Level 1 Security Analyst

Melbourne, Victoria, Australia

Triskele Labs

At Triskele Labs, we work with you to understand your risks, goals, challenges and culture to develop Cyber Security solutions tailored to your business.

View all jobs at Triskele Labs

Apply now Apply later

The Level 1 SOC Analyst is responsible for ongoing monitoring and triaging of Triskele Labs Security Operations Centre (SOC) clients on a 24x7x365 basis. This includes monitoring of SIEM technologies, Vulnerability Management and Threat Intelligence Management to identify and report on potential threats within a client network.

In addition to raising threats as tickets for clients, you will also be responsible for assisting with monthly reporting, procedure and workflow development. The Level 1 SOC Analyst is the frontline of the SOC and responsible for catching the bad guys before they can compromise a client network.

A day in the life of a Level 1 SOC Analyst includes:

  • Monitor client networks for security issues 24x7 on a rotating roster.
  • Investigate security threats, breaches, and incidents.
  • Use SIEM, SOAR, and Vulnerability Management platforms to protect systems.
  • Act as the first point of contact via the 1300 number through the central Service Desk.
  • Raise critical/high alerts with clients following escalation procedures.
  • Install security measures per Change Management procedures to address confirmed threats.
  • Document and assess security breaches and their impact.
  • Prepare monthly service and management reports as needed.
  • Review and update client software configurations for DefenceShield services.
  • Test and verify software tools to ensure proper functionality within client environments.
  • Stay updated on IT security trends and standards.
  • Help develop company-wide IT security best practices.
  • Research and recommend security enhancements to management.

Triskele Labs are an equal opportunity employer and this position is open to all genders, nationalities and races.

You will be required to participate in the 24x7x365 roster.

Requirements

As you will be the front line of the SOC, you will be required to have excellent soft skills and the ability to work collaboratively with clients. You will hold an Advanced Certification in Cybersecurity and have exceptional knowledge of cybersecurity practices, especially Security Operations.

You will continually be learning cybersecurity and on the forefront of threats and what is happening in the industry. Importantly, you will be required to:

  • Stay aware of all assigned tasks and their time/cost expectations.
  • Adhere to company standards, guidelines, procedures, and policies.
  • Use approved Triskele Labs templates and style guides for deliverables.
  • Inform the Security Operations Manager immediately of any issues or delays with work assignments and suggest solutions.
  • Report any factors affecting personal effectiveness to the Security Operations Manager.
  • Ensure documentation is stored in the appropriate Document Management System.
  • Record time daily in the Time Recording System.
  • Conduct shift handover meetings with the outgoing Security Analyst and update the Shift Handover document.
  • Attend team meetings as requested by the Security Operations Manager.
  • Perform other tasks as directed by the Security Operations Manager.

It is important to note you will be required to complete your CompTIA CySA+ certification within your first 3 months and your Security Blue Team Blue Team Level 1 Certification (Standard) within your first 4 months. In addition, you will be required to conduct at least one (1) Blue Team Online Lab per month.

Benefits

Triskele Labs have worked since October 2014 to build an inclusive team culture. We believe in information sharing and ensuring all team members feel part of the team, including those on shift. We look after our team not just through salaries, but also ongoing training. Outside of salaries paid, Triskele Labs provide the following for all Level 1 SOC Analysts:

  • Blue Team Labs Online Account
  • CySA+ Training and Exam
  • Security Blue Team Blue Team Level 1 Certification (Standard) Course and Exam
  • 5 weeks annual leave per year
  • Day of Birthday Leave
  • Day of Doona Day Leave
  • Access to our Employee Assistance Program
  • Social Activities

In addition, there will be opportunities for appropriately skilled analysts to move through the ranks as our team continues to grow. We believe in promoting from within.


Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  4  3  0
Category: Analyst Jobs

Tags: Blue team CompTIA Monitoring SIEM SOAR SOC Threat intelligence Vulnerability management

Perks/benefits: Career development

Region: Asia/Pacific
Country: Australia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.