac OS.
  • Familiarity with threat actor tools and techniques.
  • Experience in Windows and network administration.
Responsibilities:
  • Triage, investigate, and respond to alerts from the Huntress platform.
  • Perform tactical forensic timelining and analysis to determine root causes of attacks and provide remediation.
  • Conduct senior-level malware analysis as part of investigations.
  • Investigate suspicious Microsoft M365 activity and provide remediation.
  • Assist product support team with threat-related questions.
  • Engage with customers via video/phone to explain SOC observations.
  • Contribute to detection efforts and mentor team members.
  • Help create external content like blogs and webinars.
Apply

Related Jobs

Apply

📍 Australia

🧭 Full-Time

💸 $165,000 - $185,000 AUD base plus bonus and equity

🔍 Cyber Security

🏢 Company: Huntress👥 251-500💰 $60.0m Series C on 2023-05-16SecurityInformation TechnologyCyber SecuritySoftware

  • 4+ years experience in a SOC, Incident Response, or Forensics role.
  • Excellent verbal and written skills with the ability to explain possible complex alerts/events in a non-complex way.
  • Proven mentoring experience and skills to junior team members.
  • Demonstrated equivalent of self-guided study experience or Bachelor’s degree in Information Technology, Computer Science, System Administration, or Cyber Security.
  • Understanding of Malware Analysis including VM configuration, file format identification, and basic static & dynamic analysis.
  • Experience with Windows OS and/or Mac OS as an attack surface.
  • Experience with basic threat actor tools and techniques, including MITRE ATT&CK Framework.
  • Experience with Windows Administration or Enterprise Domain Administration.
  • Network Administration Skills, including knowledge of network protocols, OSI layers, and remote access methods.
  • Familiarity with web technologies and OWASP top 10.

  • Triage, investigate, and respond to alerts coming in from the Huntress platform.
  • Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat.
  • Perform senior-level malware analysis as part of investigating systems and identities.
  • Investigate suspicious Microsoft M365 activity and provide remediations.
  • Assist in escalations from the product support team for threat-related and SOC-relevant questions.
  • In a limited fashion, assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC.
  • Contribute to detection efforts. Helping to create or request net new detections as well as tuning detections.
  • Contribute to our collaboratively mentored team.

Cybersecurity

Posted 2024-09-20
Apply