Contract - Cyber SOC Analyst

  • Canterbury
  • Contract/temp
  • Information Technology
  • Posted 22 days ago

Job Description

  • Engagement to the end of June 2025 (potential to extend)
  • Utilise your Incident / SOC expertise
  • MS environment - Defender / Sentinel / Azure

Our customer seeks a Senior SOC Analyst / Senior Cyber Incident Analyst to help them deal with and triage Cyber Incidents.

Ideally you will be in a "Level 2" or "Level 3" role or worked at that level before

Skill-sets and experience we seek includes:
  • Strong MS Sentinel expertise
  • Microsoft Sentinel Logic App Exposure
  • Strong MS Defender (know the whole Defender suite and have configured aspects of entire suite)
  • Azure Lighthouse knowledge (useful to have but not an absolute must have)
  • Strong knowledge of cyber security practices in a hybrid environment of on-premise, SaaS, and cloud services, preferably in an operation and/or incident management role.  
  • Strong experience with creating analytical queries, playbooks and automation rules.
  • Excellent oral & written technical communication skills 
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them 
  • Experience with both technical and operational support areas covering a broad range of security technologies, such as SIEM, firewalls, networking, system administration and scripting.  
This is an hourly rate contract initially through to the end of June 2025. For more info drop Nathan a note - nathan.masters@taska.co.nz or apply online