Senior SOC Analyst (L3) - 100% Remote (Australia)

Hamilton Barnes 🌳 β€’ Australia
Remote
Apply
AI Summary

Hamilton Barnes is seeking an experienced Senior SOC Analyst (L3) for a 12-month contract with a global semiconductor organization. This 100% remote role focuses on advanced security operations, deep technical investigations, threat hunting, and detection engineering within a highly sensitive IP-driven environment.

Key Highlights
Investigate complex security incidents escalated from Tier 1 and Tier 2.
Improve detection coverage and incident response maturity.
Conduct proactive threat hunting and lead forensic investigations.
Technical Skills Required
SIEM EDR Threat Intelligence Microsoft Defender Splunk CrowdStrike Rapid7 Windows macOS Linux
Benefits & Perks
100% Remote (Australia-based)
12-month contract (extension likely)
Work with a leading semiconductor client on cutting-edge technology
Exposure to complex, high-value security challenges

Job Description


Senior SOC Analyst (L3)

100% Remote (Australia) | 12-month contract (extension likely)


We are partnering with a global semiconductor organization to engage an experienced Senior SOC Analyst (Level 3) to support advanced security operations within a highly sensitive, IP-driven environment. This role focuses on deep technical investigations, threat hunting, and detection engineering to protect critical manufacturing and R&D systems.


This is an excellent opportunity to work in a high-impact, high-trust security environment supporting cutting-edge technology.


Role Overview

As a Senior SOC Analyst (L3), you will investigate complex security incidents escalated from Tier 1 and Tier 2 teams, leveraging SIEM, EDR, and threat intelligence to identify, contain, and remediate threats. You will also play a key role in improving detection coverage and incident response maturity.


Key Responsibilities

  • Investigate escalated security alerts to determine root cause and business impact
  • Perform advanced analysis using SIEM, EDR, and threat intelligence platforms
  • Design, build, and refine SOC detection use cases and alerting logic (Microsoft Defender, Splunk, CrowdStrike)
  • Conduct proactive threat hunting across endpoint, network, and vulnerability data
  • Lead and support forensic investigations in support of rapid incident response
  • Develop and maintain incident response plans, runbooks, and escalation procedures
  • Monitor and analyze events across Windows, macOS, and Linux systems
  • Partner with IT, engineering, and application teams to resolve incidents
  • Produce high-quality incident reports for technical teams and executive stakeholders


Skills & Experience

  • 5+ years’ experience in Tier 2 or Tier 3 SOC roles
  • Strong hands-on experience with SIEM and EDR platforms (Splunk, Microsoft Defender, Rapid7, CrowdStrike)
  • Proven experience developing SOC use cases, custom detection rules, and alerts
  • Solid background in incident response, forensic investigations, and documentation
  • Experience operating in high-security, IP-sensitive environments such as:
  • Semiconductor / advanced manufacturing
  • Critical infrastructure
  • Government or defence
  • Military or government security experience highly desirable
  • Strong communication skills with the ability to brief both technical and non-technical audiences


Eligibility Requirement

Australian Citizenship is required due to client and regulatory requirements.


Why This Opportunity?

  • Work with a leading semiconductor client on cutting-edge technology
  • 100% remote role (Australia-based)
  • Long-term contract with strong likelihood of extension
  • Exposure to complex, high-value security challenges


Apply now or contact mitchell.cole@hamilton-barnes.com to discuss this opportunity in confidence.


Subscribe our newsletter

New Things Will Always Update Regularly