Melbourne | NV1 Clearance Required
I am currently working with an organisation, responsible for protecting critical digital infrastructure is expanding its Security Operations Centre in Melbourne and is seeking multiple Level 1 SOC Analysts.
This environment supports high-value national systems and operates a mature security monitoring capability using leading SIEM platforms including Splunk and Microsoft Sentinel.
This role is ideal for analysts early in their SOC career who want exposure to enterprise-scale detection and incident response.
What you’ll be doing
- Monitor security alerts across Splunk and Microsoft Sentinel
- Perform initial triage and investigation of security events
- Identify potential security incidents and escalate where required
- Analyse logs, endpoint alerts, and network telemetry
- Follow SOC playbooks and response procedures
- Support incident response investigations
- Document incidents and maintain case records
- NV1 Security Clearance (mandatory)
- Experience working in a SOC environment
- Hands-on experience with Splunk and/or Microsoft Sentinel
- Understanding of security event triage and alert investigation
- Knowledge of MITRE ATT&CK, SIEM monitoring, and incident response basics
- Strong analytical and communication skills
Interview Process
This will be a 3 round interview process, and they are looking for candidates to join in early June.
If you are interested please apply or send your updated resume to lainey.macdonald@halcyonknights.com.au

