Job Description
<div class="content-intro"><p>Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century’s most innovative companies to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril’s family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years.</p></div><p>Anduril's Detection and Response team is looking for a Security Operations Analyst to be the watchtower for Anduril's critical defence technologies. As a SecOps analyst on the detection and response team, you'll be responsible for monitoring and responding to adversarial activity while helping incorporate key detection feedback loops with the detection engineering team. When not responding to threats, you'll be asking questions of our data sets, conducting threat hunting and data normalisation operations across the organization to understand user behavior and identify anomalies. </p>
<h3>WHAT YOU'LL DO</h3>
<ul>
<li>Triage and respond to alerts / incidents covering multiple disciplines including, but not limited to, phishing, endpoints, cloud infrastructure and services, and SaaS applications</li>
<li>Build and optimise tailored detection signatures, response playbooks, and response automation using detection-as-code principles</li>
<li>As the frontline of DNR, you will lead the feedback loop for detections, ensuring alerts are fine tuned to reduce false positives</li>
<li>Participate in threat modeling scenarios with cross-functional partners to understand weaknesses across Cloud, Mobile, Endpoints, and other environments incorporating findings into security controls and/or detection signatures</li>
<li>Organise and conduct threat hunting and data baselines to identify anomalous patterns in data</li>
<li>Participate in an on-call rotation responding to security events and conducting incident response investigations while effectively communicating findings to key stakeholders</li>
<li>Proactively collaborate with a wide range of stakeholders</li>
</ul>
<h3>REQUIRED QUALIFICATIONS</h3>
<ul>
<li>Experience in security monitoring, log analysis, and detection engineering within large data sets across endpoint, network, and a wide variety of application log sources</li>
<li>Experience in Python development, specifically contributing to a shared codebase used for automating SOC operations</li>
<li>Must have experience with one or more SIEM languages (SPL, KQL, SQL)</li>
<li>Broad range of practical security knowledge across the spectrum of endpoint, network, identity, application, and cloud infrastructure</li>
<li>Knowledge of attacker tactics, techniques, and procedures (TTPs) across Windows, Linux, MacOS, AWS/Azure, etc.</li>
<li>Strong communication skills and experience collaborating with internal and external stakeholders</li>
<li>Eligible to obtain and maintain an Australian NV2 clearance</li>
</ul>
<h3>PREFERRED QUALIFICATIONS</h3>
<ul>
<li>Experience conducting incident response in the Cloud (AWS, Azure, GCP)</li>
<li>Digital Forensics and/or reverse engineering experience is a plus!</li>
</ul>
<p><br>Although we list out what we generally look for, we are very likely missing other attributes and skills that you have that could make you a great fit, but are not currently listed. Research has shown this especially applies to women and other marginalised groups, who tend to apply if they check 100% of every box, versus men who apply if they hit roughly 60%. The point we’re getting at, it doesn’t hurt to take a chance and apply!</p><div class="content-conclusion"><p><span data ... (truncated, view full listing at source)