Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
SOC Analyst – Cyber Security | Melbourne | Up to $95,000+ Super
Location: Melbourne (Hybrid)
About the Company
Our client is an Australian-based Managed Detection and Response (MDR) provider leading the way in advanced cyber defence.
They operate a cloud-native Security Operations Centre (SOC) leveraging cutting-edge technologies including Microsoft Sentinel, Defender XDR, and AI-driven analytics to detect and respond to cyber threats in real-time.
They pride themselves on innovation, precision, and trust — empowering clients to operate securely in an increasingly complex digital landscape.
The Role
You’ll join a high-performing Cyber Defence Team as a SOC Analyst, responsible for continuous monitoring, triage, and incident response across complex environments.
This position combines hands-on analysis with SOC engineering, process optimisation, and automation to strengthen detection and response capabilities.
Key Responsibilities
- Monitor and analyse security alerts via Microsoft Sentinel, Defender XDR, and SIEM/XSOAR platforms
- Investigate and respond to security incidents, performing root cause analysis and containment
- Develop, tune, and maintain detection rules, playbooks, and automation scripts
- Enhance SOC processes aligned with MITRE ATT&CK and NIST CSF
- Collaborate with internal teams to refine logging, monitoring, and incident response
- Contribute to threat hunting and threat intelligence initiatives
- Support client onboarding into the MDR platform
Skills & Experience
- 2+ years’ experience in a SOC or IT Security role
- Hands-on experience with Microsoft Sentinel (KQL, rule development, automation)
- Solid understanding of incident detection, response, and triage workflows
- Familiarity with EDR/XDR tools (Defender, CrowdStrike, SentinelOne)
- Knowledge of MITRE ATT&CK, Python/PowerShell scripting, and threat intelligence
- Excellent analytical and communication skills
Interested?
If you’re a passionate analyst looking for your next challenge, we’d love to hear from you. Apply now for a confidential conversation.
Key Skills
Ranked by relevanceReady to apply?
Join Kaliba and take your career to the next level!
Application takes less than 5 minutes