Warning! Be wary of scams. Read our FAQ page for more information.


SOC Analyst

Contract Type

Permanent

Location

New South Wales, Sydney

Industry

IT

Specialisation

Security

Salary

AU$110000.00 - AU$120000.00 per annum + Super +Bonus

Contact Name

Harvey McIntosh

Contact Email

harvey@talenza.com.au

Date published

10-04-2026

Job Reference

BBBH20899

Description

About the Company

  • A well‑established enterprise security services provider supporting large‑scale government and private‑sector environments across Australia.
  • Operates a mature, managed Security Operations Centre (SOC) delivering 24x7 monitoring and incident response services.
  • Known for working on high‑assurance, regulated environments, offering long‑term stability and exposure to complex security operations.

About the Role

This is an opportunity for an L1 SOC Analyst to join a 24x7 managed SOC supporting a mix of government and private‑sector clients. The role is hands‑on and operational, suited to someone who enjoys frontline security monitoring, alert triage, and working in a structured SOC environment. You'll be working extensively with Splunk and Zscaler, contributing to monitoring, basic incident response, vulnerability management, and ticket handling across multiple client environments.

About You

  • Australian citizen (security clearance preferred but not essential).
  • 2-3+ years' experience working in a SOC or security operations role.
  • Hands‑on experience with Splunk and Zscaler (both are desirable for this hire).
  • Exposure to SIEM monitoring and alert triage in enterprise environments (DEVO experience is a plus).
  • Solid networking fundamentals (traffic flow, protocols, troubleshooting).
  • Previous MSP or multi‑client SOC experience highly regarded.

Role Accountabilities

  • Perform 24x7 SOC monitoring ("eyes on glass") using Splunk and other security tools.
  • Triage and investigate security alerts, escalating incidents where required.
  • Support basic incident response activities and vulnerability management tasks.
  • Manage and triage Zscaler alerts and tickets in line with defined SLAs.
  • Maintain accurate documentation and follow established SOC processes and procedures.

Benefits

  • Opportunity to work in a large, enterprise‑grade SOC supporting high‑profile government environments.
  • Exposure to multiple client environments across government and private sectors.
  • Strong foundation for career progression into L2 SOC, incident response, or SIEM‑focused roles.

Apply Now

File types: PDF, Microsoft Word or text