✦ Luna Orbit — Cybersecurity

SOC Analyst (24/7 Support)

at DXC Technology

📍 2 Locations Unknown Posted March 29, 2026
Type Full-Time
Experience mid
Exp. Years 5+ years
Education Not specified
Category Cybersecurity

DXC Technology seeks a SOC Analyst to strengthen cybersecurity operations and enhance threat detection and response capabilities across complex environments. You will monitor, detect, and respond to cyber threats, develop detection logic, and support threat hunting and incident reviews.

  • Monitor, detect, and respond to cyber threats across enterprise environments
  • Develop and implement detection logic and automated response playbooks within SIEM and SOAR platforms
  • Conduct proactive threat hunting and analysis
  • Design and execute threat models
  • Collaborate with internal teams and clients to address security incidents and improve resilience

Responsibilities include 24x7 monitoring, implementing detection logic within SIEM and SOAR, conducting threat hunting, and applying NIST, MITRE ATT&CK, and Kill Chain frameworks; experience with AWS/Azure/M365 is required.

The ideal candidate is a SOC analyst with 5+ years of experience in threat detection, incident response, and threat hunting across AWS, Azure, and M365, with strong scripting and collaboration skills and a baseline Australian security clearance.

5+ years' experience in a Security Operations Center (SOC) or Cyber Defense roleStrong background in threat detectionincident responseand threat huntingProficient in SIEM and SOAR technologies (any major platform)Hands-on experience across AWSAzureand M365 environmentsKnowledge of frameworks such as NISTMITRE ATT&CKand Lockheed Martin Cyber Kill Chain
Experience with penetration testing or red team activitiesAustralian Federal Government Security Clearance (Baseline) preferred
SIEMSOARAWSAzureMicrosoft 365
5+ years in a SOC or Cyber Defense role; threat detection; incident response; threat hunting; SIEM; SOAR; endpoint detection; network monitoring; cloud security tools; AWS; Azure; M365; NIST; MITRE ATT&CK; Kill Chain
SOCthreat detectionincident responsethreat huntingSIEMSOARendpoint detectionnetwork monitoringcloud security toolsAWSAzureM365NISTMITRE ATT&CKLockheed Martin Cyber Kill Chain
communicationcollaborationproblem-solvinganalytical thinking
Industry Technology
Job Function Strengthen client cybersecurity operations through threat detection, incident response, and threat hunting across cloud and on-prem environments
Role Subtype Security Analyst
Tech Domains Cybersecurity
soc analystsecurity operations centerthreat detectionincident responsethreat huntingsiemsoarawsazurem365nistmitre attackkill chain24x7 monitoringpenetration testingred teamsecurity clearanceaustralianbaseline

Must have 5+ years SOC/Cyber Defense experience, Ability to obtain or hold Australian Baseline clearance, Experience with SIEM/SOAR and cloud security tools

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile