Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
SOC Analysts (Tier 1 & Senior T2/T3)
Join a global MSSP delivering real impact across enterprise security.
About the Company
I'm working with a leading MSSP, at a time of growth. They deliver end-to-end detection, response, consulting and compliance services across the region. You’ll work alongside platform engineers, threat specialists, consulting teams and incident response partners to protect enterprise customers across diverse industries.
They are expanding their Security Operations Centre and are looking for SOC Analysts at both entry-level (Tier 1) and senior (Tier 2/3) levels. If you’re driven by solving security problems, working with modern tooling, and growing fast in a high-performance environment - then this might be the right fit!
About the Role
Tier 1 - role responsibilities & requirements
- Monitoring alerts across SIEM, SOAR and XDR platforms (Splunk, Sentinel, Cortex XSIAM, etc.)
- Triage and validation of security events
- Correlating logs from firewalls, endpoints, servers and cloud services
- Escalating verified incidents with clear notes and evidence
- Supporting vulnerability monitoring and basic threat intel
- Contributing to documentation and shift handovers
Tier 2/3 - role responsibilities & requirements
- Monitoring alerts across SIEM, SOAR and XDR platforms (Splunk, Sentinel, Cortex XSIAM, etc.)
- Leading high-severity incident investigations
- Performing threat hunting aligned to MITRE ATT&CK
- Contributing to compliance reporting (MAS TRM, PCI DSS, ISO 27001)
Compensation & Benefits
- Compensation: Up to $140K + super (depending on experience/level)
- Performance Bonus: 10% of annual base
- Hybrid Work: 3 days in office, with flexibility for client visits
Apply Below
If this position is of interest to you, please click ‘Apply’ or you can just send your details to [email protected]
For other exciting opportunities and to stay up-to-date with the IT & digital space, follow Halcyon Knights on LinkedIn: www.linkedin.com/company/halcyon-knights.
Halcyon Knights is an equal opportunities employment agency. We value the contributions made by all people and welcome applications from people with disability, Aboriginal Australians, people of all ages, and people from culturally diverse backgrounds.
Key Skills
Ranked by relevanceReady to apply?
Join Halcyon Knights and take your career to the next level!
Application takes less than 5 minutes

