At a Glance
- Tasks: Lead a high-performing SOC team in incident response and threat hunting.
- Company: Dynamic cybersecurity firm focused on proactive defence and innovation.
- Benefits: Autonomy, professional growth, and impactful work in cybersecurity.
- Why this job: Shape the future of SOC operations and influence enterprise-level cybersecurity strategy.
- Qualifications: Proven experience in incident response and strong technical expertise in digital forensics.
- Other info: Fast-paced environment with opportunities for continuous improvement and skill development.
The predicted salary is between 36000 - 60000 £ per year.
SOC Incident Response & Threat Hunting Manager
Fully Remote (UK-based) | Up to £85,000 + 10–15% Bonus + £6k Car Allowance + Excellent Benefits
(Occasional travel to Warrington, approx. once per quarter)
Our client is expanding their virtual Security Operations Centre (vSOC) and looking for an experienced SOC Incident Response & Threat Hunting Manager to lead and develop a high-performing Tier 3 team.
This is a hands-on leadership role, ideal for someone who’s equally comfortable managing people and tackling complex security incidents directly. You’ll guide analysts through live investigations, lead advanced threat hunting operations, and help shape the strategy for the Cyber Threat Intelligence (CTI) capability.
The focus is on leadership through technical excellence — combining deep expertise in DFIR, threat hunting, and detection engineering with a proactive approach to strengthening security posture across diverse customer environments.
The Role
- Lead and mentor Tier 3 SOC and Incident Response Analysts.
- Act as the technical lead on high-severity security incidents from initial detection through to post-incident review.
- Design and execute advanced threat hunting exercises, integrating intelligence from CTI and Detection Engineering teams.
- Drive the strategic development and maturity of the CTI capability.
- Deliver in-house training programmes, tabletop exercises, and skills development sessions.
- Collaborate cross-functionally to ensure threat intelligence translates into actionable improvements.
- Participate in the on-call rota (1 week in 4) to provide leadership during critical incidents.
What You’ll Bring
- Strong background in SOC operations, incident response, and threat hunting.
- Experience leading teams or acting as senior escalation within a fast-moving SOC.
- Technical depth across digital forensics and adversary TTPs.
- Excellent analytical problem-solving and decision-making under pressure.
- Confident communicator who can explain findings clearly to technical and non-technical audiences.
- Track record of driving continuous improvement and developing others.
- Comfortable with any major SIEM or EDR platform (e.g. Splunk, QRadar, Sentinel, etc.).
Package & Benefits
- Salary: Up to £90,000 (DOE)
- Bonus: 10–15% + 5% SiS Bonus
- Car Allowance: £6,000
- Clearance: No existing clearance required – SC sponsorship available (open to dual nationals)
- Flexible Working: “Work Your Way” approach from day one
- Pension: Double matching contributions up to 10%
- Holidays: 25 days + public holidays (3 flexible)
- Health: Private medical (role dependent), life assurance, virtual GP access
- Perks: Flexible benefits scheme, employee discounts, incentive plans
- On-call: 1 week in 4
This role offers the opportunity to shape a modern, virtual SOC for a leading global technology organisation, combining strategic leadership with hands-on technical impact across incident response and threat hunting.
If you’re a strong technical leader who still enjoys being close to the action, this is an opportunity worth exploring.
SOC Manager employer: Anson McCade
Contact Detail:
Anson McCade Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Manager
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or conferences. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio or a blog where you share your insights on incident response and threat hunting. This not only showcases your expertise but also demonstrates your passion for the field to potential employers.
✨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and soft skills. Practice explaining complex concepts in simple terms, as you'll need to communicate effectively with both technical and non-technical audiences.
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Tailor your application to highlight how your experience aligns with the SOC Manager role and what you can bring to the table.
We think you need these skills to ace SOC Manager
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the SOC Manager role. Highlight your leadership in incident response and threat hunting, and don’t forget to sprinkle in some of that technical expertise!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to tell us why you’re passionate about cybersecurity and how your experience aligns with our mission at StudySmarter. Be genuine and let your personality come through.
Showcase Your Achievements: When detailing your past roles, focus on specific achievements. Did you lead a successful incident response? Share the details! We love seeing how you've made an impact in previous positions.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity. Plus, it’s super easy!