As Senior Security Analyst (Watcher), you will play a critical role in our SOC, responsible for triaging, investigating and responding to security alerts, primarily from EDR and SIEM platforms. You will work closely with SOC Engineers, Red Team specialists and our clients to continuously improve detection capabilities and incident response outcomes.
This is a hands‑on, senior role suited to someone who thrives in fast‑paced environments, enjoys deep technical analysis, and is passionate about mentoring others and advancing SOC maturity.
We’re The Missing Link - one of Australia’s most awarded IT providers, now backed by global powerhouse Infosys. For over 28 years, we’ve helped businesses succeed with cutting-edge Cyber Security, IT & Cloud, and Automation solutions. With 200+ team members and a culture built on inclusion, innovation, and impact, we offer a workplace where you’re valued, challenged, and supported to grow.
We are THE MISSING LINK between where you are and where you want to be.
Our Security Division is one of the fastest-growing in Australia, structured into 3 specialised streams:
- Red Team – Penetration Testing & Security Consulting
- Blue Team – Security Architecture & Engineering
- SOC – Managed Detection & Response (MDR)
Key Responsibilities:
- Monitor, triage and investigate security alerts from leading MDR technologies, with a focus on EDR and SIEM platforms
- Lead and contribute to complex incident response activities, from detection through to remediation and post‑incident review
- Perform advanced log analysis, malware analysis, OSINT research and investigation of emerging and zero‑day threats
- Collaborate with SOC Engineers, Red Team and clients to develop, test and tune detection use cases through purple‑team activities
- Apply frameworks such as MITRE ATT&CK and TDIR methodologies to improve detection and response effectiveness
- Produce high‑quality incident reports and briefings for technical teams and senior stakeholders
- Mentor junior analysts and contribute to continuous improvement across SOC processes and capabilities
Requirements
- 5+ years’ experience in cyber security, with strong experience in a SOC or similar environment
- Advanced hands‑on experience with Windows, Linux, SIEM, EDR/XDR and security integrations
- Strong working knowledge of MITRE ATT&CK, threat intelligence platforms and incident response methodologies
- Deep understanding of IT security controls, networking concepts (OSI model, TCP/IP) and secure network design
- Proven experience leading complex security incidents end‑to‑end
- Exceptional analytical, problem‑solving and troubleshooting skills
- High attention to detail when analysing logs, alerts and security telemetry
- Strong written and verbal communication skills, including stakeholder and executive engagement
- Ability to mentor others and contribute positively to a collaborative SOC culture
Desirable
- Scripting and automation skills (PowerShell, Python or similar)
- Industry certifications such as CISSP, CASP+, GIAC (GCIH/GCFA) or relevant vendor certifications (Microsoft, CrowdStrike, AWS)
- Experience leading SOC initiatives or internal improvement projects
- Active involvement in the cyber security community (research, speaking, publishing, open source)
Benefits
- A structured training and development plan tailored to your experience
- Ongoing investment in industry and vendor certifications
- Opportunities to work with leading security technologies and enterprise clients
- A collaborative, high‑performing SOC environment with strong career progression
- Competitive salary package and comprehensive employee benefits
- Flexible working arrangements and a strong focus on wellbeing and culture



