OneStep Group

Security Operations Center Analyst Level 1

Posted: just now

Job Description

Join OneStep Group as a SOC Analyst Level 1Primary Location: Perth (open to Melbourne-based applicants)Are you passionate about cybersecurity and ready to take on a challenging and rewarding role in a fast-paced Security Operations Centre (SOC)?As a Junior SOC Analyst at OneStep Group, you'll play an essential role in defending client environments by detecting threats early, supporting incident investigations, producing SOC reports, and working alongside senior analysts. You’ll gain hands-on experience with leading security technologies across multiple clients, and have the opportunity to contribute to internal improvements, participate in client meetings, and grow in a structured and collaborative SOC team.Key Responsibilities:Monitor and triage alerts across a range of security tools, not limited to SIEMs (e.g., Microsoft Sentinel, LevelBlue, FortiSIEM), but also including endpoint protection platforms, firewalls, and email gateways.Perform daily health and performance checks across different security technologies and environments.Assist with incident response, including classification, escalation, and threat containment based on defined procedures.Create and contribute to SOC reports for internal analysis and client delivery.Participate in client meetings when required to provide updates or insights under supervision.Support the ongoing development of SOC playbooks, detection rule tuning, and knowledge bases.Contribute to continuous improvement, threat intelligence sharing, and basic automation and scripting tasks to improve triage workflows, using query language such as KQL and Python.What We’re Looking For:A year of hands-on experience (through entry-level roles, or security projects).Understanding of SIEM platforms, detection and response workflows, and basic security operations.Familiarity with endpoint detection tools, firewalls, email security, and logging systems.Knowledge of Microsoft Sentinel, Defender XDR, and incident response frameworks.Strong analytical mindset with basic knowledge of KQL, Python, or similar scripting/query languages.Strong communication skills with the ability to document incidents clearly and effectively.Must have: Australian National Police Clearance and legal work rights.Highly Desirable: Australian citizenship (to support eligibility for Baseline and NV1 security clearance).Nice to Have:Certifications: SC-900, SC-200, Security+, or similar.Practical lab or CTF experience (e.g., TryHackMe, Hack the Box).Exposure to Azure Sentinel, Defender XDR, EDR, Palo Alto, or Office 365 security features.Why Join OneStep Group?Work with a mature, experienced SOC team and receive real-time mentorshipGain exposure to enterprise-grade security tools and diverse client environmentsAccess structured career development and certification pathwaysEnjoy a supportive, inclusive work culture with flexibility.If you're ready to make a real impact on cybersecurity, we want to hear from you! Apply now and take your career to the next level.For more information on the role or for a full job description, reach out to Jaynil Karkar, the SOC Team Leader @ Jaynil.Karkar@onestepgroup.com.au

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In