Job Description

We are working with a Global Managed Security Services Provider (MSSP) which provides end to end cybersecurity services to their clients usually Fortune 500 and ASX 200 Clients. Our clients SOC is based in Melbourne and we are looking for a number of SOC Analysts Tier 1, 2 & 3 levels to work in their SOC. The SOC Operations function forms the core of service delivery led by a SOC Manager and shift leaders who coordinate a 24x7 operation. Tiered SOC Analysts (Tier 1, 2, 3) handle detection, investigation and advanced threat hunting while Incident Response is partnered with Blackpanda.
 
Various teams such as the Presales Solution Architects to scope technical solutions, Bid Managers to craft competitive proposals, Platform Engineering team to manage the SIEM/XDR/SOAR stack,  Consulting and Professional Services team to deliver specialized expertise are drawn in to support the SOC and Customer Requirements.
 
Available Positions
 
SOC Analyst Tier 1 (Entry level)
 
We are seeking a skilled Security Operations Center (SOC) Analyst to join the Managed Security Services team. The Tier 1 SOC Analyst is the first line of defense in the SOC. This role focuses on continuous monitoring, alert triage and escalation of potential security incidents across multiple customer environments. Working within a 24x7 SOC, the analyst ensures timely detection of threats and provides initial response in line with established playbooks and SLAs.
 
 
SOC Analyst Tier 2/3 (Senior)
 
We are seeking a skilled Security Operations Center (SOC) Analyst to join our Managed Security Services team. The Senior SOC Analyst is responsible for advanced incident investigation, threat hunting and customer engagement within the SOC. This role requires deep technical expertise to analyze complex attacks, lead incident response activities and enhance detection capabilities. The Senior SOC Analyst will also mentor junior analysts and contribute to service improvement initiatives.
 
Requirements

  • Must have PR or Australian Citizen
  • Looking for between 3 to 5 years of relevant experience. 
  • Ability to work in a 24x7 shift environment.

Experience 
 
For Tier 1 Role:

  • SIEM, SOAR, EDR/XDR and other monitoring tools. 
  • Correlate logs and alerts across diverse sources (firewalls, endpoints, servers, cloud, IoT/OT).
  • Perform triage of alerts to determine severity, scope and escalation path.

For Tier 2/3 Roles:

  • Lead investigations of high-severity incidents inc root cause analysis and containment strategies.
  • Perform proactive threat hunting and detection engineering aligned to MITRE ATT&CK.
  • Develop, fine-tune and validate SOC detection use cases, dashboards and automation playbooks.
  • Engage directly with customers during incident response and regular security reviews.

If you have this experience and have PR or Citizenship and based in Melbourne please APPLY and/or share a CV to [email protected]
 

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application