Position Details
About this role
DXC seeks a SOC Analyst to monitor and respond to cyber threats across client environments. The role requires hands-on threat detection, incident response, threat hunting, and proficiency with SIEM/SOAR, AWS/Azure/M365, aligned with NIST and MITRE frameworks.
Key Responsibilities
- Monitor, detect, and respond to cyber threats across enterprise environments
- Develop and implement detection logic and automated response playbooks within SIEM and SOAR
- Conduct proactive threat hunting and analysis
- Design threat models to improve defenses
- Support penetration testing and red team activities as required
Technical Overview
Operations in a 24/7 SOC environment using SIEM and SOAR, with cloud security exposure across AWS, Azure, and M365. Requires knowledge of NIST, MITRE ATT&CK, and Lockheed Martin Cyber Kill Chain, plus experience in Penetration testing or red teaming.
Ideal Candidate
The ideal candidate is a SOC analyst with 5+ years in security operations, strong threat detection and incident response capabilities, hands-on experience with SIEM/SOAR, and proficiency across AWS/Azure/M365. Must hold or be eligible for Australian Baseline clearance and thrive in a public sector environment with 24/7 operations.
Must-Have Skills
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
No Australian Baseline clearance or ability to obtain, Lack of experience in SOC/ Cyber Defense, No SIEM/SOAR experience
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile