Consultant - Security Operations Analyst - Level 1 - Technology Consulting

Melbourne, VIC, AU, 3000

Applications have closed

EY

EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.

View company page

 

 

 

If we inspire you to do the work you love, will you still call it work? 

 

At EY we believe that whoever you are, your uniqueness helps us stand apart. 

 

We bring together extraordinary people, like you, to build a better working world.

 

What’s in it for you? 

 

As a Level 1 Security Analyst, you will play a vital role in keeping proprietary and sensitive information secure by monitoring customer’s computer networks and systems to identify threats and security breaches. Level 1 Security Analysts are expected to uphold quality standards within the SOC, contribute to continuous improvement tasks within the SOC, stay up-to-date on the latest threat intelligence and methodologies.

 

Key Responsibilities

 

  • Monitor and respond to security alarms\alerts\incidents from the various SOC entry channels (Security tools, Tickets, Email and Phone)
  • Deliver SOC services inline with operational procedures, quality standards and customer SLA’s to ensure targets are met or overachieved
  • Follow ITIL practices regarding service request, incident, problem and change management
  • Work assigned shifts and provide on-call coverage as per the 24x7 SOC roster
  • Recommend enhancements to SOC service delivery framework

 

What we’re looking for

 

Here is our ‘wish list’ but don’t worry if you don’t tick all the boxes. We’re interested in your passion, strengths, what you want to learn, and how far you want to go. 

 

  • Baseline Clearance or ability to obtain relevant security clearances
  • 1-2 years of experience as a Security Analyst within SOC
  • Experienced in security operations environment
  • Experience with SIEM and EDR tooling (SOAR experience would be highly beneficial) 
  • Ability to work with autonomy, research what's unknown & find solutions
  • Experience in customer build documents, security procedures and processes in accordance with SOC service delivery framework 
  • Experience working with customer SLA's and delivering targets

 

What we can offer you

 

Acknowledgement of Country

 

EY acknowledges the Traditional Owners and Custodians of the lands on which EY offices are located around Australia. We pay our respects to their cultures, and to their Elders — past, present, and emerging. Find out more about our vision for reconciliation at www.ey.com/au/reconciliation

 

Apply now… we’re over 9,000 perspectives in Australia and we’re ready to welcome yours. 


At EY we take inclusivity seriously, and we’re committed to removing barriers and improving the employment prospects of people with disability or long-term health conditions. We encourage you to share any support and adjustments you need to be your best and participate equitably in our recruitment process. We understand sharing your needs with us can be daunting, so if you have questions before or during your application, we welcome you to get in touch at contactrecruitment@au.ey.com or +61 3 8650 7788 (option 2). Anything you tell us will be kept completely confidential.

 

The exceptional EY experience. It’s yours to build.

 

 

 

EY | Building a better working world 

 

Our preferred applicant will be required to undertake employment screening by EY or our external third-party provider.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Clearance EDR ITIL Monitoring SIEM SOAR SOC Threat intelligence

Perks/benefits: Health care

Regions: Asia/Pacific Europe
Country: Australia
Job stats:  10  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.