Senior Security Operations Analyst

Anduril Anduril · Defense · Sydney, Australia · Corporate Technology : Information Security : Security Engineering

Anduril Industries is a defense technology company developing advanced military capabilities. The Security Operations Analyst role focuses on monitoring and responding to adversarial activity, threat hunting, and data analysis to protect critical defense technologies. This involves triaging alerts, building detection signatures, optimizing playbooks, participating in threat modeling, and conducting investigations.

What you'd actually do

  1. Triage and respond to alerts / incidents covering multiple disciplines including, but not limited to, phishing, endpoints, cloud infrastructure and services, and SaaS applications
  2. Build and optimise tailored detection signatures, response playbooks, and response automation using detection-as-code principles
  3. As the frontline of DNR, you will lead the feedback loop for detections, ensuring alerts are fine tuned to reduce false positives
  4. Participate in threat modeling scenarios with cross-functional partners to understand weaknesses across Cloud, Mobile, Endpoints, and other environments incorporating findings into security controls and/or detection signatures
  5. Organise and conduct threat hunting and data baselines to identify anomalous patterns in data

Skills

Required

  • security monitoring
  • log analysis
  • detection engineering
  • Python development
  • SIEM languages (SPL, KQL, SQL)
  • endpoint security
  • network security
  • identity security
  • application security
  • cloud infrastructure security
  • attacker tactics, techniques, and procedures (TTPs)
  • Windows
  • Linux
  • MacOS
  • AWS/Azure
  • communication skills
  • stakeholder collaboration

Nice to have

  • incident response in the Cloud (AWS, Azure, GCP)
  • Digital Forensics
  • reverse engineering

What the JD emphasized

  • Experience in security monitoring, log analysis, and detection engineering within large data sets across endpoint, network, and a wide variety of application log sources
  • Experience in Python development, specifically contributing to a shared codebase used for automating SOC operations
  • Must have experience with one or more SIEM languages (SPL, KQL, SQL)