Melbourne | NV1 Clearance Required
I am currently working with an organisation, responsible for protecting critical digital infrastructure is expanding its Security Operations Centre in Melbourne and is seeking multiple Level 2 SOC Analysts.
This environment supports high-value national systems and operates a mature security monitoring capability using leading SIEM platforms including Splunk and Microsoft Sentinel.
This role focuses on deep investigation of security incidents, advanced threat detection, and improving SOC detection capabilities.
What you’ll be doing
- Conduct in-depth investigation of security alerts and incidents
- Perform threat analysis and event correlation
- Investigate suspicious activity across Splunk and Microsoft Sentinel
- Support incident containment and remediation
- Develop and tune detection rules and queries
- Mentor L1 SOC analysts
- Support threat hunting and detection engineering initiatives
- NV1 clearance (mandatory)
- Experience working as a Level 2 SOC Analyst
- Hands-on experience with Splunk and Microsoft Sentinel
- Experience investigating complex security incidents
- Knowledge of MITRE ATT&CK and threat detection techniques
- Experience analysing logs, endpoint alerts, and network telemetry
This will be a 3 round interview process, and they are looking for candidates to join in early June.
If you are interested please apply or send your updated resume to lainey.macdonald@halcyonknights.com.au

