Melbourne
I am currently working with an organisation, responsible for protecting critical digital infrastructure is expanding its Security Operations Centre in Melbourne and is seeking multiple Level 2 SOC Analysts.
This environment supports high-value national systems and operates a mature security monitoring capability using Microsoft tech stack (sentinel / defender)
This role is ideal for analysts early in their SOC career who want exposure to enterprise-scale detection and incident response.
What you’ll be doing
- Monitor security alerts across Microsoft Sentinel
- Perform initial triage and investigation of security events
- Identify potential security incidents and escalate where required
- Analyse logs, endpoint alerts, and network telemetry
- Follow SOC playbooks and response procedures
- Support incident response investigations
- Document incidents and maintain case records
- Happy with 4 day on 3 day off shift pattern
- Experience working in a SOC environment
- Hands-on experience with Microsoft sentinel and defender
- Understanding of security event triage and alert investigation
- Knowledge of MITRE ATT&CK, SIEM monitoring, and incident response basics
- Strong analytical and communication skills
#SCR-lainey-macdonald-1

