SOC 2 ContractThrough 2026Supporting APAC Time zonesResponsible for investigating security incidents and determining their root causes. They review incidents that have been escalated by Tier 1 analysts, who are responsible for collecting data and reviewing alerts. Tier 2/3 analysts use threat intelligence, such as indicators of compromise , TTPs, and company host system/network data sets to assess the alerts, threats and potential incidents in more depth.They have deep experience with SIEM tools specifically Crowdstrike SIEM, network data, host data, Identity and Access log data, developing SIEM use cases, reducing/tuning false alerts and leading investigations until issues have been resolved. They will also monitor systems and events across different operating systems, such as Windows, macOS, and Linux.Must be proactive, problem solver and curious.Must have 5+ years recent experience as Tier 2 or 3 analyst at a large organization; government and Critical Infrastructure company preferred.Must have strong, demonstrated SIEM and data correlation experienceMust have demonstrated experience designing new SOC use cases and working with vendor on implementing new use cases.Must have experience designing and implementing runbooks and use cases to mitigate security incidentsExperience designing Incident Response plan, including alert definition, runbooks, escalation, etc..Must have extensive experience reviewing and managing alerts in Microsoft Defender, Splunk and or CrowdstrikeMust have experience conducting hunts across disparate data sets, to include host data, vulnerability data, threat data, network data, active directory data, among others to identify threatsExperience leading timely security operations response efforts in collaboration with stakeholdersExperience documenting incident response communications for technical and management audiencesMust have experience setting up alert rules and effective alert managementDemonstrated ability to create runbooks and conducting investigations with key application, IT Infra and other stakeholdersExperience designing custom SOC SIEM use cases in Defender, Splunk and CRWDExperience conducting forensic work investigationsMost be a problem solverMust be curiousMust be analytical, qualitative and quantitative abilitiesMust be adaptive to dynamic environmentStrong security operations documentation abilities Location Sydney, New South Wales (Remote) Department Professional Services Employment Type Contractor Minimum Experience Experienced
Job Title
SOC 2 Analyst