Security Operations Centre (SOC) Analyst – Level 1 Melbourne | NV1 Clearance Required I am currently working with an organisation, responsible for protecting critical digital infrastructure is expanding its Security Operations Centre in Melbourne and is seeking multiple Level 1 SOC Analysts. This environment supports high-value national systems and operates a mature security monitoring capability using leading SIEM platforms including Splunk and Microsoft Sentinel. This role is ideal for analysts early in their SOC career who want exposure to enterprise-scale detection and incident response. What you’ll be doing Monitor security alerts across Splunk and Microsoft Sentinel Perform initial triage and investigation of security events Identify potential security incidents and escalate where required Analyse logs, endpoint alerts, and network telemetry Follow SOC playbooks and response procedures Support incident response investigations Document incidents and maintain case records Must Have NV1 Security Clearance (mandatory) Experience working in a SOC environment Hands-on experience with Splunk and/or Microsoft Sentinel Understanding of security event triage and alert investigation Knowledge of MITRE ATT&CK, SIEM monitoring, and incident response basics Strong analytical and communication skills Interview Process This will be a 3 round interview process, and they are looking for candidates to join in early June. If you are interested please apply or send your updated resume to lainey.macdonald@halcyonknights.com.au