SOC 2 Analyst

Posted 14 Days Ago
Be an Early Applicant
Hiring Remotely in Sydney, New South Wales
In-Office or Remote
Senior level
Security • Cybersecurity • Data Privacy
Plurilock Overview
The Role
The SOC 2 Analyst investigates security incidents, reviews threats, leads operations responses, and designs SIEM use cases while collaborating with stakeholders.
Summary Generated by Built In

SOC 2 Contract 

Through 2026

Supporting APAC Time zones

Responsible for investigating security incidents and determining their root causes. They review incidents that have been escalated by Tier 1 analysts, who are responsible for collecting data and reviewing alerts. Tier 2/3 analysts use threat intelligence, such as indicators of compromise , TTPs, and company host system/network data sets to assess the alerts, threats and potential incidents in more depth.

They have deep experience with SIEM tools specifically Crowdstrike SIEM, network data, host data, Identity and Access log data, developing SIEM use cases, reducing/tuning false alerts and leading investigations until issues have been resolved.  They will also monitor systems and events across different operating systems, such as Windows, macOS, and Linux.  

Must be proactive, problem solver and curious.

Must have 5+ years recent experience as Tier 2 or 3 analyst at a large organization; government and Critical Infrastructure company preferred.

Must have strong, demonstrated SIEM and data correlation experience

Must have demonstrated experience designing new SOC use cases and working with vendor on implementing new use cases.

Must have experience designing and implementing runbooks and use cases to mitigate security incidents

Experience designing Incident Response plan, including alert definition, runbooks, escalation, etc..

Must have extensive experience reviewing and managing alerts in Microsoft Defender, Splunk and or Crowdstrike

Must have experience conducting hunts across disparate data sets, to include host data, vulnerability data, threat data, network data, active directory data, among others to identify threats

Experience leading timely security operations response efforts in collaboration with stakeholders

Experience documenting incident response communications for technical and management audiences

Must have experience setting up alert rules and effective alert management

Demonstrated ability to create runbooks and conducting investigations with key application, IT Infra and other stakeholders

Experience designing custom SOC SIEM use cases in Defender, Splunk and CRWD

Experience conducting forensic work investigations


Most be a problem solver

Must be curious

Must be analytical, qualitative and quantitative abilities

Must be adaptive to dynamic environment

Strong security operations documentation abilities


Top Skills

Crowdstrike
Linux
macOS
Microsoft Defender
SIEM
Splunk
Windows
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Victoria, BC
200 Employees
Year Founded: 2016

What We Do

Plurilock sells cybersecurity solutions to the United States and Canadian Federal Governments and to Global 2000 companies. Through these relationships, Plurilock sells its Plurilock AI platform and its unique brand of critical services—leveraging our expertise to aid clients in defending against, detecting, and preventing costly data breaches and cyberattacks.

Similar Jobs

ServiceNow Logo ServiceNow

Customer Success Manager

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Remote or Hybrid
Sydney, New South Wales, AUS
28000 Employees

Mastercard Logo Mastercard

Director, Sales Specialist, Acceptance, Australasia

Blockchain • Fintech • Payments • Consulting • Cryptocurrency • Cybersecurity • Quantum Computing
Remote or Hybrid
Saint Leonards Creek, New South Wales, AUS
38800 Employees

Ericsson Logo Ericsson

Chief Financial Officer

Cloud • Information Technology • Internet of Things • Machine Learning • Software • Cybersecurity • Infrastructure as a Service (IaaS)
In-Office or Remote
42 Locations
89000 Employees

ServiceNow Logo ServiceNow

Director, Security & ID Solution Sales

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Remote or Hybrid
Sydney, New South Wales, AUS
28000 Employees

Similar Companies Hiring

Caliola Engineering Thumbnail
Software • Machine Learning • Hardware • Defense • Data Privacy • App development • Aerospace
Colorado Springs, CO
68 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account