Managed Security Services Provider | Brisbane, QLD | Hybrid
Full-Time | Hybrid (Brisbane-based)
Laminar Communications
SOC / Senior Security Analyst
About the Opportunity
Laminar Communications is a Brisbane‐based Managed Security Services Provider (MSSP) delivering enterprise‐grade cybersecurity, data centre management, and network deployment services to a diverse and growing client portfolio across Queensland and beyond. Our integrated capability means our clients get end‐to‐end support — from secure network infrastructure through to 24/7 threat monitoring and response.
Are you a driven cybersecurity professional ready for your next challenge? Do you live and breathe security, love getting your hands dirty with networks just as much as threat hunting, and thrive when you are in front of a client? If so, this could be the role you have been waiting for.
As we scale our security operations capability, we are looking for an experienced SOC Team Lead with a genuine passion for cybersecurity and the drive to make a real impact — not just for our team, but for the clients who depend on us every day.
This is more than a monitoring role. You will own the SOC function, lead a team of analysts, leverage advanced SIEM, SOAR, and AI‐driven automation tooling, engage directly with clients as a trusted security advisor, and play an active role in shaping and growing our managed security services.
What You'll Be Doing
Technical Network Deployment
* Design, deploy, and configure client network infrastructure — including routers, switches, firewalls, VLANs, and SD‐WAN solutions
* Develop and implement secure network architectures aligned to client requirements and Australian security frameworks
* Conduct site assessments, network audits, and capacity planning to support new and existing client deployments
* Collaborate with the SOC team to ensure security visibility is built into every network deployment from day one
* Produce clear network documentation, as‐built diagrams, and handover materials for clients and internal teams
SOC Operations & Team Contribution
* Contribute to SOC operations as a senior technical resource — supporting Tier 2/3 triage, escalations, and complex investigations
* Drive continuous improvement of detection rules, playbooks, and response procedures across our SIEM and SOAR platforms
* Champion the adoption of AI‐driven automation to enhance threat detection, reduce analyst fatigue, and accelerate incident response
* Report on SOC KPIs, SLA performance, and threat trends to senior leadership
Client Engagement & Advisory
* Serve as the primary security point of contact for a portfolio of managed clients
* Lead regular client meetings to present security posture updates, threat intelligence, and incident findings
* Consult with clients on security strategy, SIEM tuning, and risk mitigation approaches
* Identify opportunities to expand client engagement through additional managed services and security offerings
* Translate complex technical findings into clear, business‐relevant insights for non‐technical stakeholders
Technical Operations
* Administer and optimise enterprise SIEM and SOAR platforms — including log source onboarding, detection rule creation, automated playbook development, and dashboard reporting
* Drive AI automation initiatives within the SOC — including ML‐assisted alerting, automated triage workflows, and AI‐enhanced threat intelligence correlation
* Lead threat hunting activities and proactive security investigations
* Oversee incident response engagements from detection through to remediation and post‐incident review
* Collaborate with our data centre and network teams to ensure security controls are embedded across infrastructure deployments
* Provide security oversight and input during network deployment projects — including firewall policy design, segmentation, and secure configuration reviews
* Support data centre security assessments — physical and logical access controls, environmental monitoring integration, and compliance checks
* Maintain accurate documentation of incidents, client environments, and operational runbooks
What We're Looking For
Experience & Skills
* 5+ years in cybersecurity operations, with at least 2 years in a senior SOC analyst or team lead capacity
* Hands‐on experience in an MSSP or multi‐client SOC environment — essential
* Deep technical expertise with enterprise SIEM platforms (e.g. Fortinet FortiSIEM, Splunk, Microsoft Sentinel, Rapid 7, FortiSIEM) and SOAR tooling
* Demonstrated experience with AI and automation in a SOC context — including ML‐driven alerting, automated response playbooks, and AI‐assisted threat intelligence
* Hands‐on experience deploying and managing networks — routing, switching, VLANs, firewall policy design, and secure network architecture; you are as comfortable in a rack as you are in a SOC
* Working knowledge of data centre environments — including physical/logical security controls, virtualisation platforms, and compliance requirements
* Strong understanding of the threat landscape, attack frameworks (MITRE ATT&CK), and incident response lifecycle
* Proven ability to engage confidently with clients — presenting, advising, and building trust at the technical and executive level
* Experience identifying client needs and articulating value in managed security services (pre‐sales or upsell exposure highly regarded)
* Familiarity with Australian cybersecurity frameworks: Essential Eight, ISM (Information Security Manual), NIST CSF, ISO 27001
* Strong written and verbal communication skills — you can write a crisp executive summary and deliver it in a client meeting
Certifications (Required or Actively Pursuing)
* CISSP — Certified Information Systems Security Professional
* Cisco Certified Cybersecurity Professional
* Rapid7 InsightIDR Certified Specialist
* Fortinet NSE 4, 5, or 7 (FortiSIEM specialisation highly regarded)
* CEH — Certified Ethical Hacker
Other relevant certifications such as CompTIA CySA+, GCIA, GCIH, or SC‐200 will also be viewed favourably.
We Invest in You
Are you looking for an employer who is genuinely committed to your growth? One who does not just talk about professional development but actually puts their money where their mouth is?
At Laminar Communications, we believe that when our people grow, our business grows. That is why we have built a culture where professional development is not a perk — it is part of how we operate. We actively encourage our team to pursue vendor certifications and industry qualifications, and we back that up with real support:
* We give you dedicated study leave so you can prepare without sacrificing your personal time
* We recognise and celebrate your achievements when you reach new levels of expertise — because your growth matters to us and to your clients
* We work with you to build a certification pathway that aligns with your role, your ambitions, and the strategic direction of the business
* We support a range of vendor and industry certifications including Fortinet NSE, CISSP, CEH, CompTIA, and more
If you have been held back in previous roles — watching certifications lapse because your employer would not invest — this is your opportunity to work somewhere that genuinely values your expertise and gives you the platform to keep building it.
What We Offer
* A genuine leadership role with real influence over SOC operations, tooling, and culture
* Direct access to a varied client portfolio — you will work with some of Queensland's leading businesses
* Certification sponsorship and study support — we invest in your ongoing professional development
* Flexible hybrid working arrangement (Brisbane-based), with a fair on‐call roster structure
* A collaborative, learning‐focused team culture that values initiative, curiosity, and continuous improvement
* Hands‐on exposure to cutting‐edge SIEM, SOAR, and AI automation tooling — and the mandate to push them further
* Real variety — from SOC operations and client advisory to network deployment and data centre security
Our Culture & Values
Laminar Communications runs on EOS — the Entrepreneurial Operating System. That means we are a disciplined, focused, and transparent organisation where everyone understands the vision, owns their role, and is empowered to make decisions. If you thrive in a structured, high‐accountability environment where great ideas are heard and acted on, you will feel right at home.
Our four core values are not just words on a wall — they are how we hire, how we operate, and how we grow. We are looking for someone who sees themselves in all four:
Passion
We are enthusiastic and driven to create the best outcome. You bring energy to everything — whether you are leading an incident response, presenting to a client, or mentoring a junior analyst.
Knowledge
We continually evolve our skills, capability, and intellect by embracing change. The threat landscape never stands still — and neither do you. You chase certifications, stay across emerging tooling, and bring what you learn back to the team.
Trust
We are empathetic and care about what we are being asked to do, always. Our clients trust us with their most critical systems — and they trust us because we take that responsibility seriously. You communicate with honesty, follow through on commitments, and genuinely care about outcomes.
Brave
We are up for the challenge and confront the unknown. You do not shy away from a complex problem, an uncomfortable client conversation, or an unfamiliar technology. You lean in, back yourself, and bring the team with you.
How to Apply
Submit your resume and a brief cover letter outlining your MSSP/SOC experience and client engagement approach. Applications without relevant MSSP or multi‐client SOC experience will not be considered.
Applicants must be based in Brisbane or willing to relocate. Must be an Australian Citizen — this is a mandatory requirement and applications from non‐citizens will not be considered.
#J-18808-Ljbffr