Principal SOC Analyst

Principal SOC Analyst

Contract Type:

Full Time

Location:

Sydney - New South Wales

Industry:

Technology

Contact Name:

Gary Mohan

Contact Email:

gmohan@morganconsulting.com.au

Contact Phone:

0406 162 625

Date Published:

04-Mar-2026

Principal SOC Analyst | Detection & Response Leader About the Role

We are seeking a highly technical and leadership-oriented Principal SOC Analyst to serve as the senior technical authority within our 24x7 Security Operations Center. This is not just a monitoring role; you will be the architect of our detection strategy, the lead for complex incident response, and a key mentor to our L1-L3 analysts.

If you are passionate about threat hunting, automating away the "noise," and engaging with stakeholders to translate technical threats into business insights, this is the career-defining move for you.

Key Responsibilities
  • SOC Strategy & Operations: Oversee daily operations to ensure elite-level detection, triage, and response. You will refine SOC KPIs and SLAs to drive operational excellence.
  • Advanced Threat Handling: Lead complex investigations and containment strategies. You will develop hunting hypotheses and map adversary behavior using the MITRE ATT&CK framework.
  • Continuous Improvement: Drive the optimization of detection content, SOPs, and playbooks. You will identify gaps in service delivery and implement automation (SOAR) to uplift maturity.
  • Stakeholder Engagement: Act as the primary technical escalation point for customers and executives. You will lead service reviews and translate complex findings into clear, actionable business insights.
  • Mentorship: Foster a culture of continuous learning by coaching analysts across all levels, leading tabletop exercises, and driving internal knowledge-sharing.
Skills & Experience Required
  • Experience: 5-8 years of hands-on experience in Security Operations (SOC), Incident Response (IR), or Threat Detection.
  • Technical Depth: Expert-level knowledge of SIEM, EDR, and SOAR platforms.
  • Adversary Tradecraft: Strong understanding of TTPs, threat hunting, and alert tuning to reduce operational fatigue.
  • Leadership: Proven ability to lead investigations and drive outcomes with clarity, especially during high-pressure incidents.
  • Communication: Exceptional ability to engage with stakeholders and present performance dashboards that build confidence.
Preferred Certifications
  • GCIH or CompTIA CySA+
  • Microsoft Security Operations Analyst (SC-200)
  • Cloud Security or dedicated Threat Hunting certifications.
Why Join Us?  This is an opportunity to join a forward-thinking security environment where you have the autonomy to shape the detection roadmap. We value proactive thinkers who want to move beyond "alert fatigue" and build a world-class SOC.

To Apply: Please submit your resume and a brief cover letter outlining your experience leading SOC maturity initiatives.

Contact Ref: Gary M
APPLY NOW

Share this job

Interested in this job?
Save Job
Create As Alert

Similar Jobs

SCHEMA MARKUP ( This text will only show on the editor. )