At a Glance
- Tasks: Lead incident response and threat hunting initiatives in a dynamic security operations centre.
- Company: Join a forward-thinking company focused on cybersecurity excellence.
- Benefits: Enjoy competitive salary, generous leave, and flexible benefits tailored to your needs.
- Why this job: Make a real impact by enhancing cybersecurity for diverse clients while developing your leadership skills.
- Qualifications: Strong technical background in cybersecurity and proven management experience required.
- Other info: Remote work with excellent career growth opportunities and a supportive team culture.
The predicted salary is between 75000 - 85000 £ per year.
Location: Remote
Salary: £75k - £85k plus 10% bonus and £6k car allowance
Mon – Fri as well as an on-call rota - 1 week in 4.
Candidates must be willing and eligible to go through SC security clearance for this role.
We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability.
This is a hands-on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will play a key role in mentoring and developing a high-performing team, leading complex incident response engagements from initial detection through to post-incident review, and significantly enhancing the security posture of our diverse customer base.
The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats.
Key Responsibilities:- Provide expert guidance and technical oversight on complex security incidents and threat hunting operations.
- Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making under pressure.
- Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders.
- Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers.
- Analytical problem-solving: ability to investigate complex data and identify patterns or anomalies.
- Collaboration and teamwork: experience with working across functions to resolve time pressured issues.
- Communication: ability to explain technical findings in a clear manner to technical and non-technical audiences.
- 25 Days annual leave plus public holidays (3 flexible).
- Pension – Double matching contributions of up to 10%.
- Life assurance.
- Companywide incentive plans.
- Your choices (Flexible benefits such as increased holidays/ travel/ dental critical illness and more).
- Perks at work – employee discounts.
- Employee assistance programme/ virtual GP.
If you are interested in this role, please feel free to submit your CV or call me on 01737 821029.
Contact Detail:
CBSbutler Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Manager - Incident Response & Threat Hunting
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work in SOCs. A friendly chat can lead to insider info about job openings or even referrals that could give you an edge.
✨Tip Number 2
Show off your skills! Prepare a portfolio or case studies of past incident responses and threat hunting initiatives you've led. This will not only demonstrate your expertise but also give potential employers a taste of what you can bring to their team.
✨Tip Number 3
Ace the interview by being ready for scenario-based questions. Think through how you'd handle high-severity incidents or lead a team under pressure. We want to see your thought process and how you tackle challenges head-on!
✨Tip Number 4
Don't forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you're genuinely interested in joining our team and contributing to our mission.
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Manager role. Highlight your experience in incident response and threat hunting, and don’t forget to showcase your leadership skills. We want to see how you can bring your unique expertise to our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're the perfect fit for this role. Share specific examples of your past experiences that align with the job description. We love a good story that shows your passion for cybersecurity!
Showcase Your Technical Skills: Since this role requires a strong technical background, make sure to highlight your skills in digital forensics and incident response. We’re looking for someone who can dive deep into complex security incidents, so don’t hold back on the details!
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep everything organised and ensures your application gets the attention it deserves. Plus, it’s super easy to do!