Senior Soc Specialist

Details of the offer

Add expected salary to your profile for insightsCalling the Threat Hunters, Incident Responders, and Detection Specialists….
If you're passionate about both hunting and responding with experience in both (or very strong experience in one), we would love to chat with you.Part of the role is an L3 Incident Response escalation role and requires experience at this level.You will need to be based in Australia with PR or Citizenship.This is a chance to work in an advanced SOC environment with a highly skilled team offering continuous training, new technologies, and new challenges on a daily basis.Our client is a highly regarded global business, winning multiple awards and continuing to grow their Australian offering.
They offer full flexibility when it comes to working remotely if you need to.
The chance to work across a range of environments and on a range of projects will mean you need to be adaptable and able to handle fast-paced situations, at times.The role is paying up to $190k (Base + Super) with various other benefits.
You can be based anywhere in Australia, with a preference for Sydney or Melbourne.The Role:As a Senior SOC Specialist, you'll act as a key escalation point for complex security incidents and step in as a lead for other team members when needed.
You will be driving threat hunting activities with clients in certain industries.
At times, you will be uplifting environments to improve process or capability and working on a continuous improvement model.Key Responsibilities:Lead proactive threat hunting activities, developing hypotheses and executing hunts to detect unknown threats.Manage and respond to security incidents when escalated and report findings.Develop and enhance detection content mapped to frameworks like MITRE ATT&CK.Analyze data from SIEM platforms (e.g., Splunk, Elasticsearch, Azure Sentinel) to identify anomalies and improve detection coverage.Provide mentorship and guidance to security analysts, driving continuous improvement in operational processes and capabilities.Key Experience and Skills:Experience in Managed Security Services, or complex Security Operations Centres is preferred.Hands-on exposure to SOC operations, threat hunting, or incident response.Strong understanding of Endpoint Detection and Response (EDR) tools like CrowdStrike or Microsoft Defender for Endpoint.Proficiency in SIEM tools (e.g., Splunk, Elasticsearch, Azure Sentinel) and network traffic analysis using tools like Wireshark.Solid knowledge of cyber-attack tactics, techniques, and procedures (TTPs) and detection use case development aligned with MITRE ATT&CK.Bonus: Experience with scripting languages (Python, PowerShell, Bash) and industry certifications.For more information or to arrange a confidential chat to find out more, contact ******.
#J-18808-Ljbffr


Nominal Salary: To be agreed

Requirements

Ai Software Engineer Team Lead (Typescript/Node/React/Aws)

The Squiz product team is working to deliver a cloud-based Digital Experience Platform (DXP) with several core capabilities including Content Management, Opt...


Apply.Workable.Com - Ats - New South Wales

Published 5 days ago

Sulzer | Lead Technical Field Advisor

Pokolbin, Newcastle, Maitland & Hunter NSW Full time At Sulzer, we don't just maintain equipment - we revolutionize it. As a leader in fluid engineering, we ...


Buscojobs - New South Wales

Published 5 days ago

Ptp | Devops Engineer - Sydney

PTP is a fast-growing system integrator that offers strategic Customer Experience (CX) solutions to our clients. We are looking for a DevOps Engineer to help...


Tideri Jobbörse - New South Wales

Published 5 days ago

Petsapp | Blockchain Developer

Seeking a freelance blockchain developer in NSW/Australia for Checkmate Live, our innovative chess platform that bridges web2 and web3. We currently utilize ...


Tideri Jobbörse - New South Wales

Published 5 days ago

Built at: 2025-01-10T20:57:41.030Z