At a Glance
- Tasks: Lead incident response and threat hunting initiatives in a dynamic security operations centre.
- Company: Join a forward-thinking company focused on cybersecurity excellence.
- Benefits: Enjoy competitive salary, generous leave, and flexible benefits tailored to your needs.
- Why this job: Make a real impact by enhancing cybersecurity for diverse clients while leading a talented team.
- Qualifications: Strong technical background in cybersecurity and proven leadership skills required.
- Other info: Remote work with excellent career growth opportunities and a supportive team culture.
Location: Remote
Salary: £75k - £85k plus 10% bonus and £6k car allowance
Mon – Fri as well as an on-call rota - 1 week in 4.
Candidates must be willing and eligible to go through SC security clearance for this role.
We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability.
This is a hands-on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will play a key role in mentoring and developing a high-performing team, leading complex incident response engagements from initial detection through to post-incident review, and significantly enhancing the security posture of our diverse customer base.
The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats.
Key Responsibilities:- Provide expert guidance and technical oversight on complex security incidents and threat hunting operations.
- Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making under pressure.
- Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders.
- Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers.
- Analytical problem-solving: ability to investigate complex data and identify patterns or anomalies.
- Collaboration and teamwork: experience with working across functions to resolve time pressured issues.
- Communication: ability to explain technical findings in a clear manner to technical and non-technical audiences.
- 25 Days annual leave plus public holidays (3 flexible).
- Pension – Double matching contributions of up to 10%.
- Life assurance.
- Companywide incentive plans.
- Your choices (Flexible benefits such as increased holidays/ travel/ dental critical illness and more).
- Perks at work – employee discounts.
- Employee assistance programme/ virtual GP.
If you are interested in this role, please feel free to submit your CV or call me on 01737 821029.
SOC Manager - Incident Response & Threat Hunting employer: CBSbutler
Contact Detail:
CBSbutler Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Manager - Incident Response & Threat Hunting
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work in SOCs. A friendly chat can lead to insider info about job openings or even referrals that could give you an edge.
✨Tip Number 2
Show off your skills! Prepare a portfolio or case studies of past incident responses and threat hunting initiatives you've led. This will not only demonstrate your expertise but also give you great talking points during interviews.
✨Tip Number 3
Stay updated on the latest trends in cybersecurity. Follow industry news, join relevant forums, and participate in webinars. This knowledge will help you engage in meaningful conversations with potential employers and show your passion for the field.
✨Tip Number 4
Apply through our website! We love seeing candidates who take the initiative. Tailor your application to highlight your leadership experience and technical skills, and don’t forget to mention your willingness to go through SC security clearance.
We think you need these skills to ace SOC Manager - Incident Response & Threat Hunting
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the SOC Manager role. Highlight your leadership in incident response and threat hunting, and don’t forget to sprinkle in some of that technical expertise!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to tell us why you’re the perfect fit for this role. Share specific examples of your past experiences that align with our needs, especially around managing teams and handling complex incidents.
Showcase Your Problem-Solving Skills: We love candidates who can think on their feet! In your application, mention instances where you've tackled complex security challenges. This will show us your analytical prowess and how you handle pressure.
Apply Through Our Website: We encourage you to submit your application through our website. It’s the best way for us to keep track of your application and ensures you don’t miss out on any updates from us!
How to prepare for a job interview at CBSbutler
✨Know Your Cybersecurity Stuff
Make sure you brush up on your technical knowledge, especially around digital forensics and incident response. Be ready to discuss specific incidents you've managed and the strategies you employed. This will show that you’re not just a manager but also a hands-on leader who understands the nitty-gritty of cybersecurity.
✨Showcase Your Leadership Skills
Prepare examples of how you've led teams through high-pressure situations. Think about times when you coordinated cross-functional teams during incidents. Highlight your ability to mentor and develop talent, as this role is all about building a high-performing team.
✨Communicate Clearly
Practice explaining complex technical concepts in simple terms. You’ll need to convey findings to both technical and non-technical audiences, so being able to articulate your thoughts clearly is crucial. Consider doing mock interviews with friends or colleagues to refine this skill.
✨Understand the Company’s Needs
Research the company’s current security posture and any recent incidents they may have faced. Tailor your responses to demonstrate how your experience aligns with their needs, particularly in enhancing their Cyber Threat Intelligence capabilities. This shows that you’re proactive and genuinely interested in contributing to their success.