At a Glance
- Tasks: Lead incident response and threat hunting initiatives in a dynamic security operations centre.
- Company: Join a forward-thinking company focused on cybersecurity excellence.
- Benefits: Enjoy competitive salary, generous leave, pension matching, and flexible perks.
- Why this job: Make a real impact by enhancing cybersecurity for diverse clients while leading a talented team.
- Qualifications: Strong technical background in cybersecurity and proven leadership skills required.
- Other info: Remote work with excellent career growth opportunities and a supportive team culture.
The predicted salary is between 75000 - 85000 £ per year.
We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability.
This is a hands-on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will play a key role in mentoring and developing a high-performing team, leading complex incident response engagements from initial detection through to post-incident review, and significantly enhancing the security posture of our diverse customer base.
The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats.
Key Responsibilities:- Provide expert guidance and technical oversight on complex security incidents and threat hunting operations.
- Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making under pressure.
- Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders.
- Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers.
- Analytical problem-solving: ability to investigate complex data and identify patterns or anomalies.
- Collaboration and teamwork: experience with working across functions to resolve time pressured issues.
- Communication: ability to explain technical findings in a clear manner to technical and non-technical audiences.
- 25 Days annual leave plus public holidays (3 flexible).
- Pension – Double matching contributions of up to 10%.
- Life assurance.
- Companywide incentive plans.
- Your choices (Flexible benefits such as increased holidays/ travel/ dental critical illness and more).
- Perks at work – employee discounts.
- Employee assistance programme/ virtual GP.
If you are interested in this role, please feel free to submit your CV or call me on 01737 821029.
Contact Detail:
CBSbutler Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Manager - Incident Response & Threat Hunting
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work in SOCs. A friendly chat can lead to insider info about job openings or even referrals that could give you an edge.
✨Tip Number 2
Show off your skills! Prepare a portfolio or case studies of past incident responses and threat hunting initiatives you've led. This will not only demonstrate your expertise but also give you great talking points during interviews.
✨Tip Number 3
Stay updated on the latest trends in cybersecurity. Follow industry news, join relevant forums, and participate in webinars. This knowledge will help you engage in meaningful conversations with potential employers and show your passion for the field.
✨Tip Number 4
Apply through our website! We love seeing candidates who take the initiative. Tailor your application to highlight your leadership experience and technical skills, and don’t forget to mention your willingness to go through SC security clearance.
How to prepare for a job interview at CBSbutler
✨Know Your Stuff
Make sure you brush up on your technical knowledge, especially around digital forensics and incident response. Be ready to discuss specific incidents you've managed and the strategies you employed. This will show that you have the hands-on experience needed for the role.
✨Showcase Leadership Skills
As a SOC Manager, you'll need to demonstrate your leadership abilities. Prepare examples of how you've mentored teams or led complex incident responses. Highlight your experience in managing cross-functional teams and making critical decisions under pressure.
✨Communicate Clearly
You’ll need to explain technical findings to both technical and non-technical audiences. Practice articulating complex concepts in simple terms. This will not only showcase your communication skills but also your ability to bridge gaps between different stakeholders.
✨Be Proactive
Discuss your approach to threat hunting and how you anticipate cyber threats. Share any proactive measures you've implemented in previous roles. This will demonstrate your strategic mindset and commitment to enhancing security postures.